Date Added: Jul 2009
This paper presents an application of RFIDs for supply-chain management. In the application, it considers two types of readers. On one part, one has readers that will mark tags at given points. After that, these tags can be checked by another type of readers to tell whether a tag has followed the correct path in the chain. The paper formalizes this notion and defines adequate adversaries. Moreover, the paper derives requirements in order to meet security against counterfeiting, cloning, impersonation and denial of service attacks.