A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems

碩士 === 大同大學 === 資訊工程學系(所) === 99 === Through the technique of radio frequency induction, managers can use the RFID reader to read the electronic product code label to identify products; hence the RFID will become a tool for supply chain management. In order to enhance automation and business transpa...

Full description

Bibliographic Details
Main Authors: Yu-hung Peng, 彭宇弘
Other Authors: Kuo-Hsuan Huang
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/22083385709272018611
id ndltd-TW-099TTU05392019
record_format oai_dc
spelling ndltd-TW-099TTU053920192015-10-19T04:03:44Z http://ndltd.ncl.edu.tw/handle/22083385709272018611 A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems RFID於供應鏈安全與隱私保護之研究 Yu-hung Peng 彭宇弘 碩士 大同大學 資訊工程學系(所) 99 Through the technique of radio frequency induction, managers can use the RFID reader to read the electronic product code label to identify products; hence the RFID will become a tool for supply chain management. In order to enhance automation and business transparency, the back-end server of the supplier records each log event to complete the production records and provide online inquiry service. RFID enabled the degree of control over the product flow and inventory, so RFID is seen as the next generation of bar code applications. And due to the drawback about the security of RFID, attackers can seek market intelligence or privacy. Attackers can use the malicious reader to read tags in a limited range, or eavesdrop on a successful communication between the tag and a legitimate reader. With this manner, product information can be collected and tracked. This study focus on security threats on RFID systems caused by eavesdropping, replay attacks, tag cloning, De-synchronization, etc. In order to protect commercial benefits from attackers, this study presented two RFID communication protocols to ensure that RFID systems can properly execute the transfer of ownership in RFID enabled supply chain environments that can keep the security. The first protocol applies to the production to the retail stage, use of two security levels to deal with the security and efficiency problems in the supply chain. The second protocol applies to post sales, which provide read and ownership transfer protocol without the need for a backend server to protect the ownership of personal items and personal privacy, when RFID technology become popular in consumers’ lives. Kuo-Hsuan Huang 黃國軒 2011 學位論文 ; thesis 73 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 大同大學 === 資訊工程學系(所) === 99 === Through the technique of radio frequency induction, managers can use the RFID reader to read the electronic product code label to identify products; hence the RFID will become a tool for supply chain management. In order to enhance automation and business transparency, the back-end server of the supplier records each log event to complete the production records and provide online inquiry service. RFID enabled the degree of control over the product flow and inventory, so RFID is seen as the next generation of bar code applications. And due to the drawback about the security of RFID, attackers can seek market intelligence or privacy. Attackers can use the malicious reader to read tags in a limited range, or eavesdrop on a successful communication between the tag and a legitimate reader. With this manner, product information can be collected and tracked. This study focus on security threats on RFID systems caused by eavesdropping, replay attacks, tag cloning, De-synchronization, etc. In order to protect commercial benefits from attackers, this study presented two RFID communication protocols to ensure that RFID systems can properly execute the transfer of ownership in RFID enabled supply chain environments that can keep the security. The first protocol applies to the production to the retail stage, use of two security levels to deal with the security and efficiency problems in the supply chain. The second protocol applies to post sales, which provide read and ownership transfer protocol without the need for a backend server to protect the ownership of personal items and personal privacy, when RFID technology become popular in consumers’ lives.
author2 Kuo-Hsuan Huang
author_facet Kuo-Hsuan Huang
Yu-hung Peng
彭宇弘
author Yu-hung Peng
彭宇弘
spellingShingle Yu-hung Peng
彭宇弘
A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems
author_sort Yu-hung Peng
title A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems
title_short A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems
title_full A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems
title_fullStr A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems
title_full_unstemmed A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems
title_sort study of security and privacy issues in rfid-enabled supply chain systems
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/22083385709272018611
work_keys_str_mv AT yuhungpeng astudyofsecurityandprivacyissuesinrfidenabledsupplychainsystems
AT péngyǔhóng astudyofsecurityandprivacyissuesinrfidenabledsupplychainsystems
AT yuhungpeng rfidyúgōngyīngliànānquányǔyǐnsībǎohùzhīyánjiū
AT péngyǔhóng rfidyúgōngyīngliànānquányǔyǐnsībǎohùzhīyánjiū
AT yuhungpeng studyofsecurityandprivacyissuesinrfidenabledsupplychainsystems
AT péngyǔhóng studyofsecurityandprivacyissuesinrfidenabledsupplychainsystems
_version_ 1718095019787681792