Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 3
Page No. 722 - 733

Context-Aware Security Policies: Model for Anti-Counterfeiting in RFID-Enabled Supply Chain Management (SCM)

Authors : Irene Anastasia Patric and Manmeet Mahinderjit Singh

Abstract: Radio Frequency Identification (RFID) applications bring a lot of benefits in Supply Chain Management (SCM). However, RFID still faces several challenges and issues while implementing and evaluating in Supply Chain Management technologies. Due to security concerns, the SCM data are exposed to active and passive attacks that lead to counterfeiting attacks: fraud and cloned attacks. For an organization data most treasured assets, information sharing between different companies become an issue. This is because different organizations have different role and responsibilities in data management and security policies in their environment. We propose testing and evaluating techniques for access control model policies. Based on findings, we have chosen Role Base Access Control (RBAC) most suitable candidate for an access control model. Furthermore, we have implemented RBAC and Event Condition Action (ECA) to context-aware security policy based RFID SCM in order to tackle counterfeiting attacks. The findings suggest the generation of five main security policies model in thwarting counterfeiting for any RFID-enabled supply chain.

How to cite this article:

Irene Anastasia Patric and Manmeet Mahinderjit Singh, 2017. Context-Aware Security Policies: Model for Anti-Counterfeiting in RFID-Enabled Supply Chain Management (SCM). Journal of Engineering and Applied Sciences, 12: 722-733.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved