Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105552
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorQi, S-
dc.creatorZheng, Y-
dc.creatorLi, Y-
dc.creatorChen, X-
dc.creatorMa, J-
dc.creatorYang, D-
dc.creatorQi, Y-
dc.date.accessioned2024-04-15T07:35:00Z-
dc.date.available2024-04-15T07:35:00Z-
dc.identifier.issn1545-5971-
dc.identifier.urihttp://hdl.handle.net/10397/105552-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights©2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsThe following publication S. Qi et al., "DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 2122-2137, 1 May-June 2022 is available at https://doi.org/10.1109/TDSC.2020.3048159.en_US
dc.subjectProduct traceabilityen_US
dc.subjectRFIDen_US
dc.subjectSupply chainen_US
dc.subjectVerifiable tag path queryen_US
dc.titleDE-Sword : incentivized verifiable tag path query in RFID-enabled supply chain systemsen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage2122-
dc.identifier.epage2137-
dc.identifier.volume19-
dc.identifier.issue3-
dc.identifier.doi10.1109/TDSC.2020.3048159-
dcterms.abstractIn this article, we propose Double Edged (DE)-Sword, an incentivized verifiable tag path query scheme. DE-Sword queries tag records stored across a path of participants within an RFID-enabled supply chain in a verifiable way. Different with previous works, DE-Sword works in a dishonest-data owner model in which participants are the owners of tag records and may be dishonest. DE-Sword introduces a novel double-edged reputation incentive mechanism to encourage participants to behave honestly; and couples it with cryptographic primitives to ensure query verifiability. We evaluate DE-Sword through game theory, security analysis, and performance evaluation. The game theory and security analysis shows that DE-Sword guarantees query verifiability. The evaluation results show that DE-Sword incurs low overhead in supply chain systems.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIEEE transactions on dependable and secure computing, May-June 2022, v. 19, no. 3, p. 2122-2137-
dcterms.isPartOfIEEE transactions on dependable and secure computing-
dcterms.issued2022-05-
dc.identifier.scopus2-s2.0-85099093332-
dc.identifier.eissn1941-0018-
dc.description.validate202402 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberCOMP-0434en_US
dc.description.fundingSourceRGCen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS50206083en_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Zheng_De-Sword_Incentivized_Verifiable.pdfPre-Published version4.53 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

11
Citations as of Jul 7, 2024

Downloads

2
Citations as of Jul 7, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.