Abstract

Trust management in an open RFID system environment is a nontrivial problem, where different organizations have different business workflows and operate on different standards and protocols. Open RFID systems can only be effective if the systems can trust each other and be collaborative. The open system environment is also constantly evolving. So the trust and the collaborations need to be constantly maintained to cope with changes. RFID is becoming a ubiquitous computing technology imposing security and privacy threats. Counterfeiting in supply chain management is an attack with cloned and fraud RFID tags in order to gain illegal benefits. In this paper we will extend our previous work on a trust framework and construct a computational model for the trust management. The trust evaluation is built into the process of transactions of the data exchange and authorization in order to facilitate a better data sharing and access control. An example of wine counterfeiting will be presented and we will show how our computational trust model helps in reducing fraud brand of wines in supply chain management (SCM).

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.