A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems
碩士 === 大同大學 === 資訊工程學系(所) === 99 === Through the technique of radio frequency induction, managers can use the RFID reader to read the electronic product code label to identify products; hence the RFID will become a tool for supply chain management. In order to enhance automation and business transpa...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/22083385709272018611 |
id |
ndltd-TW-099TTU05392019 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099TTU053920192015-10-19T04:03:44Z http://ndltd.ncl.edu.tw/handle/22083385709272018611 A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems RFID於供應鏈安全與隱私保護之研究 Yu-hung Peng 彭宇弘 碩士 大同大學 資訊工程學系(所) 99 Through the technique of radio frequency induction, managers can use the RFID reader to read the electronic product code label to identify products; hence the RFID will become a tool for supply chain management. In order to enhance automation and business transparency, the back-end server of the supplier records each log event to complete the production records and provide online inquiry service. RFID enabled the degree of control over the product flow and inventory, so RFID is seen as the next generation of bar code applications. And due to the drawback about the security of RFID, attackers can seek market intelligence or privacy. Attackers can use the malicious reader to read tags in a limited range, or eavesdrop on a successful communication between the tag and a legitimate reader. With this manner, product information can be collected and tracked. This study focus on security threats on RFID systems caused by eavesdropping, replay attacks, tag cloning, De-synchronization, etc. In order to protect commercial benefits from attackers, this study presented two RFID communication protocols to ensure that RFID systems can properly execute the transfer of ownership in RFID enabled supply chain environments that can keep the security. The first protocol applies to the production to the retail stage, use of two security levels to deal with the security and efficiency problems in the supply chain. The second protocol applies to post sales, which provide read and ownership transfer protocol without the need for a backend server to protect the ownership of personal items and personal privacy, when RFID technology become popular in consumers’ lives. Kuo-Hsuan Huang 黃國軒 2011 學位論文 ; thesis 73 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大同大學 === 資訊工程學系(所) === 99 === Through the technique of radio frequency induction, managers can use the RFID reader to read the electronic product code label to identify products; hence the RFID will become a tool for supply chain management. In order to enhance automation and business transparency, the back-end server of the supplier records each log event to complete the production records and provide online inquiry service. RFID enabled the degree of control over the product flow and inventory, so RFID is seen as the next generation of bar code applications. And due to the drawback about the security of RFID, attackers can seek market intelligence or privacy. Attackers can use the malicious reader to read tags in a limited range, or eavesdrop on a successful communication between the tag and a legitimate reader. With this manner, product information can be collected and tracked. This study focus on security threats on RFID systems caused by eavesdropping, replay attacks, tag cloning, De-synchronization, etc.
In order to protect commercial benefits from attackers, this study presented two RFID communication protocols to ensure that RFID systems can properly execute the transfer of ownership in RFID enabled supply chain environments that can keep the security. The first protocol applies to the production to the retail stage, use of two security levels to deal with the security and efficiency problems in the supply chain. The second protocol applies to post sales, which provide read and ownership transfer protocol without the need for a backend server to protect the ownership of personal items and personal privacy, when RFID technology become popular in consumers’ lives.
|
author2 |
Kuo-Hsuan Huang |
author_facet |
Kuo-Hsuan Huang Yu-hung Peng 彭宇弘 |
author |
Yu-hung Peng 彭宇弘 |
spellingShingle |
Yu-hung Peng 彭宇弘 A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems |
author_sort |
Yu-hung Peng |
title |
A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems |
title_short |
A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems |
title_full |
A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems |
title_fullStr |
A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems |
title_full_unstemmed |
A Study of Security and Privacy Issues in RFID-Enabled Supply Chain Systems |
title_sort |
study of security and privacy issues in rfid-enabled supply chain systems |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/22083385709272018611 |
work_keys_str_mv |
AT yuhungpeng astudyofsecurityandprivacyissuesinrfidenabledsupplychainsystems AT péngyǔhóng astudyofsecurityandprivacyissuesinrfidenabledsupplychainsystems AT yuhungpeng rfidyúgōngyīngliànānquányǔyǐnsībǎohùzhīyánjiū AT péngyǔhóng rfidyúgōngyīngliànānquányǔyǐnsībǎohùzhīyánjiū AT yuhungpeng studyofsecurityandprivacyissuesinrfidenabledsupplychainsystems AT péngyǔhóng studyofsecurityandprivacyissuesinrfidenabledsupplychainsystems |
_version_ |
1718095019787681792 |