Addressing Covert Channel Attacks in RFID-Enabled Supply Chains

Addressing Covert Channel Attacks in RFID-Enabled Supply Chains

Kirti Chawla, Gabriel Robins
Copyright: © 2013 |Pages: 15
DOI: 10.4018/978-1-4666-3685-9.ch011
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

RFID technology can help competitive organizations optimize their supply chains. However, it may also enable adversaries to exploit covert channels to surreptitiously spy on their competitors. We explain how tracking tags and compromising readers can create covert channels in supply chains and cause detrimental economic effects. To mitigate such attacks, the authors propose a framework that enables an organization to monitor its supply chain. The supply chain is modeled as a network flow graph, where tag flow is verified at selected key nodes, and covert channels are actively sought. While optimal taint checkpoint node selection is algorithmically intractable, the authors propose node selection and flow verification heuristics with various tradeoffs. The chapter discusses economically viable countermeasures against supply chain-based covert channels, and suggests future research directions.
Chapter Preview
Top

11.3 Threats In Rfid-Enabled Supply Chains

To analyze potential threats to RFID-enabled supply chains, we present a threat model and focus on four possible supply chain attacks.

Complete Chapter List

Search this Book:
Reset