Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/105552
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Qi, S | - |
dc.creator | Zheng, Y | - |
dc.creator | Li, Y | - |
dc.creator | Chen, X | - |
dc.creator | Ma, J | - |
dc.creator | Yang, D | - |
dc.creator | Qi, Y | - |
dc.date.accessioned | 2024-04-15T07:35:00Z | - |
dc.date.available | 2024-04-15T07:35:00Z | - |
dc.identifier.issn | 1545-5971 | - |
dc.identifier.uri | http://hdl.handle.net/10397/105552 | - |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers | en_US |
dc.rights | ©2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en_US |
dc.rights | The following publication S. Qi et al., "DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 3, pp. 2122-2137, 1 May-June 2022 is available at https://doi.org/10.1109/TDSC.2020.3048159. | en_US |
dc.subject | Product traceability | en_US |
dc.subject | RFID | en_US |
dc.subject | Supply chain | en_US |
dc.subject | Verifiable tag path query | en_US |
dc.title | DE-Sword : incentivized verifiable tag path query in RFID-enabled supply chain systems | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.spage | 2122 | - |
dc.identifier.epage | 2137 | - |
dc.identifier.volume | 19 | - |
dc.identifier.issue | 3 | - |
dc.identifier.doi | 10.1109/TDSC.2020.3048159 | - |
dcterms.abstract | In this article, we propose Double Edged (DE)-Sword, an incentivized verifiable tag path query scheme. DE-Sword queries tag records stored across a path of participants within an RFID-enabled supply chain in a verifiable way. Different with previous works, DE-Sword works in a dishonest-data owner model in which participants are the owners of tag records and may be dishonest. DE-Sword introduces a novel double-edged reputation incentive mechanism to encourage participants to behave honestly; and couples it with cryptographic primitives to ensure query verifiability. We evaluate DE-Sword through game theory, security analysis, and performance evaluation. The game theory and security analysis shows that DE-Sword guarantees query verifiability. The evaluation results show that DE-Sword incurs low overhead in supply chain systems. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | IEEE transactions on dependable and secure computing, May-June 2022, v. 19, no. 3, p. 2122-2137 | - |
dcterms.isPartOf | IEEE transactions on dependable and secure computing | - |
dcterms.issued | 2022-05 | - |
dc.identifier.scopus | 2-s2.0-85099093332 | - |
dc.identifier.eissn | 1941-0018 | - |
dc.description.validate | 202402 bcch | - |
dc.description.oa | Accepted Manuscript | en_US |
dc.identifier.FolderNumber | COMP-0434 | en_US |
dc.description.fundingSource | RGC | en_US |
dc.description.pubStatus | Published | en_US |
dc.identifier.OPUS | 50206083 | en_US |
dc.description.oaCategory | Green (AAM) | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Zheng_De-Sword_Incentivized_Verifiable.pdf | Pre-Published version | 4.53 MB | Adobe PDF | View/Open |
Page views
11
Citations as of Jul 7, 2024
Downloads
2
Citations as of Jul 7, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.