Abstract
In inter-organizational supply chains, sharing of distributed, item-related information gathered using RFID can enable novel applications. Access control (AC) is needed to selectively disclose information to authorized participants. Given the large amount of data and the number of participants, common AC approaches would require extensive manual efforts. These efforts can be reduced significantly by the ability to prove physical possession of items to other companies. We examine how such Proofs of Possession can be designed. Based on two promising approaches, we introduce the concept of a Possession Service that may become a key factor in addressing the AC challenges in future supply chains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bose, I., Pal, R.: Auto-ID: managing anything, anywhere, anytime in the supply chain. Commun. ACM 48(8), 100–106 (2005)
Delen, D., Hardgrave, B.C., Sharda, R.: RFID for Better Supply-Chain Management through Enhanced Information Visibility. Productions and Operations Management Journal (2007)
Fleisch, E., Mattern, F. (eds.): Das Internet der Dinge: Ubiquitous Computing und RFID in der Praxis, June 2005. Springer, Heidelberg (2005)
Grummt, E., Müller, M., Ackermann, R.: Access Control: Challenges and Approaches in the Internet of Things. In: Proceedings of the IADIS International Conference WWW/Internet 2007, Vila Real, Portuga, October 2007, vol. 2, pp. 89–93. IADIS Press (2007)
Harrison, M., Moran, H., Brusey, J., McFarlane, D.: PML Server Developments. In: White paper, Auto-ID Centre, University of Cambridge, Mill Lane, Cambridge, CB2 1RX, United Kingdom (June 2003)
Ilic, A., Michahelles, F., Fleisch, E.: The Dual Ownership Model: Using Organizational Relationships for Access Control in Safety Supply Chains. In: Advanced Information Networking and Applications Workshops (AINAW 2007), Niagara Falls, Ontario, Canada, May 2007, vol. 2, pp. 459–466 (2007)
Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communication 24(2), 381–394 (2006)
Pearson, J.: Securing the Pharmaceutical Supply Chain with RFID and Public-key infrastructure (PKI) Technologies. White Paper RFIDPH01. Texas Instruments Radio Frequency Identification Systems (June 2005)
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.: RFID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159–170. Springer, Heidelberg (2006)
Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. IEEE Pervasive Computing 5(1), 62–69 (2006)
Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network – The Potential of RFID in Anti-Counterfeiting. In: SAC 2005, pp. 1607–1612. ACM Press, New York (2005)
Traub, K., Allgair, G., Barthel, H., Burstein, L., Garrett, J., Hogan, B., Rodrigues, B., Sarma, S., Schmidt, J., Schramek, C., Stewart, R., Suen, K.: The EPCglobal Architecture Framework – EPCglobal Final Version of (July 1, 2005), http://www.epcglobalinc.org/standards/Final-epcglobal-arch-20050701.pdf
Wamba, S.F., Lefebvre, L.A., Lefebvre, E.: Enabling Intelligent B-to-B eCommerce Supply Chain Management Using RFID and the EPC Network: A Case Study in the Retail Industry. In: ICEC 2006, pp. 281–288. ACM Press, New York (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grummt, E., Ackermann, R. (2008). Proof of Possession: Using RFID for Large-Scale Authorization Management . In: Mühlhäuser, M., Ferscha, A., Aitenbichler, E. (eds) Constructing Ambient Intelligence. AmI 2007. Communications in Computer and Information Science, vol 11. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85379-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-85379-4_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85378-7
Online ISBN: 978-3-540-85379-4
eBook Packages: Computer ScienceComputer Science (R0)