DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems

Saiyu Qi*, Yuanqing Zheng, Yue Li, Xiaofeng Chen, Jianfeng Ma, Dongyi Yang, Yong Qi

*Corresponding author for this work

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

In this article, we propose Double Edged (DE)-Sword, an incentivized verifiable tag path query scheme. DE-Sword queries tag records stored across a path of participants within an RFID-enabled supply chain in a verifiable way. Different with previous works, DE-Sword works in a dishonest-data owner model in which participants are the owners of tag records and may be dishonest. DE-Sword introduces a novel double-edged reputation incentive mechanism to encourage participants to behave honestly; and couples it with cryptographic primitives to ensure query verifiability. We evaluate DE-Sword through game theory, security analysis, and performance evaluation. The game theory and security analysis shows that DE-Sword guarantees query verifiability. The evaluation results show that DE-Sword incurs low overhead in supply chain systems.

Original languageEnglish
Pages (from-to)2122-2137
Number of pages16
JournalIEEE Transactions on Dependable and Secure Computing
Volume19
Issue number3
Early online date30 Dec 2020
DOIs
Publication statusPublished - 1 Jun 2022

Bibliographical note

Publisher Copyright:
© 2004-2012 IEEE.

Keywords

  • Product traceability
  • RFID
  • Supply chain
  • Verifiable tag path query

Fingerprint

Dive into the research topics of 'DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems'. Together they form a unique fingerprint.

Cite this