loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Mehdi Khalfaoui 1 ; Refik Molva 2 and Laurent Gomez 3

Affiliations: 1 SAP Labs france, France ; 2 Eurecom, France ; 3 Sap Labs France, France

ISBN: 978-989-8565-73-0

Keyword(s): Supply Chain, Wireless Sensor Networks, Privacy Preserving, Homomorphic Encryption, Alerts Detection.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Privacy ; Security and Privacy in Location-Based Services

Abstract: Risk management practices, techniques and tools with respect to companies’ supply chains have begun to receive more attention recently, as the need to improve supply chain performances has increased in order to keep the balance between financial considerations and those of the customer interests. With the multiplication of intermediate actors, a single threat at one point might compromise the safety of the all actors involved in the supply chain process. Therefore, there is a clear need for product tracking in order to trace anomalies for mitigation of potential threats in the future. Traditional approaches rely on operator-assisted verification procedures that mainly suffer from the lack of global coverage. In this paper, we propose an automated process to securely trace the supply chain actors that interact with the product, as well as the operations that were performed, and the alerts that got raised. The core component of this process is wireless sensor nodes attached to the produ ct. Empowered with sensing capabilities, wireless sensor nodes are meant to raise alert in case of detection of an anomaly. Our solution allows for tracing the path taken by a product and the recording of the alerts that got raised, while preserving the actors’ privacy. The solution combines a polynomial path encoding technique, together with additive homomorphic encryption to ensure the correctness of the path taken by a product, and to preserve the privacy of the actors, respectively. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.242.193.41

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Khalfaoui, M.; Khalfaoui, M.; Molva, R. and Gomez, L. (2013). Secure Alert Tracking in Supply Chain.In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 219-229. DOI: 10.5220/0004532102190229

@conference{secrypt13,
author={Mehdi Khalfaoui. and Mehdi Khalfaoui. and Refik Molva. and Laurent Gomez.},
title={Secure Alert Tracking in Supply Chain},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={219-229},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004532102190229},
isbn={978-989-8565-73-0},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Secure Alert Tracking in Supply Chain
SN - 978-989-8565-73-0
AU - Khalfaoui, M.
AU - Khalfaoui, M.
AU - Molva, R.
AU - Gomez, L.
PY - 2013
SP - 219
EP - 229
DO - 10.5220/0004532102190229

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.