Fig 7 - uploaded by Henry H. Bi
Content may be subject to copyright.
Architecture of the EPCglobal Network (adapted from [29] and [53]).

Architecture of the EPCglobal Network (adapted from [29] and [53]).

Source publication
Article
Full-text available
Many organizations have very limited information about the supply networks in which they are involved. For the purpose of planning business strategies, tracing products, and assuring product quality, organizations are eager to know their entire supply networks, i.e., who are their supplierspsila suppliers and who are their buyerspsila buyers. Howev...

Contexts in source publication

Context 1
... EPCglobal Network comprises EPC, RFID technology, and supporting software. Fig. 7 shows the architecture of the EPCglobal Network that consists of five components [29], [52]. 1) EPC: EPC uniquely identifies each object in motion in supply networks. 2) ID system: The ID system consists of EPC tags and EPC readers (also called RFID readers EPCIS also enables trading partners to exchange EPC- related data, which are ...
Context 2
... tagged object when it passes, and communicate the EPC identification number and the date, time, and location of the read to a local organization's EPCIS [29]. Table IV shows three data that are captured by EPC readers to the EPCglobal Net- work. A location can be the site of a manufacturer, warehouse, distribution center, or end user, as shown in Fig. ...

Citations

... Applications like supply chain require identification and tracking of the moving objects 1 3 traveling from supplier to customer [5]. In these applications, the tracking of the objects helps to optimize certain requirements such as the inventory holding costs, visibility, transit time and forecasting accuracy etc. [6]. Radio Frequency Identification (RFID) can be an aid in this journey, which can be used for sensing and transferring the object information through the Internet till the objects reach the destination [7,8]. ...
... The security analysis of the proposed system and the adversarial model have 1 3 been presented in Sect. 6. The performance analysis of the proposed system is presented in Sect. ...
... Various RFID based object tracking protocols have been identified in [6,15,[18][19][20][21]. In [15] the travel path is verified by a trusted manager only when the object reaches its destination. ...
Article
Full-text available
Internet of Things (IoT) aids in tracking of moving objects attached with Radio Frequency Identification tag. Earlier researchers assume that the owner of the object needs to either be online and actively participating for an update of travel status of a moving object, or rely on a third party to perform this task. If no such third party exists and owner is offline for a certain period, this leads to an inconsistent travel status. On the contrary, involvement of the third party in the update process requires it to be fully trusted, which can lead to privacy threats to the owner. Therefore, the existing works depend either on the unreliable owner device or on the vulnerable third party. This paper performs cryptanalysis on the object tracking protocol proposed by Ray et al. and discovers that this protocol does not allow the owner device to be offline, and it has various security issues. Along with this cryptanalysis, this paper proposes an IoT based object tracking system that depends only on the third party and allows the owner device to be offline. However, the vulnerabilities of this third party have been taken care in such a way that there is no privacy risk for the owner. Unlike the existing systems, this system provides unlinkability, untraceability, resistance against impersonation, information leakage through the communication link, replay, man-in-the-middle attack, desynchronization problem. In our experiment, we modeled the system using High-Level Protocol Specification Language (HLPSL) and simulated HLPSL model using automated security verification tool AVISPA.
... To formally define the NRS, we considered the existing literature, where Fernando et al. [12] and Ranasinghe et al. [13] presented details of the networked RFID systems and their architecture. However, their models have ignored the forward and backward object movement that is a requirement for real implementation of the IoT [1]. The RFID-enabled supply chain network is an example of NRS that requires forward and backward movement. ...
... Most of the existing tracking protocol in the literature aims to increase visibility of a specific NRS (such as supply chain) using tracking and tracing along the network. The article from Bi and Lin [1] in 2009 was groundbreaking in this domain. Their work first identified the importance of finding the object along the path in a supply chain network. ...
... By doing so, they wanted to track and trace the object to minimize inventory holding costs, improve forecasting accuracy, formulate strategies and reduce transit time. To achieve this, Bi and Lin [1] proposed a supply chain network discovery model by collecting data from an RFID system. They presented a framework to map the collected data with business data to visualize supply networks at the organizational level, and internal and geographical levels (e.g., warehouses, distribution centers, and stores) with a focus on one or multiple types of products. ...
Article
Full-text available
In this paper, we propose a secure object tracking protocol to ensure the visibility and traceability of an object along the travel path to support the Internet of Things (IoT). The proposed protocol is based on radio frequency identification system for global unique identification of IoT objects. For ensuring secure object tracking, lightweight cryptographic primitives and physically unclonable function are used by the proposed protocol in tags. We evaluated the proposed protocol both quantitatively and qualitatively. In our experiment, we modeled the protocol using security protocol description language (SPDL) and simulated SPDL model using automated claim verification tool Scyther. The results show that the proposed protocol is more secure and requires less computation compared to existing similar protocols.
