Abstract
Blockchain-based supply chains provide a new solution to decentralized multi-party product management. However, existing methods, including ID-based and cryptographic-based solutions, cannot achieve both counterfeit resistance and decentralization in supply chain management. We argue that this dilemma comes from the disconnection and inconsistency of the data records and physical product entities. This paper proposes RF-Chain, a novel decentralized supply chain management solution that uniquely combines data record authentication and physical-layer RFID tag authentication to effectively achieve credibility and counterfeit resistance. The main contribution of this work is to integrate physical-layer authentication of cheap commodity RFID tags into a blockchain-based information management system, and RF-Chain is the first to do so. The proposed cross-layer authentication can effectively defend against counterfeit attacks without relying on a central key management service. Real-world experiments utilizing the Ethereum (ETH) platform and more than 100 RFID tags demonstrate that RF-Chain is secure, effective, time-efficient, and cost-efficient.
- Elkhiyaoui, Kaoutar and Blass, Erik Oliver and Molva, Refik. 2012. CHECKER: On-site checking in RFID-based supply chains. Proceedings of ACM WiSec (2012).Google Scholar
- Mansoor Alblooshi, Khaled Salah, and Yousof Alhammadi. 2018. Blockchain-based ownership management for medical IoT (MIoT) devices. In Proceedings on IEEE IIT. IEEE, 151--156.Google ScholarCross Ref
- Mehmet Baygin, Orhan Yaman, Nursena Baygin, and Mehmet Karakose. 2022. A blockchain-based approach to smart cargo transportation using UHF RFID. Expert Systems with Applications 188 (2022), 116030.Google ScholarCross Ref
- Britney Brown. 2021. 10 Retail companies using blockchain technology. https://www.getdor.com/blog/2021/09/14/retail-companies-using-blockchain- technology/Google Scholar
- S. Cai, T. Li, C. Ma, Y. Li, and R. H. Deng. 2009. Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains. In Information & Communications Security, International Conference, Icics, Beijing, China, December.Google Scholar
- Roberto Casado-Vara, Javier Prieto, Fernando De la Prieta, and Juan M Corchado. 2018. How blockchain improves the supply chain: Case study alimentary supply chain. Procedia computer science 134 (2018), 393--398.Google Scholar
- Arijit Chakrabarti and Ashesh Kumar Chaudhuri. 2017. Blockchain and its scope in retail. International Research Journal of Engineering and Technology 4, 7 (2017), 3053--3056.Google Scholar
- Xingyu Chen, Jia Liu, Xia Wang, Haisong Liu, Dong Jiang, and Lijun Chen. 2020. Eingerprint: Robust energy-related fingerprinting for passive RFID tags. In Proceedings of USENIX NSDI. 1101--1113.Google Scholar
- Marco Conoscenti, Antonio Vetro, and Juan Carlos De Martin. 2016. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of IEEE/ACS AICCSA. IEEE, 1--6.Google ScholarCross Ref
- Boris Danev, Thomas S Heydt-Benjamin, and Srdjan Capkun. 2009. Physical-layer Identification of RFID Devices.. In Usenix Security Symposium. 199--214.Google ScholarDigital Library
- Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. 2010. Attacks on physical-layer identification. In Proceedings of the third ACM conference on Wireless network security. ACM, 89--98.Google ScholarDigital Library
- EPCglobal. 2005. EPC™ radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz--960 MHz.Google Scholar
- Santiago Figueroa, Javier Añorga, and Saioa Arrizabalaga. 2019. An attribute-based access control model in RFID systems based on blockchain decentralized applications for healthcare environments. Computers 8, 3 (2019), 57.Google ScholarCross Ref
- Vishal Gaur and Abhinav Gaiha. 2020. Building a Transparent Supply Chain. https://hbr.org/2020/05/building-a-transparent-supply-chain Accessed, May-June, 2020.Google Scholar
- Poonam Ghuli, Urvashi Priyam Kumar, and Rajashree Shettar. 2017. A review on blockchain application for decentralized decision of ownership of IoT devices. Advances in Computational Sciences and Technology 10, 8 (2017), 2449--2456.Google Scholar
- F. Guo, M. Yi, W. Susilo, and V. Varadharajan. 2017. Privacy-preserving mutual authentication in RFID with designated readers. Wireless Personal Communications 96, 3 (2017), 1--27.Google ScholarDigital Library
- Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Wei Xi, Zhiping Jiang, and Zhi Wang. 2016. Twins: Device-free object tracking using passive tags. IEEE/ACM Transactions on Networking (TON) 24, 3 (2016), 1605--1617.Google ScholarDigital Library
- J. Han, C. Qian, P. Yang, D. Ma, Z. Jiang, W. Xi, and J. Zhao. 2016. GenePrint: Generic and accurate physical-layer identification for UHF RFID tags. IEEE/ACM Transactions on Networking (TON) (2016).Google Scholar
- Jinsong Han, Chen Qian, Yuqin Yang, Ge Wang, Han Ding, Xin Li, and Kui Ren. 2018. Butterfly: Environment-independent physical-layer authentication for passive rfid. Proceedings of the ACM Ubicomp 2, 4 (2018), 1--21.Google ScholarDigital Library
- Shruti Jain. [n. d.]. Can blockchain accelerate Internet of Things (IoT) adoption? https://www2.deloitte.com/ch/en/pages/innovation/articles/blockchain-accelerate-iot-adoption.html.Google Scholar
- A. Juels and B. Parno. 2010. Unidirectional key distribution across time and space with applications to RFID security. Cryptology ePrint Archive (2010).Google Scholar
- J. H. Khor, W. Ismail, and M. G. Rahman. 2012. Prevention and Detection Methods for Enhancing Security in an RFID System. International Journal of Distributed Sensor Networks (2012), 264--283.Google Scholar
- J. H. Khor, W. Ismail, and M. G. Rahman. 2014. Detecting counterfeit RFID tags using digital forensic. Studies in Computational Intelligence 555 (2014), 211--251.Google Scholar
- Kari Korpela, Jukka Hallikas, and Tomi Dahlberg. 2017. Digital supply chain transformation toward blockchain integration. In Proceedings of Hawaii system sciences.Google ScholarCross Ref
- N. Kumar, K. Kaur, S. C. Misra, and R. Iqbal. 2016. An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications 9, 5 (2016), 824--840.Google ScholarCross Ref
- M. Langheinrich and R. Marti. 2007. Practical Minimalist Cryptography for RFID Privacy. IEEE Systems Journal 1, 2 (2007), 115--128.Google ScholarCross Ref
- Aleksandr Lanko, Nickolay Vatin, and Arturas Kaklauskas. 2018. Application of RFID combined with blockchain technology in logistics of construction materials. In Matec Web of conferences, Vol. 170. EDP Sciences, 03032.Google ScholarCross Ref
- Iuon-Chang Lin, Hung-Huei Hsu, and Chen-Yang Cheng. 2015. A cloud-based authentication protocol for RFID supply chain systems. Journal of Network and Systems Management 23, 4 (2015), 978--997.Google ScholarDigital Library
- C. Lv, X. Jia, J. Lin, J. Jing, and L. Tian. 2011. An efficient group-based secret sharing scheme. Lecture Notes in Computer Science 6672 (2011), 288--301.Google ScholarCross Ref
- Saikat Mondal, Kanishka P Wijewardena, Saranraj Karuppuswami, Nitya Kriti, Deepak Kumar, and Premjeet Chahal. 2019. Blockchain inspired RFID-based information architecture for food supply chain. IEEE Internet of Things Journal 6, 3 (2019), 5803--5813.Google ScholarCross Ref
- U. Mujahid, M. Najam-Ul-Islam, and M. Khalid. 2017. Efficient hardware implementation of KMAP+: an ultralightweight mutual authentication protocol. Journal of Circuits, Systems and Computers 27, 2 (2017), 1850033.1--1850033.16.Google ScholarCross Ref
- Senthilkumar Chinnappa Gounder Periaswamy, Dale R Thompson, and Jia Di. 2011. Fingerprinting RFID tags. IEEE Transactions on Dependable and Secure Computing 8, 6 (2011), 938--943.Google ScholarDigital Library
- Sara Saberi, Mahtab Kouhizadeh, Joseph Sarkis, and Lejia Shen. 2019. Blockchain technology and its relationships to sustainable supply chain management. International Journal of Production Research 57, 7 (2019), 2117--2135.Google ScholarCross Ref
- Longfei Shangguan. 2016. USRP Gen2 Reader. https://github.com/shanggdlk/Gen2-UHF-RFID-Reader/.Google Scholar
- Michail Sidorov, Ming Tze Ong, Ravivarma Vikneswaren Sridharan, Junya Nakamura, Ren Ohmura, and Jing Huey Khor. 2019. Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. IEEE Access 7 (2019), 7273--7285.Google ScholarCross Ref
- T. Staake, F. Thiesse, and E. Fleisch. 2005. Extending the EPC network - the potential of RFID in anti-vounterfeiting. Proceedings of ACM Symp. Comput. (2005), 1607--1612.Google Scholar
- P. Syverson. 1991. The use of logic in the analysis of cryptographic protocols. In Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on.Google ScholarCross Ref
