DocumentCode :
661664
Title :
Attack and defense mechanisms of malicious EPC event injection in EPC discovery service
Author :
Su Mon Kywe ; Yingjiu Li ; Jie Shi
Author_Institution :
Sch. of Inf. Syst., Singapore Manage. Univ., Singapore, Singapore
fYear :
2013
fDate :
4-5 Sept. 2013
Firstpage :
1
Lastpage :
6
Abstract :
A supply chain usually involves collaboration among multi-national companies and it is well-known that information sharing is a critical success factor in supply chain management. Electronic Product Code Discovery Service (EPCDS) is a newly proposed concept which allows supply chain companies to search for their unknown partners globally and share information efficiently. As EPCDS contains critical business information about partnership relationship and product movement, access control systems are integrated into EPCDS for privacy protection. Although currently proposed access control systems include authentication and authorization of supply chain companies, they do not consider authentication of business information published by the companies. This vulnerability enables malicious EPC event injection attack, where forged business information are registered to EPCDS by malicious parties. With such exploitation, adversaries can impersonate as legitimate supply chain partners, bypass the access control systems of EPCDS and get access to previously unauthorized information. To the best of our knowledge, our paper is the first to discover the possibility of such attack in EPCDS. Our paper discusses threat model and different types of adversaries for the attack. We then present general defense mechanisms and define the security requirements of preventive measures. We also propose a new prevention mechanism, where pseudo-random numbers are generated by EPC tags and serves as authentication tokens for registering EPC events. Moreover, our paper analyzes how existing solutions, such as tailing, can be modified to detect malicious EPC event injection in EPCDS.
Keywords :
authorisation; business data processing; message authentication; random number generation; supply chains; EPCDS; Electronic Product Code Discovery Service; access control systems; attack mechanism; authentication tokens; business information authentication; business information authorization; defense mechanism; information sharing; malicious EPC event injection; partnership relationship; preventive measures; product movement; pseudorandom numbers; security requirements; supply chain companies; Companies; Cryptography; Irrigation; Mechanical variables measurement; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
RFID-Technologies and Applications (RFID-TA), 2013 IEEE International Conference on
Conference_Location :
Johor Bahru
Electronic_ISBN :
978-1-4799-2114-0
Type :
conf
DOI :
10.1109/RFID-TA.2013.6694532
Filename :
6694532
Link To Document :
بازگشت