RFID European Laboratory

Paris, France

RFID European Laboratory

Paris, France

Time filter

Source Type

Zhou W.,ESCP Europe | Zhou W.,RFID European Laboratory | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
Decision Support Systems | Year: 2010

The working environment in health care organizations is characterized by its demand for highly dynamic process and labor management in which (a) medical personnel are generally associated with several disparate types of tasks, (b) service location and service personnel change frequently, (c) highly uncertain environment where emergency issues could arise at any time, and (d) the stakes are high since invaluable human lives are involved. There is an urgent need from both researchers and health care organizations to develop reasonable management strategies for maintaining a good balance between efficient management and superior medical service quality. We discuss the potential for real-time health care coordination and effective medical process and labor management enabled by RFID item-level tracking/tracing identification technology. We explore the uniqueness of instance-level process mining and its application in health care environment. We then propose an adaptive learning framework that supports real-time health care coordination and analyze its benefits compared to traditional routine process and labor management. We find that while RFID-enabled real-time medical process and labor management provides marginal improvement for premium medical service providers, it generates appreciable improvement both in terms of efficiency and service quality for public health care institutions where availability of necessary resources such as medical staff and equipment are highly constrained. © 2010 Elsevier B.V. All rights reserved.


Kapoor G.,University of Florida | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
Engineering Applications of Artificial Intelligence | Year: 2011

As incorporation of RFID (Radio Frequency IDentification) tags in a wide variety of applications increase, there is a need to ensure the security and privacy of the entity to which these tags are attached. Not surprisingly, this is a very active area as attested by the large number of related published research literature. Recently, the journal engineering applications of artificial intelligence published a paper by Chen and Deng (2009) where the authors propose a mutual authentication protocol for RFID. This protocol has fundamental flaws that can be readily taken advantage by a resourceful adversary. We identify and discuss these vulnerabilities and point out the characteristics of this protocol that exposes it to these vulnerabilities. © 2011 Elsevier Ltd. All rights reserved.


Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory | Farahani P.,TU Munich | Grunow M.,TU Munich
European Journal of Operational Research | Year: 2013

As perishable food supply networks become more complex, incidents of contamination in these supply networks have become fairly common. Added to this complexity is the fact that there have been long delays in identifying the contamination source in several such incidents. Even when the contamination source was identified, there have been cases where the ultimate destination of all contaminated products were not known with complete certainty due, in part, to dispersion in these supply networks. We study the recall dynamics in a three-stage perishable food supply network through three different visibility levels in the presence of contamination. Specifically, we consider allocation of liability among the different players in the perishable supply network based on the accuracy with which the contamination source is identified. We illustrate the significance of finer levels of granularity both upstream and downstream as well as determine appropriate visibility levels and recall policies. © 2012 Elsevier B.V. All rights reserved.


Urien P.,Telecom ParisTech | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
Decision Support Systems | Year: 2014

Unless specifically designed for its prevention, none of the existing RFID authentication protocols are immune to relay attacks. Relay attacks generally involve the presence of one or more adversaries who transfer unmodified messages between a prover and a verifier. Given that the message content is not modified, it is rather difficult to address relay attacks through cryptographic means. Extant attempts to prevent relay attacks involve measuring signal strength, round-trip distance, and ambient conditions in the vicinity of prover and verifier. While a majority of related authentication protocols are based on measuring the round-trip distance between prover and verifier using several single-bit challenge-response pairs, recent discussions include physical proximity verification using ambient conditions to address relay attacks. We provide an overview of existing literature on addressing relay attacks through ambient condition measurements. We then propose an elliptic curve-based mutual authentication protocol that addresses relay attacks based on (a) the surface temperature of the prover as measured by prover and verifier and (b) measured single-bit round-trip times between prover and verifier. We also evaluate the security properties of the proposed authentication protocol. © 2013 Elsevier B.V. All rights reserved.


Piramuthu S.,RFID European Laboratory | Piramuthu S.,University of Florida
Decision Support Systems | Year: 2011

As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual authentication of tag and reader, and identify some existing vulnerabilities. © 2010 Elsevier B.V. All rights reserved.


