Graduate School and Research Center In communication systems

Tracker : security and privacy for RFID-based supply chains

Blass, Erik-Oliver; Elkhiyaoui, Kaoutar; Molva, Refik

NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA

 TRACKER, a protocolTRACKER allows to securely identifyTRACKER provides privacy: an adversaryTRACKER'snot required to perform any computation,               The counterfeiting of pharmaceutics or luxury objects is               a major threat to supply chains today. As different facilities               of a supply chain are distributed and difficult to monitor,               malicious adversaries can inject fake objects into the               supply chain. This paper presents               for object genuineness verification in RFID-based supply               chains. More precisely,               which (legitimate) path an object/tag has taken through               a supply chain.               can neither learn details about an object's path, nor can               it trace and link objects in the supply chain.               security and privacy is based on an extension of polynomial               signature techniques for run-time fault detection using               homomorphic encryption. Contrary to related work, RFID               tags in this paper are               but only feature a few bytes of storage such as ordinary               EPC Class 1 Gen 2 tags.

Document Bibtex

Type:Conference
Language:English
City:San Diego
Country:UNITED STATES
Date:
Department:Networking and Security
Eurecom ref:3233
Copyright: © ISOC. Personal use of this material is permitted. The definitive version of this paper was published in NDSS 2011, 18th Annual Network and Distributed System Security Symposium, 6-9 February 2011, San Diego, CA, USA and is available at :
Bibtex: @inproceedings{EURECOM+3233, year = {2011}, title = {{T}racker : security and privacy for {RFID}-based supply chains}, author = {{B}lass, {E}rik-{O}liver and {E}lkhiyaoui, {K}aoutar and {M}olva, {R}efik}, booktitle = {{NDSS} 2011, 18th {A}nnual {N}etwork and {D}istributed {S}ystem {S}ecurity {S}ymposium, 6-9 {F}ebruary 2011, {S}an {D}iego, {CA}, {USA}}, address = {{S}an {D}iego, {UNITED} {STATES}}, month = {02}, url = {http://www.eurecom.fr/publication/3233} }
See also: