Visible to the public RFID Security, Verification, and Blockchain: Vulnerabilities within the Supply Chain for Food SecurityConflict Detection Enabled

TitleRFID Security, Verification, and Blockchain: Vulnerabilities within the Supply Chain for Food Security
Publication TypeConference Paper
Year of Publication2018
AuthorsHilt, Michael, Shao, Daniel, Yang, Baijian
Conference NameProceedings of the 19th Annual SIG Conference on Information Technology Education
PublisherAssociation for Computing Machinery
Conference LocationFort Lauderdale, Florida, USA
ISBN Number9781450359542
Keywordsagri-food, blockchain, food security, mobile vulnerability, radio frequency identification, RFID, supply chain
AbstractOver the past few decades, radio frequency identification (RFID) technology has been an important factor in securing products along the agri-food supply chain. However, there still exist security vulnerabilities when registering products to a specific RFID tag, particularly regarding the ease at which tags can be cloned. In this paper, a potential attack, labeled the "Hilt Shao attack", is identified which could occur during the initial phases of product registration, and demonstrate the type of attack using UID and CUID tags. Furthermore, a system is proposed using blockchain technology in order for the attacker to hide the cloned tag information. Results show that this attack, if carried out, can negate the profits of distributors along the supply chain, and negatively affect the consumer.
URLhttps://doi.org/10.1145/3241815.3241838
DOI10.1145/3241815.3241838
Citation Key10.1145/3241815.3241838