files/journal/2022-09-02_12-54-44-000000_354.png

Journal of Engineering and Applied Sciences

ISSN: Online 1818-7803
ISSN: Print 1816-949x
100
Views
1
Downloads

Context-Aware Security Policies: Model for Anti-Counterfeiting in RFID-Enabled Supply Chain Management (SCM)

Irene Anastasia Patric and Manmeet Mahinderjit Singh
Page: 722-733 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Radio Frequency Identification (RFID) applications bring a lot of benefits in Supply Chain Management (SCM). However, RFID still faces several challenges and issues while implementing and evaluating in Supply Chain Management technologies. Due to security concerns, the SCM data are exposed to active and passive attacks that lead to counterfeiting attacks: fraud and cloned attacks. For an organization data most treasured assets, information sharing between different companies become an issue. This is because different organizations have different role and responsibilities in data management and security policies in their environment. We propose testing and evaluating techniques for access control model policies. Based on findings, we have chosen Role Base Access Control (RBAC) most suitable candidate for an access control model. Furthermore, we have implemented RBAC and Event Condition Action (ECA) to context-aware security policy based RFID SCM in order to tackle counterfeiting attacks. The findings suggest the generation of five main security policies model in thwarting counterfeiting for any RFID-enabled supply chain.


How to cite this article:

Irene Anastasia Patric and Manmeet Mahinderjit Singh. Context-Aware Security Policies: Model for Anti-Counterfeiting in RFID-Enabled Supply Chain Management (SCM).
DOI: https://doi.org/10.36478/jeasci.2017.722.733
URL: https://www.makhillpublications.co/view-article/1816-949x/jeasci.2017.722.733