Download now Free registration required
In a competitive business environment, RFID technology can help a business to optimize its supply chain. However, it may also enable an adversary using covert channels to surreptitiously learn sensitive information about the supply chain of a target business. The authors argue that the tracking of tags and the compromising of readers can create covert channels in the supply chain and cause detrimental market effects. To mitigate such attacks, the authors propose a framework that enables a business to monitor its supply chain in a fine-grained manner.
- Format: PDF
- Size: 347.4 KB