... Radio-frequency identification (RFID) is among one of the supporting technologies for IoT. It has been using in various applications from asset tracking to supply chain management [3][4][5][6] and automatic tracking of the encoded data. Due to its numerous advantages over previous technologies like barcode, it has become a point of interest for researchers. ...
... This trendency motivates the demand for precise localization. Indoor passive localization awareness plays a crucial role in many fields such as life-saving, asset tracking, environmental monitoring and privacy security [1][2][3]. However, locating the target in indoor multipath environment is still quite challenging. ...
... Then we calculate the corresponding messages on factor graph from the top to the bottom. Firstly, the messages from 1 θ to 1,i  are given by 1 1, ...
... The position of the receiver is1 θ Since the deterministic MPCs may be sheltered by obstacles and the clutters may exist in indoor scenario, we cannot associate each ranging measurement {} ...
Article
Full-text available
Passive wireless devices have increasing civilian and military applications, especially in the scenario with wearable devices and Internet of Things. In this paper, we study indoor localization of a target equipped with radio-frequency identification (RFID) device in ultra-wideband (UWB) wireless networks. With known room layout, deterministic multipath components, including the line-of-sight (LOS) signal and the reflected signals via multipath propagation, are employed to locate the target with one transmitter and a single inaccurate receiver. A factor graph corresponding to the joint posterior position distribution of target and receiver is constructed. However, due to the mixed distribution in the factor node of likelihood function, the expressions of messages are intractable by directly applying belief propagation on factor graph. To this end, we approximate the messages by Gaussian distribution via minimizing the Kullback-Leibler divergence (KLD) between them. Accordingly, a parametric message passing algorithm for indoor passive localization is derived, in which only the means and variances of Gaussian distributions have to be updated. Performance of the proposed algorithm and the impact of critical parameters are evaluated by Monte Carlo simulations, which demonstrate the superior performance in localization accuracy and the robustness to the statistics of multipath channels.
... The Networked RFID System (NRS) makes it possible to perform object identification between widely distributed partners [6]. A collection of NRSs (such as a supply chain, a health care management system, a smart home and so on) require working collaboratively to achieve global object identification for IoT [1,2,3,4]. ...
... Most of the existing tracking protocol aims to increase visibility of an object in a specific NRS (such as supply chain) using tracking and tracing along the network. The work of Bi and Lin [6] identified the importance of finding the object along the path for tracking and tracing to minimize inventory holding costs, improve forecasting accuracy, formulate strategies and reduce transit time in supply chain. However, in the protocol [6], while tracking and tracing the object, the partner's data was collected in an insecure mode. ...
... The work of Bi and Lin [6] identified the importance of finding the object along the path for tracking and tracing to minimize inventory holding costs, improve forecasting accuracy, formulate strategies and reduce transit time in supply chain. However, in the protocol [6], while tracking and tracing the object, the partner's data was collected in an insecure mode. Quafi and Serge proposed a "path checker" object tracing and tracking protocol [8] that stores state information to the tag and uses key based hash to perform the information exchange between the tag and the reader. ...
... Many researchers have considered the utilization of RFID technology as an alternative tracking and localisation system, particularly for indoor moving object localisation applications. The fundamental idea of this solution is to localise the moving object by using RFID tags as landmarks in the environment [8][9][10][11][12] [17]. This is similar to tracking robots in a dense environment [13][14][15]. ...
... It defines the procedure for collecting, sharing, and accessing dynamic informat ion about the tags attached to items, when they pass througho ut supply networks . From EPCglobal Network components[15], only the middleware placed in the main server of a local RFID network is the component of interest in this work (see Fig. 1). The middlew are manages communicati on and data exchange among the readers in the network and the EPC Information Services (EPC-IS)[10], a public data base of the local network required to get the global visibility of products imposed by EPCglobal Network. ...
Article
