In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protection method proposed by Choi and Roh in [1], which serves to protect the unique identifier of an RFID tag from disclosure to close-range eavesdroppers. Choi and Roh's method faces the 'same-bit' problem, in which some bits of the unique identifier could be disclosed, thereby revealing critical information. Our proposed scheme alleviates the 'same-bit' problem to a negligible level. Furthermore, we propose an enhanced system model that can protect the unique tag identifier from disclosure not only against eavesdroppers, but against unauthorized interrogators as well. A metric based on entropy was defined and used to measure the amount of protection offered by the scheme. A method to construct an optimal randomized n-bit encoding scheme was also described. In addition, theoretical analysis and simulations were conducted, which show that the proposed encoding scheme provides significant improvement (achieving almost twice the entropy) over no encoding.
Supply chain traceability and visibility are key concerns for many companies. RFID (Radio Frequency Identification) is an enabling technology that allows identification of objects in a fully automated manner via radio waves. The EPCglobal Network is promoting a standardised way for using RFID technology through the use of inexpensive RFID tags and readers, The EPCglobal standard leverages on the pervasive Internet for effective information sharing of tracked items. This paper presents a research effort undertaken to design and develop a secure RFID-based track and trace solution in supply chains, by leveraging on the EPCglobal standard. When a product bearing a RFID tag goes through an EPCglobal-enabled supply chain, all the RFID events are captured and stored on EPCIS servers, which can be shared among other participants in the supply chain in a secured and controlled manner. To address security issues, two levels of security are investigated. One is at lower level, between reader and tag. The other is at higher business level, to control information sharing among participants of a supply chain based on a COT (Circle of Trust) concept. A prototype system is developed and discussed at the end of the paper to demonstrate its viability.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.