Time filter

Source Type

Le Touquet – Paris-Plage, France

Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory | Farahani P.,TU Munich | Grunow M.,TU Munich
European Journal of Operational Research | Year: 2013

As perishable food supply networks become more complex, incidents of contamination in these supply networks have become fairly common. Added to this complexity is the fact that there have been long delays in identifying the contamination source in several such incidents. Even when the contamination source was identified, there have been cases where the ultimate destination of all contaminated products were not known with complete certainty due, in part, to dispersion in these supply networks. We study the recall dynamics in a three-stage perishable food supply network through three different visibility levels in the presence of contamination. Specifically, we consider allocation of liability among the different players in the perishable supply network based on the accuracy with which the contamination source is identified. We illustrate the significance of finer levels of granularity both upstream and downstream as well as determine appropriate visibility levels and recall policies. © 2012 Elsevier B.V. All rights reserved.

Urien P.,Telecom ParisTech | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
Decision Support Systems | Year: 2014

Unless specifically designed for its prevention, none of the existing RFID authentication protocols are immune to relay attacks. Relay attacks generally involve the presence of one or more adversaries who transfer unmodified messages between a prover and a verifier. Given that the message content is not modified, it is rather difficult to address relay attacks through cryptographic means. Extant attempts to prevent relay attacks involve measuring signal strength, round-trip distance, and ambient conditions in the vicinity of prover and verifier. While a majority of related authentication protocols are based on measuring the round-trip distance between prover and verifier using several single-bit challenge-response pairs, recent discussions include physical proximity verification using ambient conditions to address relay attacks. We provide an overview of existing literature on addressing relay attacks through ambient condition measurements. We then propose an elliptic curve-based mutual authentication protocol that addresses relay attacks based on (a) the surface temperature of the prover as measured by prover and verifier and (b) measured single-bit round-trip times between prover and verifier. We also evaluate the security properties of the proposed authentication protocol. © 2013 Elsevier B.V. All rights reserved.

Piramuthu S.,RFID European Laboratory | Piramuthu S.,University of Florida
Decision Support Systems | Year: 2011

As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual authentication of tag and reader, and identify some existing vulnerabilities. © 2010 Elsevier B.V. All rights reserved.

Zhou W.,ESCP Europe | Zhou W.,RFID European Laboratory | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
International Journal of Production Economics | Year: 2013

We consider RFID tags and their applications from a recycling/ remanufacturing perspective and propose a novel framework to assist such process based on item-level information visibility and instantaneous tracking/tracing ability enabled by RFID. The incorporation of RFID in the reverse supply chain results in cost reduction, service and production quality improvement and pollution and waste reduction. With RFID in a reverse supply chain, we observe the power shift from waste-driven to market-driven system. Moreover, RFID's value increases with uncertainties in reverse operations as well as individual products and components. © 2013 Elsevier B.V. All rights reserved.

Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory | Zhou W.,ESCP Europe | Zhou W.,RFID European Laboratory
International Journal of Production Economics | Year: 2013

Although there is an extensive set of literature on inventory management for perishable items, a majority of these operate at a higher level where all items are assumed to have a fixed shelf-life. However, depending on how they are handled in transit as well as during storage, the remaining shelf-life of perishable items can vary. We consider perishable inventory management with demand that is directly dependent on the amount of shelf-space allocated to the item of interest as well as its instantaneous quality. We assume the existence of detailed information at the item-level generated through auto-ID technology such as RFID with necessary sensors. Specifically, we extend the model in Bai and Kendall (2008) to incorporate item-level quality information and use Genetic Algorithms to solve our model. Our results show that the incorporation of item quality increases the resulting overall profit to the retailer. © 2013 Elsevier B.V.

Discover hidden collaborations