Passive RFID systems with several reader stations densely allocated close to each other are susceptible to reader collision problems. They are characterized by reader-to-tag and reader-to-reader interferences. Both degrade the system performance, decreasing the number of tags identified per time unit. Although some proposals have been suggested to avoid/handle these collisions, most of them require extra hardware, do not make an efficient use of the network resources and are not compatible with the current standards and regulations. This paper proposes a centralized and aligned scheduler that optimizes the distribution of network resources (frequencies and time slots) among the readers in the network. Those readers with unidentified tags in their target region will have higher priority for receiving resources. The optimization problem is formulated as a Mixture Integer Programming problem. Results show that the method proposed provides higher network throughput and fairness than the EPCglobal Class-1 Gen-2 standard for dense reader environments. In addition, unlike previous works, the scheduling algorithm presented is compatible with EPCglobal standard and the European regulation, and can be implemented in real RFID systems with fixed and mobile readers.
... products, assets etc.) throughout the supply chain at any point in time. RFID has been reported to give unprecedented visibility to the supply chain (Bi & Lin, 2009;Lee & Özer, 2007). As a result, the business and academic research into RFID applications in supply chain management has proliferated significantly over the last few years (Ngai et al., 2008b). ...
Article
We propose an analytical model that evaluates the information completeness of object tracking systems based on their size, breadth and reading depth. We showcase that the larger size of a system’s configuration does not ensure better completeness; instead, the effect of reading depth is greater. The completeness of tracking information can characterize the visibility of the inspected objects the tracking systems offer. The model may be used for both ex-ante and ex-post evaluations of the visibility of tracking systems versus their deployment cost, considering that the emergence of real-time tracking and sensing technologies will boost the adoption of such systems.
... In this work, we propose a mechanism for automatically obtaining the supply network associated to a specific product using the EPCglobal Network. In [9] the authors proposed a methodology with the same objective but the main difference with the proposal set out in this article is that in [9] the client has to do all the Computers in Industry 61 (2010) [480][481][482][483][484][485][486][487][488][489][490][491][492][493][494][495][496] operations to reconstruct the supply network. That is, initially, it has to obtain the URLs (Uniform Resource Locator) of the information services with information about a specific product, then it has to access the corresponding information services to get the necessary information, and after that it can reconstruct the full supply network. ...
... In this work, we propose a mechanism for automatically obtaining the supply network associated to a specific product using the EPCglobal Network. In [9] the authors proposed a methodology with the same objective but the main difference with the proposal set out in this article is that in [9] the client has to do all the Computers in Industry 61 (2010) [480][481][482][483][484][485][486][487][488][489][490][491][492][493][494][495][496] operations to reconstruct the supply network. That is, initially, it has to obtain the URLs (Uniform Resource Locator) of the information services with information about a specific product, then it has to access the corresponding information services to get the necessary information, and after that it can reconstruct the full supply network. ...
... In this section the mechanism to reconstruct supply networks and its integration within the previously designed DS prototype will be introduced. A concrete example (extracted from [9]) is used to demonstrate how a supply network can be mapped using our methodology. Suppose that a retailer A sells a product that is assembled by a manufacturer B. Every product item and each of its components are given an EPC tag. ...
Article
Suppliers, manufacturers, distributors and retailers are typically interconnected within networks and it is for this reason that the relationships among all of them are represented as supply networks. Having enough information about the supply network in which an organization is involved can be useful in planning strategies or in assuring product quality. In this work, we propose a mechanism for automatically obtaining the supply network associated to a specific product using the EPCglobal Network. This mechanism is integrated within the Discovery Services (DS) component, which is currently being developed. Recently, there have been several proposals for the implementation of the DS based on centralized mechanisms. In this work we are going to develop a DS prototype based on Distributed Hash Tables (DHT) and an access control service to be integrated within the DS prototype. Finally, the mechanism to reconstruct supply networks will be integrated within the DS prototype.
... Angeles [38] looks at the information system requirements for companies that use RFID systems to facilitate efficient supply chain management and the challenges involved in data integration. Bi et al. [39] propose a RFID-based web-enhanced system for identifying and locating suppliers on the supplier network of a company. This helps companies identify their suppliers' supplier and buyers' buyers all the way to the final branch on the supplier network. ...
Article
Radio Frequency Identification (RFID) initially intro-duced during WW-II, has revolutionized the world with its numerous benefits and plethora of implementations in diverse areas ranging from manufacturing to agriculture to healthcare to hotel management. This work reviews the current research in this area with emphasis on applications for supply chain management and to develop a taxonomic framework to classify literature which will enable swift and easy content analysis and also help identify areas for future research.