
A New Privacy-preserving Path Authentication Scheme using RFID for Supply Chain Management
Author(s) -
Y. Lee,
Yuanchao Park
Publication year - 2013
Publication title -
advances in electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.254
H-Index - 23
eISSN - 1844-7600
pISSN - 1582-7445
DOI - 10.4316/aece.2013.01004
Subject(s) - scheme (mathematics) , authentication (law) , computer science , path (computing) , computer security , computer network , supply chain management , privacy protection , supply chain , business , mathematics , mathematical analysis , marketing
This paper presents a privacy-preserving path-authentication method for supply chain management using RFID. Compared with previous works, our scheme employs only symmetric encryption and message authentication codes. This reduces computation and communication overhead. The proposed method also supports high-level privacy without the need for tamper-proof tags as compared with the previous methods. Performance analysis demonstrates that the proposed scheme requires far less computation resource than recent works, proving that less than 1 minute is enough to verify 1 RFIDs in a conventional reader environment