Research on Anomaly Detection of RFID Supply Chain Data Based on EPC



Similar documents
Analyzing Product Flows with the Supply Chain Visualizer. Demo at Internet of Things Conference 2008, Zurich

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

Design of Remote data acquisition system based on Internet of Things

Construction of DBMS for the Warehouse of Textile Enterprise Based on RFID Technology

Operation and Maintenance Management Strategy of Cloud Computing Data Center

EPCIS-based Supply Chain Visualization Tool

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

Research on Operation Management under the Environment of Cloud Computing Data Center

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

White Paper Healthcare Supply Chain Traceability

UPS battery remote monitoring system in cloud computing

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

Function and Structure Design for Regional Logistics Information Platform

A Data Cleaning Model for Electric Power Big Data Based on Spark Framework 1

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

Development of a Kind of Mine Staff Management System

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

Applications and Analysis of Client Consumer Behavior Based on Big Data

Design for Management Information System Based on Internet of Things

IBM WebSphere Premises Server

IBM Solution for Pharmaceutical Track & Trace

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

How To Improve Product Data Quality

How China promoting RFID use in logistics. Mr. Wenfeng Wang Senior engineer, IT research center of CESI

F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop

HP Brazil RFID CoE Center of Excellence

Method of Fault Detection in Cloud Computing Systems

Getting Started with TraSer from Requirements to a Solution

The Evaluation Model of HD Interactive TV Shopping Service

Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

Asset Tracking & Radio Frequency Identification White Paper

Underground Mine Rescue Equipment and Technology

Why MCL-Bridge for SAP

Towards Participatory Design of Multi-agent Approach to Transport Demands

A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards

The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry

Strengthen RFID Tags Security Using New Data Structure

Research of Postal Data mining system based on big data

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): Research Article

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

A Review on Network Intrusion Detection System Using Open Source Snort

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

Efficient Data Sharing in Healthcare

GS1 UK Solutions: Asset tracking and management

Study of Logistics Warehouse Management System Based on RFID

Information Technology Support System of Supply Chain Management

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

A Design of Access Control Framework for User Identification Based on Personal Cloud

RFID Asset Management Solutions. Distributed globally by

Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle

isurf -An Interoperability Service Utility for Collaborative Supply Chain Planning across Multiple Domains: Textile Supply Chain Pilot 1

Threat Modeling in EPC-Based Information Sharing Networks

A Proxy-Based Data Security Solution in Mobile Cloud

Crime Hotspots Analysis in South Korea: A User-Oriented Approach

Study on mobile e-commerce business process optimization

NOT ALL CODES ARE CREATED EQUAL

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

A Proposed Framework for Integration of Visualization Techniques and Active Learning Strategy in Wireless Communication Network

Research on Data Processing Technology Based on the Middleware of the IoT


Security Challenges of the EPCglobal Network

Success factors for the implementation of ERP to the Agricultural Products Processing Center

Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Analytical Model for Automating Purchases using RFID-enabled Shelf and Cart

Fleet Optimization with IBM Maximo for Transportation

Automated Security System using ZigBee

Data Mining Solutions for the Business Environment

IBM RFID for Supply Chain and Logistics: Reusable Asset Tracking solution

A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing

A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Enhanced Boosted Trees Technique for Customer Churn Prediction Model

SPATIAL DATA CLASSIFICATION AND DATA MINING

Backend Systems Architectures in the Age of the Next Generation Network

RFID Based 3D Indoor Navigation System Integrated with Smart Phones

Anti-Cloning Demonstrator

Internet of Things - A GAME- CHANGER FOR OMNI-CHANNEL RETAILERS

AN INTRODUCTION TO THE GLOBAL TRADE ITEM NUMBER (GTIN) TABLE OF CONTENTS

Journal of Chemical and Pharmaceutical Research, 2014, 6(3): Research Article

Enabling the secure use of RFID

Research on Errors of Utilized Bandwidth Measured by NetFlow

Improving production and operation systems with RFID. Taking manufacturing to the next level: RFID Work-in-Process solutions from IBM

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Spam Detection Using Customized SimHash Function

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan

Construction and Application of Logistics Information Tracking System Based on RFID Technology

If you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today!