Zhou W.,ESCP Europe | Zhou W.,RFID European Laboratory | Yoon E.J.,University of Florida | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
Decision Support Systems | Year: 2012

Authentication of Radio Frequency Identification (RFID) tags takes several forms depending on the dictates of the considered scenario. For example, mutual authentication protocols are used in scenarios where both tag and reader need to authenticate each other. We consider and develop ownership transfer protocols for three scenarios in the health care domain that have not been addressed in extant literature. RFID-tagged items in a health care supply chain experience different levels of ownerships, often simultaneously, throughout their lifetime. We consider a scenario related to ownership of RFID tags in a health care supply chain, specifically the seamless incorporation by a third party logistics provider. Another scenario considered is where tags simultaneously possess a temporary and a permanent key for communicating with a temporary (e.g., rental customer) and a permanent (e.g., owner) user respectively. The third scenario considered is where there are several levels of ownership (e.g., primary owner, rental owner, sub-rental owner). We provide example cases in the health care domain where such scenarios are observed. We then present brief security analyses of the developed protocols. © 2012 Elsevier B.V. All rights reserved.


Zhou W.,ESCP Europe | Zhou W.,University of Florida | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
Decision Support Systems | Year: 2013

When a retail store places an item for sale at a set price, the expectation is that the customer pays this price for the item. However, the 'customer' may not necessarily pay this amount due to any number of legitimate (e.g., price promotion) as well as illegitimate (e.g., theft) reasons. We consider ticket-switching, a scenario whereby the customer pays a lower amount for the purchased item by switching its price identifier. We propose the use of item-level RFID tags to address ticket-switching in apparel retail stores. We then develop authentication protocols that are directed at reducing the occurrence of ticket-switching incidents as well as identifying them when they occur. We evaluate the security properties of the proposed protocols. © 2013 Elsevier B.V.


Grunow M.,TU Munich | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
International Journal of Production Economics | Year: 2013

RFID (Radio-Frequency IDentification) has been proposed as a leading technology that could help reduce wastage in perishable food supply chains. This is due to their cost-effective ability to reliably identify tagged items as well as gather information on their ambient conditions through appropriate sensors. We model and study the utility of sensor-enabled RFID-generated item-level information in a highly perishable food supply chain from several perspectives including the distributor, retailer and consumer. With specific focus on expiry date and remaining shelf-life, we develop conditions under which the incorporation of RFID could benefit distributors, retailers and consumers. We also consider RFID investment decision in a highly perishable food supply chain. © 2013 Elsevier B.V.


Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory | Zhou W.,ESCP Europe | Zhou W.,RFID European Laboratory
International Journal of Production Economics | Year: 2013

Although there is an extensive set of literature on inventory management for perishable items, a majority of these operate at a higher level where all items are assumed to have a fixed shelf-life. However, depending on how they are handled in transit as well as during storage, the remaining shelf-life of perishable items can vary. We consider perishable inventory management with demand that is directly dependent on the amount of shelf-space allocated to the item of interest as well as its instantaneous quality. We assume the existence of detailed information at the item-level generated through auto-ID technology such as RFID with necessary sensors. Specifically, we extend the model in Bai and Kendall (2008) to incorporate item-level quality information and use Genetic Algorithms to solve our model. Our results show that the incorporation of item quality increases the resulting overall profit to the retailer. © 2013 Elsevier B.V.


Zhou W.,ESCP Europe | Zhou W.,RFID European Laboratory | Piramuthu S.,University of Florida | Piramuthu S.,RFID European Laboratory
International Journal of Production Economics | Year: 2013

We consider RFID tags and their applications from a recycling/ remanufacturing perspective and propose a novel framework to assist such process based on item-level information visibility and instantaneous tracking/tracing ability enabled by RFID. The incorporation of RFID in the reverse supply chain results in cost reduction, service and production quality improvement and pollution and waste reduction. With RFID in a reverse supply chain, we observe the power shift from waste-driven to market-driven system. Moreover, RFID's value increases with uncertainties in reverse operations as well as individual products and components. © 2013 Elsevier B.V. All rights reserved.

Loading RFID European Laboratory collaborators
Loading RFID European Laboratory collaborators