Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105552
PIRA download icon_1.1View/Download Full Text
Title: DE-Sword : incentivized verifiable tag path query in RFID-enabled supply chain systems
Authors: Qi, S
Zheng, Y 
Li, Y
Chen, X
Ma, J
Yang, D
Qi, Y
Issue Date: May-2022
Source: IEEE transactions on dependable and secure computing, May-June 2022, v. 19, no. 3, p. 2122-2137
Abstract: In this article, we propose Double Edged (DE)-Sword, an incentivized verifiable tag path query scheme. DE-Sword queries tag records stored across a path of participants within an RFID-enabled supply chain in a verifiable way. Different with previous works, DE-Sword works in a dishonest-data owner model in which participants are the owners of tag records and may be dishonest. DE-Sword introduces a novel double-edged reputation incentive mechanism to encourage participants to behave honestly; and couples it with cryptographic primitives to ensure query verifiability. We evaluate DE-Sword through game theory, security analysis, and performance evaluation. The game theory and security analysis shows that DE-Sword guarantees query verifiability. The evaluation results show that DE-Sword incurs low overhead in supply chain systems.
Keywords: Product traceability
RFID
Supply chain
Verifiable tag path query
Publisher: Institute of Electrical and Electronics Engineers
Journal: IEEE transactions on dependable and secure computing 
ISSN: 1545-5971
EISSN: 1941-0018
DOI: 10.1109/TDSC.2020.3048159
Rights: ©2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
The following publication S. Qi et al., "DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 2122-2137, 1 May-June 2022 is available at https://doi.org/10.1109/TDSC.2020.3048159.
Appears in Collections:Journal/Magazine Article

Files in This Item:
File Description SizeFormat 
Zheng_De-Sword_Incentivized_Verifiable.pdfPre-Published version4.53 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show full item record

Page views

13
Citations as of Jun 30, 2024

Downloads

2
Citations as of Jun 30, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.