DE-Sword: Incentivized Verifiable Tag Path Query in RFID-enabled Supply Chain Systems

Saiyu Qi, Yuanqing Zheng, Yue Li, Xiaofeng Chen, Jianfeng Ma, Dongyi Yang, Yong Qi

Research output: Journal article publicationJournal articleAcademic researchpeer-review


In this paper,we propose Double Edged (DE)-Sword, an incentivized verifiable tag path query scheme. DE-Sword queries tag records stored across a path of participants within an RFID-enabled supply chain in a verifiable way. Different with previous works, DE-Sword works in a dishonest-data owner model in which participants are the owners of tag records and may be dishonest. DE-Sword introduces a novel double-edged reputation incentive mechanism to encourage participants to behave honestly; and couples it with cryptographic primitives to ensure query verifiability. We evaluate DE-Sword through game theory, security analysis,and performance evaluation. The game theory and security analysis shows that DE-Sword guarantees query verifiability. The evaluation results show that DE-Sword incurs low overhead in supply chain systems.

Original languageEnglish
Pages (from-to)1-16
JournalIEEE Transactions on Dependable and Secure Computing
Publication statusAccepted/In press - 2020


  • Databases
  • Location awareness
  • Production
  • RFID tags
  • Security
  • Supply chains
  • Trajectory

ASJC Scopus subject areas

  • Electrical and Electronic Engineering


Dive into the research topics of 'DE-Sword: Incentivized Verifiable Tag Path Query in RFID-enabled Supply Chain Systems'. Together they form a unique fingerprint.

Cite this