DocumentCode :
2557996
Title :
Mirage: Mitigating illicit inventorying in a RFID enabled retail environment
Author :
White, Jonathan ; Banerjee, Nilanjan
Author_Institution :
Comput. Sci. & Comput. Eng., Univ. of Arkansas, Fayetteville, AR, USA
fYear :
2011
fDate :
4-8 Jan. 2011
Firstpage :
1
Lastpage :
9
Abstract :
Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is corporate espionage, where attackers through illicit inventorying infer sales and restocking trends for products. In this paper, we first present plausible aftermaths of corporate espionage using real data from online sources. Second, to mitigate corporate espionage in a retail store environment, we present a simple low-cost system called Mirage. Mirage uses additional programmable low cost passive RFID tags called honeytokens to inject noise in retail store inventorying. Using a simple history based algorithm that controls activation and de-activation of honeytokens, Mirage randomizes sales and restocking trends. We evaluate Mirage in a real warehouse environment using a commercial off-the-shelf Motorola MC9090 handheld RFID reader and over 450 Gen2 low cost RFID tags. We show that Mirage successfully flattens and randomizes sales and restocking trends while adding minimal cost to inventory control.
Keywords :
radiofrequency identification; retailing; security of data; supply chain management; warehousing; 450 Gen2 RFID tags; Mirage; RFID enabled retail environment; corporate espionage; deleterious attack; history based algorithm; honeytokens; illicit inventory; off-the-shelf Motorola MC9090 handheld RFID reader; programmable low cost passive RFID tag; retail store inventory; warehouse environment; Companies; Databases; Inventory control; Marketing and sales; RFID tags; Supply chain management; Corporate Espionage; Honeytokens; Illicit Inventorying; RFID;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Systems and Networks (COMSNETS), 2011 Third International Conference on
Conference_Location :
Bangalore
Print_ISBN :
978-1-4244-8952-7
Electronic_ISBN :
978-1-4244-8951-0
Type :
conf
DOI :
10.1109/COMSNETS.2011.5716498
Filename :
5716498
Link To Document :
بازگشت