Academic
Publications
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain

Tamper Detection for Ubiquitous RFID-Enabled Supply Chain,10.1007/11596981_40,Vidyasagar Potdar,Chen Wu,Elizabeth Chang

Tamper Detection for Ubiquitous RFID-Enabled Supply Chain   (Citations: 6)
BibTex | RIS | RefWorks Download
Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering.
Conference: Computational and Information Science - CIS , pp. 273-278, 2005
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...ution unsuitable for al access of tags is ay occur if any tag nd [14], the authors tection solution for is used as the cover urring either in the s (OC), but not for hese watermarking d most importantly the secrecy of the...
    • ...Moreover, in [12, 13, 14] even a brute force attack requires only 2 12 attempts since the size of the watermark is 12 bits...
    • ...long. Furthermore, according to the best of our knowledge, none of the existing tamper detection solutions [10, 12, 13, 14, 17, 18, 19] can detect tampering done by cloning a tag...

    Ali N M Nomanet al. Improving security and usability of low cost RFID tags

    • ...In [11, 12, 13], watermarking based tamper detection solutions for RFID tags are proposed where the Serial Number field is used as the cover medium to detect any modification occurring either in the EPC Manager (EM) or in the Object Class (OC), but not for both at the same time...
    • ...The existing solutions generally only use the X-or operation on a portion of the RFID tag to generate the 8 bit watermark [11, 12, 13]...

    Ali Nur Mohammad Nomanet al. A Watermarking Based Tamper Detection Solution for RFID Tags

    • ...Initial work in this domain can be found here [3,4,5,6]...
    • ...The original solution to address data tampering was presented by the authors in [3, 5]. This solution embeds a secret pattern, generated from the EM and OC, in the serial number SN, in a similar manner as in hiding the expiry date...
    • ...It is shown in [3, 5], that only 5 to 9 bits would be sufficient to hide the secret pattern for tamper detection...
    • ...The initial solution to address this is presented in [3, 6]. The basic idea is to hide the weight of the product in the respective RFID tag...

    Manohar Potdaret al. Applications of RFID in Pharmaceutical Industry

    • ...Initial work on tamper detection was presented by the authors earlier [19, 20, 21, 28]...
    • ...The proposed solution relies on [19, 21], to ascertain that data tampering has occurred and to identify which portion of the RFID tag that has been tampered with...
    • ...A detailed explanation can be found here [19,20,21]...

    Madan Mohanet al. Recovering and Restoring Tampered RFID Data using Steganographic Princ...

Sort by: