Secure product tracking in supply chain

Khalfaoui, Mehdi; Molva, Refik; Gomez, Laurent
INSCRYPT 2012, 8th International Conference on Information Security and Cryptology, 28-30 November 2012, Pekin, China / Also published in LNCS 7763/2013

Nowadays, the globalization has placed supply chains under major threats. Therefore, supply chain actors should ensure the safety of population and product, by being compliant with security, and quality regulations. In case of accident, the involved actors should answer
for the occurred defects. Keeping track of the supply chain operations is thus a mandatory requirement for accountability. In that context, product tracking comes as major requirement of supply chain. Product tracking ensures traceability by keeping track of all the operations performed on the product by each supply chain actor. However, tracking raises several security concerns, such as supply chain actors'privacy. Privacy required that only authorized actors must be able to identify the path taken by the product. An attacker must not be able to trace the product or the actors of the supply chain. In this paper, we propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors'privacy. Our solution is based on generating identifiers of the actors and their activities using AND Anti collusion codes. The identifiers are encrypted using homomorphic encryption to ensure security against adversaries, and to be able to compress
the collected identifiers. In this work, wireless sensor nodes are not required to perform complex computation, which makes our solution feasible.


DOI
Type:
Conference
City:
Pekin
Date:
2012-11-28
Department:
Digital Security
Eurecom Ref:
3885
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in INSCRYPT 2012, 8th International Conference on Information Security and Cryptology, 28-30 November 2012, Pekin, China / Also published in LNCS 7763/2013 and is available at : http://dx.doi.org/10.1007/978-3-642-38519-3_22
See also:

PERMALINK : https://www.eurecom.fr/publication/3885