Skip to main content
Erschienen in: Information Systems Frontiers 2/2015

01.04.2015

The design of an electronic pedigree system for food safety

verfasst von: Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang, Li-Rong Zheng

Erschienen in: Information Systems Frontiers | Ausgabe 2/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The problem of food safety is a critical issue in recent years. To address the issue, the technologies of the Internet of Things are used to offer the possibilities to easily track the processes in the production, storage, transportation, sale, and even using phases of foods. This paper, therefore, introduces the design of an electronic pedigree system for food safety, which uses electronic pedigrees to enhance the safety of food supply. The system implements an extension of the pedigree standard of EPCglobal, and offers a more trustworthily tracking service to monitor and supervise the production and supply of food. We discuss the key issues of the design, and implement a prototype to evaluate the feasibility of the design. Finally, we analyze the trustworthiness assurance and security of our electronic pedigree system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: a survey. Computer Networks, 54, 2787–2805.CrossRef Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: a survey. Computer Networks, 54, 2787–2805.CrossRef
Zurück zum Zitat Boldyreva, A., Fischlin, M., Palacio, A., & Warinschi, B. (2007). A closer look at PKI: security and efficiency. PKC 2007 (LNCS 4450), 458–475. Boldyreva, A., Fischlin, M., Palacio, A., & Warinschi, B. (2007). A closer look at PKI: security and efficiency. PKC 2007 (LNCS 4450), 458–475.
Zurück zum Zitat Domingo, M. (2012). An overview of the internet of things for people with disabilities. Journal of Network and Computer Applications, 35, 584–596.CrossRef Domingo, M. (2012). An overview of the internet of things for people with disabilities. Journal of Network and Computer Applications, 35, 584–596.CrossRef
Zurück zum Zitat Gu, Y., & Jing, T. (2011). The IOT research in supply chain management of fresh agricultural products. In: Proceedings of the 2nd international conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) (7382–7385). Gu, Y., & Jing, T. (2011). The IOT research in supply chain management of fresh agricultural products. In: Proceedings of the 2nd international conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) (7382–7385).
Zurück zum Zitat Han, W., & Lei, C. (2012). A survey on policy languages in network and security management. Computer Networks, 56(1), 477–489.CrossRef Han, W., & Lei, C. (2012). A survey on policy languages in network and security management. Computer Networks, 56(1), 477–489.CrossRef
Zurück zum Zitat Harrison, M., & Inaba, T. (2008). Improving the safety and security of the pharmaceutical supply chain. Networked RFID Systems and Lightweight Cryptography, III, 223–246.CrossRef Harrison, M., & Inaba, T. (2008). Improving the safety and security of the pharmaceutical supply chain. Networked RFID Systems and Lightweight Cryptography, III, 223–246.CrossRef
Zurück zum Zitat Kumar, S., Kadow, B., & Lamkin, M. (2011). Challenges with the introduction of radio-frequency identification systems into a manufacturer’s supply chain – a pilot study. Enterprise Information Systems, 5(2), 235–253.CrossRef Kumar, S., Kadow, B., & Lamkin, M. (2011). Challenges with the introduction of radio-frequency identification systems into a manufacturer’s supply chain – a pilot study. Enterprise Information Systems, 5(2), 235–253.CrossRef
Zurück zum Zitat Kwok, S., Tsang, A., Ting, J., Cheung, W., & Cheung, B. (2008). An intelligent RFID-based Electronic Anti-Counterfeit System (InRECS) for the manufacturing industry. In: Proceedings of the 17th world congress the international federation of automatic control. Seoul, Korea. Kwok, S., Tsang, A., Ting, J., Cheung, W., & Cheung, B. (2008). An intelligent RFID-based Electronic Anti-Counterfeit System (InRECS) for the manufacturing industry. In: Proceedings of the 17th world congress the international federation of automatic control. Seoul, Korea.
Zurück zum Zitat Lehtonen, M., Michahelles, F., & Fleisch, E. (2007). Trust and security in RFID-based product authentication systems. IEEE Systems Journal, 1(2), 129–144.CrossRef Lehtonen, M., Michahelles, F., & Fleisch, E. (2007). Trust and security in RFID-based product authentication systems. IEEE Systems Journal, 1(2), 129–144.CrossRef
Zurück zum Zitat Li, L. (2012). Effects of enterprise technology on supply chain collaboration: analysis of China-linked supply chain. Enterprise Information Systems, 6(1), 55–77.CrossRef Li, L. (2012). Effects of enterprise technology on supply chain collaboration: analysis of China-linked supply chain. Enterprise Information Systems, 6(1), 55–77.CrossRef
Zurück zum Zitat Li, L., & Liu, J. (2012). An efficient and flexible web services-based multidisciplinary design optimisation framework for complex engineering systems. Enterprise Information Systems, 6(3), 345–371.CrossRef Li, L., & Liu, J. (2012). An efficient and flexible web services-based multidisciplinary design optimisation framework for complex engineering systems. Enterprise Information Systems, 6(3), 345–371.CrossRef
Zurück zum Zitat Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Information Systems, 6(2), 165–187.CrossRef Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Information Systems, 6(2), 165–187.CrossRef
Zurück zum Zitat Meng, S., Chiu, D., Kafeza, E., Wenyin, L., & Li, Q. (2010). Automated management of assets based on RFID triggered alarm messages. Information Systems Frontiers, 12, 563–578.CrossRef Meng, S., Chiu, D., Kafeza, E., Wenyin, L., & Li, Q. (2010). Automated management of assets based on RFID triggered alarm messages. Information Systems Frontiers, 12, 563–578.CrossRef
Zurück zum Zitat MITRE. (2004). Horizontal Integration: broader access models for realizing information dominance. JASON Report, JSR–04–132. MITRE. (2004). Horizontal Integration: broader access models for realizing information dominance. JASON Report, JSR–04–132.
Zurück zum Zitat Mitrokotsa, A., Rieback, M., & Tanenbaum, A. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers, 12(5), 491–505.CrossRef Mitrokotsa, A., Rieback, M., & Tanenbaum, A. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers, 12(5), 491–505.CrossRef
Zurück zum Zitat Muckstadt, J., Murray, D., Rappold, J., & Collins, D. (2001). Guidelines for collaborative supply chain system design and operation. Information Systems Frontiers, 4, 427–453.CrossRef Muckstadt, J., Murray, D., Rappold, J., & Collins, D. (2001). Guidelines for collaborative supply chain system design and operation. Information Systems Frontiers, 4, 427–453.CrossRef
Zurück zum Zitat Pan, G., Qi, G., Wu, Z., Zhang, D., & Li, S. (2012). Land-use classification using taxi GPS traces. IEEE Transactions on Intelligent Transportation Systems, doi:10.1109/TITS.2012.2209201. Pan, G., Qi, G., Wu, Z., Zhang, D., & Li, S. (2012). Land-use classification using taxi GPS traces. IEEE Transactions on Intelligent Transportation Systems, doi:10.​1109/​TITS.​2012.​2209201.
Zurück zum Zitat Shon, T., & Choi, W. (2007). An analysis of mobile WiMAX security: vulnerabilities and Solutions. Network-based information systems (LNCS 4658), 88–97. Shon, T., & Choi, W. (2007). An analysis of mobile WiMAX security: vulnerabilities and Solutions. Network-based information systems (LNCS 4658), 88–97.
Zurück zum Zitat Sun, H., Hsieh, B., & Tseng, S. (2005). On the security of some proxy blind signature schemes. Journal of Systems and Software, 74(3), 297–302.CrossRef Sun, H., Hsieh, B., & Tseng, S. (2005). On the security of some proxy blind signature schemes. Journal of Systems and Software, 74(3), 297–302.CrossRef
Zurück zum Zitat Tan, C., & Li, Q. (2006). A robust and secure RFID-based pedigree system. In: Proceedings of the 8th international conference on information and communications security (LNCS 4307) (21–29). Tan, C., & Li, Q. (2006). A robust and secure RFID-based pedigree system. In: Proceedings of the 8th international conference on information and communications security (LNCS 4307) (21–29).
Zurück zum Zitat Thompson, C. (2004). Radio frequency tags for identifying legitimate drug products discussed by tech industry. American Journal of Health-System Pharmacy, 1430. Thompson, C. (2004). Radio frequency tags for identifying legitimate drug products discussed by tech industry. American Journal of Health-System Pharmacy, 1430.
Zurück zum Zitat Xin, H., & Stone, R. (2007). Chinese probe unmasks high-tech adulteration with melamine. Science, 322(5906), 1310–1311.CrossRef Xin, H., & Stone, R. (2007). Chinese probe unmasks high-tech adulteration with melamine. Science, 322(5906), 1310–1311.CrossRef
Zurück zum Zitat Xu, L. (2011). Enterprise systems: state-of-the-art and future trends. IEEE Transactions on Industrial Informatics, 7(4), 630–640.CrossRef Xu, L. (2011). Enterprise systems: state-of-the-art and future trends. IEEE Transactions on Industrial Informatics, 7(4), 630–640.CrossRef
Zurück zum Zitat Yan, Q. (2008). A security evaluation approach for information systems in telecommunication enterprises. Enterprise Information Systems, 2(3), 309–324.CrossRef Yan, Q. (2008). A security evaluation approach for information systems in telecommunication enterprises. Enterprise Information Systems, 2(3), 309–324.CrossRef
Zurück zum Zitat Yin, J., Zhang, X., Lu, Q., Xin, C., Liu, C., & Chen, Z. (2011). IOT based provenance platform for vegetables supplied to Hong Kong. Recent Advances in CSIE 2011 (LNEE 127), 591–596. Yin, J., Zhang, X., Lu, Q., Xin, C., Liu, C., & Chen, Z. (2011). IOT based provenance platform for vegetables supplied to Hong Kong. Recent Advances in CSIE 2011 (LNEE 127), 591–596.
Zurück zum Zitat Zdravković, M., Panetto, H., Trajanović, M., & Aubry, A. (2011). An approach for formalising the supply chain operations. Enterprise Information Systems, 5(4), 401–421.CrossRef Zdravković, M., Panetto, H., Trajanović, M., & Aubry, A. (2011). An approach for formalising the supply chain operations. Enterprise Information Systems, 5(4), 401–421.CrossRef
Zurück zum Zitat Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., Gu, Y., & Wang, J. (2011). Technologies, applications, and governance in the Internet of Things. In: Internet of things - Global technological and societal trends. From smart environments and spaces to green ICT. River Publishers. Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., Gu, Y., & Wang, J. (2011). Technologies, applications, and governance in the Internet of Things. In: Internet of things - Global technological and societal trends. From smart environments and spaces to green ICT. River Publishers.
Metadaten
Titel
The design of an electronic pedigree system for food safety
verfasst von
Weili Han
Yun Gu
Wei Wang
Yin Zhang
Yuliang Yin
Junyu Wang
Li-Rong Zheng
Publikationsdatum
01.04.2015
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 2/2015
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-012-9372-y

Weitere Artikel der Ausgabe 2/2015

Information Systems Frontiers 2/2015 Zur Ausgabe