To read this content please select one of the options below:

The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain

Bing-Chang Chen (Department of Information and Communication, Southern Taiwan University of Science and Technology, Tainan, Taiwan)
Her-Tyan Yeh (Department of Information and Communication, Southern Taiwan University of Science and Technology, Tainan, Taiwan)
Che-Chiang Wang (Department of Information and Communication, Southern Taiwan University of Science and Technology, Tainan, Taiwan)

Engineering Computations

ISSN: 0264-4401

Article publication date: 1 August 2016

238

Abstract

Purpose

The purpose of this paper is to complete the following works: construct RFID integration mechanism in the supply chain; build mutual authentication mechanism; and build the transfer mechanism in supply chain.

Design/methodology/approach

In order to transfer RFID tag information to others safely in mobile RFID supply chain circumstances, the authors propose a RFID authentication mechanism which can ensure the identity and make the mutual authentication. Moreover, the authors propose a secure transfer method of ownership for the specific role in different regions under the structure of Mobile RFID.

Findings

The task of administrator server is to check the order, store the merchandise information, distribute the authority, certify the security and transfer the ownership. It can make the whole supply chain more mobility, and transfer faster.

Originality/value

The goals of this research are to achieve mainly: using mobile RFID system to design secure mutual authentication mechanism, transfer mechanisms with faster transfer and authority distribution. The authors introduce the security authentication and competence transfer mechanism in supply chain.

Keywords

Citation

Chen, B.-C., Yeh, H.-T. and Wang, C.-C. (2016), "The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain", Engineering Computations, Vol. 33 No. 6, pp. 1825-1834. https://doi.org/10.1108/EC-08-2015-0252

Publisher

:

Emerald Group Publishing Limited

Copyright © 2016, Emerald Group Publishing Limited

Related articles