A Systematic Security Analysis for Path-based Traceability Systems in RFID-Enabled Supply Chains
By: Fokke Heikamp , Lei Pan , Robin Doss and more
Potential Business Impact:
Finds fake products hidden in supply chains.
Traceability systems have become prevalent in supply chains because of the rapid development of RFID and IoT technologies. These systems facilitate product recall and mitigate problems such as counterfeiting, tampering, and theft by tracking the manufacturing and distribution life-cycle of a product. Therefore, traceability systems are a defense mechanism against supply chain attacks and, consequently, have become a target for attackers to circumvent. For example, a counterfeiter may change the trace of a fake product for the trace of an authentic product, fooling the system into accepting a counterfeit product as legit and thereby giving a false sense of security. This systematic analysis starts with the observation that security requirements in existing traceability solutions are often unstructured or incomplete, leaving critical vulnerabilities unaddressed. We synthesized the properties of current state-of-the-art traceability solutions within a single security framework that allows us to analyze and compare their security claims. Using this framework, we objectively compared the security of $17$ traceability solutions and identified several weaknesses and vulnerabilities. This article reports on these flaws, the methodology we used to identify them, and the first security evaluation of traceability solutions on a large scale.
Similar Papers
Formation of requirements traceability in the process of information systems design
Software Engineering
Helps build computer programs more easily.
Smartphone-Based Food Traceability System Using NoSQL Database
Other Computer Science
Tracks food with phones to keep it safe.
The system of processing and analysis of customer tracking data for customer journey research on the base of RFID technology
Databases
Tracks shoppers to improve store sales.