- Aakanksha Tewari and Brij B Gupta. 2017. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. Journal of Supercomputing 73, 3 (2017), 1085--1102.Google ScholarDigital Library
- Feng Tian. 2016. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In Proceedings of IEEE ICSSSM. IEEE, 1--6.Google Scholar
- K. Toyoda, P. T. Mathiopoulos, I. Sasase, and T. Ohtsuki. 2017. A novel blockchain-based product ownership Management System (POMS) for anti-counterfeits in the post supply dhain. IEEE Access (2017), 1--1.Google Scholar
- K. Toyoda and I. Sasase. 2015. Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains. In Proceedings of IEEE RFID.Google Scholar
- Remko Van Hoek. 2019. Exploring blockchain implementation in the supply chain: Learning from pioneers and RFID research. International Journal of Operations & Production Management (2019).Google Scholar
- Vincenzo Varriale, Antonello Cammarano, Francesca Michelino, and Mauro Caputo. 2021. Sustainable supply chains with blockchain, IoT and RFID: A simulation on order management. Sustainability 13, 11 (2021), 6372.Google ScholarCross Ref
- Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, Han Ding, and Jizhong Zhao. 2018. Towards replay-resilient RFID authentication. In Proceedings of ACM MobiCom. 385--399.Google ScholarDigital Library
- G. Wang, H. Cai, C. Qian, J. Han, and J. Zhao. 2020. Hu-Fu: Replay-Resilient RFID Authentication. IEEE/ACM Transactions on Networking PP, 99 (2020), 1--14.Google Scholar
- Siye Wang, Shaoyi Zhu, and Yanfang Zhang. 2018. Blockchain-based mutual authentication security protocol for distributed RFID systems. In Proceedings of IEEE ISCC. IEEE, 00074--00077.Google ScholarCross Ref
- Yingli Wang, Jeong Hugh Han, and Paul Beynon-Davies. 2019. Understanding blockchain technology for future supply chains: a systematic literature review and research agenda. Supply Chain Management: An International Journal (2019).Google Scholar
- Chris West, Mishelle Madigan, Logan Webb, Victor Wiercioch, Dan Thomas, and Andressa Silva. [n. d.]. RFID Technology in Walmart. https://walmartsupplychain.weebly.com/rfid-technology.htmlGoogle Scholar
- D. Zanetti, S. Capkun, and A. Juels. 2013. Tailing RFID Tags for Clone Detection. In Proceedings of NDSS.Google Scholar
- Davide Zanetti, Boris Danev, et al. 2010. Physical-layer identification of UHF RFID tags. In Proceedings of ACM MOBICOM.Google ScholarDigital Library
- Davide Zanetti, Pascal Sachs, and Srdjan Capkun. 2011. On the practicality of UHF RFID fingerprinting: How real is the RFID tracking problem?. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 97--116.Google ScholarDigital Library
- Pamela J Zelbst, Kenneth W Green, Victor E Sower, and Philip L Bond. 2019. The impact of RFID, IIoT, and Blockchain technologies on supply chain transparency. Journal of Manufacturing Technology Management (2019).Google Scholar
Index Terms
- RF-Chain: Decentralized, Credible, and Counterfeit-proof Supply Chain Management with Commodity RFIDs
Recommendations
RFID-based supply chain partner authentication and key agreement
WiSec '09: Proceedings of the second ACM conference on Wireless network securityThe growing use of RFID in supply chains brings along an indisputable added value from the business perspective, but raises a number of new interesting security challenges. One of them is the authentication of two participants of the supply chain that ...
A survey on the use of blockchains to achieve supply chain security
AbstractSupply chain networks are becoming more complex and vulnerable to various attacks. We must tackle these attacks properly to ensure the required supply chain security. In this paper, I have classified major supply chain security issues ...
Highlights- Comparison of other blockchain related works and my work.
- Noteworthy supply ...
Mutual authentication scheme for EPC tags- readers in the supply chain
NTMS'09: Proceedings of the 3rd international conference on New technologies, mobility and securityWe present a privacy-preserving mutual authentication scheme for RFID. The scheme is compatible with supply chains originating at multiple manufactures, and is based on decentralized local databases connected to RFID readers. RFID tag capabilities are ...
Comments