Paper Abstract and Keywords |
Presentation |
2015-07-02 13:50
[Invited Talk]
Illegal Interrogation Detectable Products Distribution Scheme in RFID-enabled Supply Chains Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-17 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
An EPC contains sensitive information and protecting it is necessary in the RFID-enabled supply chains. However, no scheme can notice whether an attacker interrogates them during transportation. In this paper, we propose an illegal interrogation detection scheme with an EPCIS server. Our scheme divides an EPC into two parts and places one part on the server with an access code. An access code is divided into shares with a secret sharing scheme and shares are on tags. We also write bogus shares into dummy tags. Since an attacker may try many access code candidates on the EPCIS server, the server can detect him/her. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
RFID-enabled supply chains / security & privacy / dummy tags / attacker detection scheme / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 115, no. 123, CS2015-17, pp. 45-50, July 2015. |
Paper # |
CS2015-17 |
Date of Issue |
2015-06-25 (CS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Notes on Review |
This article is a technical report without peer review, and its polished version will be published elsewhere. |
Download PDF |
CS2015-17 |
Conference Information |
Committee |
CS |
Conference Date |
2015-07-02 - 2015-07-03 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Eef Information Plaza (Kumejima Is.) |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Next generation networks, access network, broadband access system, power-line communications, wireless communication systems, coding system, etc. |
Paper Information |
Registration To |
CS |
Conference Code |
2015-07-CS |
Language |
English (Japanese title is available) |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Illegal Interrogation Detectable Products Distribution Scheme in RFID-enabled Supply Chains |
Sub Title (in English) |
|
Keyword(1) |
RFID-enabled supply chains |
Keyword(2) |
security & privacy |
Keyword(3) |
dummy tags |
Keyword(4) |
attacker detection scheme |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Kentaroh Toyoda |
1st Author's Affiliation |
Keio University (Keio Univ.) |
2nd Author's Name |
Iwao Sasase |
2nd Author's Affiliation |
Keio University (Keio Univ.) |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2015-07-02 13:50:00 |
Presentation Time |
25 minutes |
Registration for |
CS |
Paper # |
CS2015-17 |
Volume (vol) |
vol.115 |
Number (no) |
no.123 |
Page |
pp.45-50 |
#Pages |
6 |
Date of Issue |
2015-06-25 (CS) |
|