Get 20M+ Full-Text Papers For Less Than $1.50/day. Subscribe now for You or Your Team.

Learn More →

RFID security risks in supply chains: more than privacy

RFID security risks in supply chains: more than privacy The use of radio frequency identification (RFID) in supply chains has received a lot of attention from academia and practitioners in the recent past. Due to important gains in efficiency and visibility in the supply chain, a widespread adaptation is expected to make RFID tags ubiquitous in the future. Thus far, the main criticism of RFID revolves around privacy problems. In this paper, we show that other security issues besides consumer privacy may arise, particularly in a supply chain. Analysed situations include open- and closed-loop RFID setups and the impact of different attacks on these setups. Building on this, we propose an RFID attack risk classification. Furthermore, we discuss the practical implications of these risks on supply chain operations. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Enterprise Network Management Inderscience Publishers

RFID security risks in supply chains: more than privacy

Loading next page...
 
/lp/inderscience-publishers/rfid-security-risks-in-supply-chains-more-than-privacy-Ga1Z1rvMQd

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd. All rights reserved
ISSN
1748-1252
eISSN
1748-1260
DOI
10.1504/IJENM.2009.032484
Publisher site
See Article on Publisher Site

Abstract

The use of radio frequency identification (RFID) in supply chains has received a lot of attention from academia and practitioners in the recent past. Due to important gains in efficiency and visibility in the supply chain, a widespread adaptation is expected to make RFID tags ubiquitous in the future. Thus far, the main criticism of RFID revolves around privacy problems. In this paper, we show that other security issues besides consumer privacy may arise, particularly in a supply chain. Analysed situations include open- and closed-loop RFID setups and the impact of different attacks on these setups. Building on this, we propose an RFID attack risk classification. Furthermore, we discuss the practical implications of these risks on supply chain operations.

Journal

International Journal of Enterprise Network ManagementInderscience Publishers

Published: Jan 1, 2009

There are no references for this article.