Skip to main content
Log in

An RFID Based Multi-batch Supply Chain Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Application of RFID tags had provided a great convenience in supply chain systems. In this paper, an improved version of Cai et al. protocol which was specifically designed for supply chains application is proposed. The Cai et al. RFID system architecture is modified that includes a batch identifier and a path configuration features in order to accommodate multi-batch operation requirements in supply chain systems. Other important requirements in supply chain systems which had been found in relevant articles are also summarized. In addition, requirements of mutual authentication, missing tag identification, and multi-batch operation ability are investigated. We summarize the vulnerabilities of former protocol and propose a new protocol, which employs an  RFID verification scheme, for supply chain systems. Two protocols are presented which included the tags reading protocol with mutual authentication between tags and reader/partner, and the updating protocol (renewing the related secrets). We also modified the handover process and made it more reasonable. The proposed protocol satisfies most of the requirements of supply chain systems and allows multi-batch operation of products. Other merits of our solutions are: collision-free, missing tag identification, and high efficiency. Hence, the overall performance and security of supply chain systems are improved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bolotnyy L., & Robins, G. (2006). Generalized yoking-proofs for a group of RFID tags. In International conference on mobile and ubiquitous systems (pp. 1–4). (July, 2006).

  2. Burmester, M., de Medeiros, B., & Motta, R. (2008). Provably secure grouping-proofs for RFID tags, CARDIS 2008 (pp. 176–190). (September, 2008).

  3. Cai, S., Li, T., Li, Y., & Deng, R. H. (2009). Ensuring dual security modes in RFID-enabled supply chain systems. In This fifth information security practice and experience conference (ISPEC’09) (pp. 372–383). China. April 13–15, 2009

  4. EPCglobal Inc. (2007). Class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz versions 1.1.0. http://www.epcglobalinc.org/standards/uhfc1g2/uhfc1g2_1_1_0-standard-20071017.pdf.

  5. Finkenzeller K. (2003) RFID handbook (2nd ed.). John Wiley & Sons Ltd, England

    Book  Google Scholar 

  6. Garfinkel S. L., Juels A., Pappu R. (2005) RFID privacy: An overview of problems and proposed solutions. Security & Privacy Magazine, IEEE 3: 34–43

    Article  Google Scholar 

  7. ISO (2004). ISO/IEC 18000-6: Information technology—radio frequency identification for item management—Part 6: Parameters for air interface communications at 860 MHz to 960 MHz. http://www.iso.org.

  8. Juels A. (2004) Yoking-proofs for RFID tags. In First international workshop on pervasive computing and communication security. IEEE Press, New York, pp 138–143

    Google Scholar 

  9. Juels A. (2006) RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24(2): 381–394

    Article  MathSciNet  Google Scholar 

  10. Juels, A., Pappu, R., & Parno, B. (2008). Unidirectional key distribution across time and space with applications to RFID security. In 17th USENIX security symposium (pp. 75–90).

  11. Kapoor, G., Zhou, W., & Piramuthu, S. (2008). RFID and information security in supply chains. In Proceedings of international conference on mobile ad-hoc and sensor networks (MSN’08) (pp. 59–62). IEEE Press. (December, 10–12, 2008).

  12. Leng, X., Lien, Y., Mayes, K., Markantonakis, K., & Chiu, J.-H. (2009). Select-response grouping proof for RFID tags. In First ACIIDS, Asian conference on intelligent information and database systems (pp. 73–77). IEEE Computer Society, Dong Hoi City Vietnam.

  13. Li, Y., & Ding, X. (2007). Protecting RFID communications in supply chains. InProceedings of the 2nd ACM symposium on information, computer and communications security (ASIACCS’07) (pp. 234–241). Singapore. (March, 20–22, 2007).

  14. Lien, Y.-H., Leng, X., Mayes, K., & Chiu, J.-H. (2008). Reading order independent grouping proof for RFID tags. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics ISI 2008 (pp. 128–136). (June, 2008).

  15. Piramuthu, S. (2006). On existence proofs for multiple RFID tags. IEEE international conference on pervasive services (ICPS’06) (pp. 317–320). (June, 2006).

  16. Saito, J., & Sakurai, K. (2005). Grouping proof for RFID tags. In Proceedings of the 19th international conference on AINA’05 (Vol.2, pp. 621–624).

  17. Sarma, S., Weis, S. A., & Engels, D. (2003). Radio-frequency identification: Risks and challenges. RSA CryptoBytes, 6(1), pp. 1–9. Winter Spring.

    Google Scholar 

  18. Song, B. (2008). RFID Tag Ownership Transfer, Conference on RFID Security (RFIDSec’08). Budapest, Hungary July 2008. events. iaik.tugraz.at/RFIDSec08/Papers/Publication/15–Song—Ownership Transfer—Paper.pdf. (July, 2008).

  19. Van Deursen, T., & Radomirovic, S. (2008). Security of an RFID protocol for supply chains, e-Business engineering. In IEEE international conference (ICEBE ‘08) (pp. 568–573). (October, 22–24, 2008).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-Ter Hsi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lien, YH., Hsi, CT., Leng, X. et al. An RFID Based Multi-batch Supply Chain Systems. Wireless Pers Commun 63, 393–413 (2012). https://doi.org/10.1007/s11277-010-0139-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-010-0139-9

Keywords

Navigation