Tamper detection for ubiquitous RFID-enabled supply chain
Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to...
| Main Authors: | , , |
|---|---|
| Format: | Conference Paper |
| Published: |
Springer-Verlag
2005
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/28590 |
| _version_ | 1848752577913552896 |
|---|---|
| author | Potdar, Vidyasagar Wu, Chen Chang, Elizabeth |
| author_facet | Potdar, Vidyasagar Wu, Chen Chang, Elizabeth |
| author_sort | Potdar, Vidyasagar |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering. |
| first_indexed | 2025-11-14T08:10:50Z |
| format | Conference Paper |
| id | curtin-20.500.11937-28590 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T08:10:50Z |
| publishDate | 2005 |
| publisher | Springer-Verlag |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-285902019-02-19T05:35:33Z Tamper detection for ubiquitous RFID-enabled supply chain Potdar, Vidyasagar Wu, Chen Chang, Elizabeth RFID middleware architecture privacy RFID tags security information sharing secret information tamper detection data tampering supply chain information systems Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering. 2005 Conference Paper http://hdl.handle.net/20.500.11937/28590 10.1007/11596981_40 Springer-Verlag restricted |
| spellingShingle | RFID middleware architecture privacy RFID tags security information sharing secret information tamper detection data tampering supply chain information systems Potdar, Vidyasagar Wu, Chen Chang, Elizabeth Tamper detection for ubiquitous RFID-enabled supply chain |
| title | Tamper detection for ubiquitous RFID-enabled supply chain |
| title_full | Tamper detection for ubiquitous RFID-enabled supply chain |
| title_fullStr | Tamper detection for ubiquitous RFID-enabled supply chain |
| title_full_unstemmed | Tamper detection for ubiquitous RFID-enabled supply chain |
| title_short | Tamper detection for ubiquitous RFID-enabled supply chain |
| title_sort | tamper detection for ubiquitous rfid-enabled supply chain |
| topic | RFID middleware architecture privacy RFID tags security information sharing secret information tamper detection data tampering supply chain information systems |
| url | http://hdl.handle.net/20.500.11937/28590 |