DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems

  • Saiyu Qi
  • , Yuanqing Zheng
  • , Yue Li
  • , Xiaofeng Chen
  • , Jianfeng Ma
  • , Dongyi Yang
  • , Yong Qi

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

In this article, we propose Double Edged (DE)-Sword, an incentivized verifiable tag path query scheme. DE-Sword queries tag records stored across a path of participants within an RFID-enabled supply chain in a verifiable way. Different with previous works, DE-Sword works in a dishonest-data owner model in which participants are the owners of tag records and may be dishonest. DE-Sword introduces a novel double-edged reputation incentive mechanism to encourage participants to behave honestly; and couples it with cryptographic primitives to ensure query verifiability. We evaluate DE-Sword through game theory, security analysis, and performance evaluation. The game theory and security analysis shows that DE-Sword guarantees query verifiability. The evaluation results show that DE-Sword incurs low overhead in supply chain systems.

Original languageEnglish
Pages (from-to)2122-2137
Number of pages16
JournalIEEE Transactions on Dependable and Secure Computing
Volume19
Issue number3
DOIs
StatePublished - 2022
Externally publishedYes

Keywords

  • Product traceability
  • RFID
  • Supply chain
  • Verifiable tag path query

Fingerprint

Dive into the research topics of 'DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems'. Together they form a unique fingerprint.

Cite this