Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/105552
| Title: | DE-Sword : incentivized verifiable tag path query in RFID-enabled supply chain systems | Authors: | Qi, S Zheng, Y Li, Y Chen, X Ma, J Yang, D Qi, Y |
Issue Date: | May-2022 | Source: | IEEE transactions on dependable and secure computing, May-June 2022, v. 19, no. 3, p. 2122-2137 | Abstract: | In this article, we propose Double Edged (DE)-Sword, an incentivized verifiable tag path query scheme. DE-Sword queries tag records stored across a path of participants within an RFID-enabled supply chain in a verifiable way. Different with previous works, DE-Sword works in a dishonest-data owner model in which participants are the owners of tag records and may be dishonest. DE-Sword introduces a novel double-edged reputation incentive mechanism to encourage participants to behave honestly; and couples it with cryptographic primitives to ensure query verifiability. We evaluate DE-Sword through game theory, security analysis, and performance evaluation. The game theory and security analysis shows that DE-Sword guarantees query verifiability. The evaluation results show that DE-Sword incurs low overhead in supply chain systems. | Keywords: | Product traceability RFID Supply chain Verifiable tag path query |
Publisher: | Institute of Electrical and Electronics Engineers | Journal: | IEEE transactions on dependable and secure computing | ISSN: | 1545-5971 | EISSN: | 1941-0018 | DOI: | 10.1109/TDSC.2020.3048159 | Rights: | ©2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The following publication S. Qi et al., "DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 2122-2137, 1 May-June 2022 is available at https://doi.org/10.1109/TDSC.2020.3048159. |
| Appears in Collections: | Journal/Magazine Article |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Zheng_De-Sword_Incentivized_Verifiable.pdf | Pre-Published version | 4.53 MB | Adobe PDF | View/Open |
Page views
98
Last Week
2
2
Last month
Citations as of Apr 12, 2026
Downloads
101
Citations as of Apr 12, 2026
SCOPUSTM
Citations
3
Citations as of May 8, 2026
WEB OF SCIENCETM
Citations
3
Citations as of Apr 23, 2026
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



