Secure RFID-Enablement in Modern Companies: A Case Study of the Pharmaceutical Industry

Secure RFID-Enablement in Modern Companies: A Case Study of the Pharmaceutical Industry

Matthieu-P. Schapranow, Jürgen Müller, Alexander Zeier, Hasso Plattner
DOI: 10.4018/978-1-4666-0294-6.ch022
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Current RFID implementations suffer from security threats and privacy issues since the technology was not designed for secured data exchange. In emerging global RFID-aided supply chains, the need for open interfaces between supply chain partners exposes business secrets. A case study focusing on the development of detected counterfeits in the pharmaceutical industries in Europe and in the United States of America motivates the rising importance for RFID security. A formal model for describing RFID-aided supply chains is introduced to analyze flow of messages and data. Countermeasure tasks for all involved supply chain participants are defined to harden the integrity of the global supply chain. Motivated by concerns of exposing data via the air interface, two mutual authentication protocols are presented that aim to keep tag production costs low. Their applicability in context of the pharmaceutical industry is discussed.
Chapter Preview
Top

Introduction

In a two month period, more than 34 million tablets were seized, including fake antibiotics, anti-cancer, anti-malaria and anti-cholesterol medicines, painkillers and erectile dysfunction medication. (Intellectual Property Crime Report 2008/ 2009) (IP Crime Group, 2009)

The quote above reflects the tremendous number of pharmaceutical counterfeits detected at borders of the European Union. With rising efforts toward globalization in the pharmaceutical industry, trust between supply chain participants becomes increasingly fragile. In order to protect human beings from being harmed by improper doses, poisoning or missing ingredients in pharmaceuticals, security threats have to be understood to design RFID innovations for protection of goods. Figure 1 depicts a possible RFID architecture modeled using the Fundamental Modeling Concepts (FMC) (Knöpfel, Groene, & Tabeling, 2006). It enables RFID-aided supply chains by incorporating a discovery service and a dedicated service provider performing authentication checks (Schapranow M.-P., Müller, Zeier, & Plattner, RFID Event Data Processing: An Architecture for Storing and Searching, 2010). We value customer privacy as a primary influencer for the acceptance of RFID technology, e.g. concerns about customer profiles which can be derived by tracking goods and customers (Garfinkel, Juels, & Pappu, 2005).

Figure 1.

Interaction of RFID Information Systems

978-1-4666-0294-6.ch022.f01

In this chapter, we want to increase the reader’s overall understanding of security threads in RFID-aided supply chains and present possible countermeasures and its costs. To this end, we discuss

  • A case study for the global pharmaceutical supply chain,

  • Security threats in RFID-aided supply chains,

  • Modeling techniques for supply chains to elaborate security tasks for all supply chain participants, and

  • Authentication protocols based on the use of cost-efficient, passive tags for designing integer supply chain systems.

Top

Case Study: Counterfeits In The Pharmaceutical Supply Chain

RFID technology is nowadays named to be the successor of existing tracking techniques such as scanning of one-dimensional barcodes (White, Prabhakar, Abdrazak, & Gardiner, 2007). Making use of RFID tags results in various advantages. Tags can be read without establishing a direct line of sight, multiple tags can be read simultaneously, and they can cope with dirty environments. The logistics sector is one of the first implementers to guarantee traceability of fast-moving goods, such as life-saving pharmaceuticals, blood preservations, or organ donations. Tracking goods is an important factor for participants in global supply chains, i.e. RFID technology helps to keep goods moving on the road instead of keeping them in costly stocks (Schlitter, Kähne, Schilz, & Mattke, 2007). Compared to existing semi-automatic solution, e.g. scanning of barcodes, the implementation of RFID technology reduces time to process incoming and outgoing goods at all involved intermediate stations by enabling automatically product identification (Bovenschulte, Gabriel, Gaßner, & Seidel, 2007).

Complete Chapter List

Search this Book:
Reset