Tamper detection in RFID-enabled supply chains using fragile watermarking

Han Shuihua, Chao Hsien Chu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

While mainstream RFID research has been focused on solving privacy issues, security in general and data tampering in specific is still an open question. This paper analyzes potential security threats especially data tampering in RFID-enabled supply chains and proposes solutions how these threats might be addressed using fragile watermarking technologies. We first survey RFID system and its security problems, and then explain the importance of fragile watermarking schemes for RFID systems and possible applications using fragile watermarking to detect and locate any modification in RFID systems. Finally we suggest possible solutions using fragile watermarking for RFID-enabled supply chain.

Original languageEnglish (US)
Title of host publication2008 IEEE International Conference on RFID (Frequency Identification), IEEE RFID 2008
Pages111-117
Number of pages7
DOIs
StatePublished - 2008
Event2008 IEEE International Conference on RFID (Frequency Identification), IEEE RFID 2008 - Las Vegas, NV, United States
Duration: Apr 16 2008Apr 17 2008

Publication series

Name2008 IEEE International Conference on RFID (Frequency Identification), IEEE RFID 2008

Other

Other2008 IEEE International Conference on RFID (Frequency Identification), IEEE RFID 2008
Country/TerritoryUnited States
CityLas Vegas, NV
Period4/16/084/17/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Tamper detection in RFID-enabled supply chains using fragile watermarking'. Together they form a unique fingerprint.

Cite this