Background: - PowerPoint PPT Presentation

About This Presentation
Title:

Background:

Description:

Secure Tag-to-Reader Authentication Protocol for RFID-enabled Supply Chains Findings & Achievements: Design secure tag-to-reader authentication protocols compatible ... – PowerPoint PPT presentation

Number of Views:25
Avg rating:3.0/5.0
Slides: 2
Provided by: mysmuEduf
Category:
Tags: background | pdms

less

Transcript and Presenter's Notes

Title: Background:


1
Secure Tag-to-Reader Authentication Protocol for
RFID-enabled Supply Chains
  • Findings Achievements
  • Design secure tag-to-reader authentication
    protocols compatible with EPCglobal standard
  • Strengthen security and privacy of EPC RFID
    tags, systems and EPCglobal network
  • Design and develop an industry-targeted system
    prototype
  • Potential Impacts and Industry Applications
  • Next generation security standard for EPCglobal
    Network
  • Secure and real-time tracking for supply chain
    partners
  • Wide variety of industries inventory
    management, supply chain management,
    anti-counterfeiting, asset management, etc.
  • Background
  • Currently, few security mechanisms have been
    developed in EPCglobal Network to ensure that the
    tracking services are confidential, verifiable,
    and accountable in the presence of realistic and
    malicious attacks coming from corrupted supply
    chain partners. We propose to fundamentally
    strengthen the design of EPCglobal Network such
    that it can provide provably secure tracking
    services in the presence of a wide variety of
    attacks.
  • Objective
  • Build a unified security framework for EPCglobal
    Network services to extend the current EPCglobal
    Network standards to incorporate security
    features in a formal, flexible, and systematic
    manner.
  • Provide a wide range of secure tracking
    techniques under our security framework for
    practical usage and to demonstrate the
    feasibility, performance, and value of our
    proposed techniques

Methodology A methodology of literature review,
analysis and prototyping approach is adopted in
the RD project. Literature review and analysis
is for understanding the state-of-art for
technology and solution design development. The
proof-of-concept developed is intended to demo
the fundamental security techniques and to target
specific industry applications.
Security Services in EPCglobal-enabled Supply
Chains
Team Leaders Dr. Tieyan Li (I2R) Dr. Kevin Chiew
(I2R/SMU) Asst/P Yingjiu Li (SMU) Mr. Wei He
(SIMTech)
For enquiries, please contact Dr. Tieyan Li,
Principal Investigator Cryptography and Security
Department Tel 65 6408 2038 Email
litieyan_at_i2r.a-star.edu.sg
Project Partners SMU SIMTech
Write a Comment
User Comments (0)
About PowerShow.com