Tamper detection for ubiquitous RFID-enabled supply chain

Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to...

Full description

Bibliographic Details
Main Authors: Potdar, Vidyasagar, Wu, Chen, Chang, Elizabeth
Format: Conference Paper
Published: Springer-Verlag 2005
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/28590
_version_ 1848752577913552896
author Potdar, Vidyasagar
Wu, Chen
Chang, Elizabeth
author_facet Potdar, Vidyasagar
Wu, Chen
Chang, Elizabeth
author_sort Potdar, Vidyasagar
building Curtin Institutional Repository
collection Online Access
description Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering.
first_indexed 2025-11-14T08:10:50Z
format Conference Paper
id curtin-20.500.11937-28590
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T08:10:50Z
publishDate 2005
publisher Springer-Verlag
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-285902019-02-19T05:35:33Z Tamper detection for ubiquitous RFID-enabled supply chain Potdar, Vidyasagar Wu, Chen Chang, Elizabeth RFID middleware architecture privacy RFID tags security information sharing secret information tamper detection data tampering supply chain information systems Security and privacy are two primary concerns in RFID adoption. In this paper we focus on security issues in general and data tampering in particular. Here we present a conceptual framework to detect and identify data tampering in RFID tags. The paper surveys the existing literature and proposes to add a tamper detection component in the existing RFID middleware architecture. The tamper detection component is supported by mathematical algorithm to embed and extract secret information which can be employed to detect data tampering. 2005 Conference Paper http://hdl.handle.net/20.500.11937/28590 10.1007/11596981_40 Springer-Verlag restricted
spellingShingle RFID
middleware architecture
privacy
RFID tags
security
information sharing
secret information
tamper detection
data tampering
supply chain
information systems
Potdar, Vidyasagar
Wu, Chen
Chang, Elizabeth
Tamper detection for ubiquitous RFID-enabled supply chain
title Tamper detection for ubiquitous RFID-enabled supply chain
title_full Tamper detection for ubiquitous RFID-enabled supply chain
title_fullStr Tamper detection for ubiquitous RFID-enabled supply chain
title_full_unstemmed Tamper detection for ubiquitous RFID-enabled supply chain
title_short Tamper detection for ubiquitous RFID-enabled supply chain
title_sort tamper detection for ubiquitous rfid-enabled supply chain
topic RFID
middleware architecture
privacy
RFID tags
security
information sharing
secret information
tamper detection
data tampering
supply chain
information systems
url http://hdl.handle.net/20.500.11937/28590