Technologies based on Cloud Computing Technology

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

Fault Analysis in Software with the Data Interaction of Classes

ACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

Transcription:

, pp.62-66 http://dx.doi.org/10.14257/astl.2014.50.10 Research on Anomaly Detection of RFID Supply Chain Data Based on EPC Chunfeng Wang 1 Shuiming Zhong 2 Jin Wang 2 1 Modern Education Technology Center, Yancheng Institute of Technology, Yancheng 224051, China 2 School of Computer & Software,Nanjing University of Information Science & Technology, Nanjing 210044,China Abstract. With the development of RFID technology has attracted more and more attention, the deployment of RFID systems is developing to the trend of large-scale, networked and distributed. So, it is important to analyze the reliability of RFID data. The paper aims to analyze and research the technology of RFID supply chain anomaly detection in-depth. According to the existing problems, such as delay in transiting and steal in supply chain, etc, the paper will put forward the anomaly detection system of RFID supply chain based on distance and rules. The system can provide some help for the enterprise management so as to help enterprises to effectively control the information of supply chain. Keywords: RFID, anomaly detection, supply chain, EPC network 1 Introduction RFID is called radio frequency identification technology, and it is an automatic identification technology. It can realize non-contact telecommunication in two-way by wireless radio frequency, to achieve the purpose of identification, and the process of recognition does not need manual intervention. Compared with the bar code, the advantages of RFID technology are more obvious, such as: long service life, big reading distance, encrypted tag data, large storage capacity, information easily to be changed etc [1]. In recent years, RFID technology has been widely used in many fields of industrial automation, business automation, and transportation control management. The deployment of the RFID system will have the trend of large-scale, networked, and distributed. This is more and more demand on RFID data reliability. According to the survey of the "information overload" by international famous consulting company (Gartner), results show that more than 90% of the enterprises think the enterprise competitiveness is closely related to its information capacity. In order to obtain the useful information, enterprises must analyze the data and exclude "exception" data. So, it is very important to realize the detection of abnormal data. Supply chain management is one of the important application fields based on the RFID system. The analysis of the abnormal data is important for the safety and effectiveness of supply chain. This paper mainly studies the anomaly detection scheme of RFID supply ISSN: 2287-1233 ASTL Copyright 2014 SERSC

chain based on EPC network, in order to provide supply chain data analysis for enterprises, and to provide assistance for enterprise management decision. 2 Classification of Abnormity Based on RFID Supply Chain In the supply chain system, the enterprise must grasp the relevant information of all items in the supply chain, which will produce a large amount of data [2]. But these data (including the time of goods and space information) can provide valuable information for the users of supply chain system by effective analysis, such as: the most reasonable path and best time for goods delivery. Here, we will mainly divide the abnormal RFID supply chain into three types, as described below: (1) Delay of transport. In the supply chain, the delay of goods transport may occur in delivering goods, in transit and arrival link. Transport delay will lose its original value for some goods of strict requirement of time, for example, fresh goods need be sent to the destination in 2 days, while the transport delay caused the goods being sent to the destination for 4 days. The consequence can be imagined, therefore, in order to make the supply chain of goods circulation more efficient, it is necessary to monitor the transport of goods in the supply chain to avoid significant losses. (2) Theft. Every year, the phenomenons of commodity theft always happen in our country, and these mostly occur in the time period of goods-packing by suppliers, goods-unloading by retailers or drivers rest. If we can achieve real-time tracking of goods in the supply chain system, which indicates the orientation of specified goods at any time, then we can largely reduce the loss rate. (3) Fake. The application of RFID in anti-counterfeit of the article has been respected in many countries, such as: access control management, food security and other aspects [3]. If the enterprise puts the RFID label on the goods, the goods can be monitored throughout the processes of production, circulation, sales and so on, which can avoid the fake. 3 Detection Method of Abnormity Based on RFID Supply Chain Because the abnormal supply chain will bring great losses to enterprises, so it is necessary to find out the effective anomaly detection method in the RFID supply chain system. The RFID supply chain anomaly detection method can be divided into three categories: detection method based on the statistics, detection method based on distance and detection method based on rules. (1) Detection method based on statistics Anomaly detection method based on statistics detects anomalies by statistical thinking. Assume the set of data is in accordance with a distribution or probability model (such as the Gauss distribution), and then model is used to decide whether it is abnormal or not. The application of this method needs to know the probability distribution model and distribution parameters (such as the mean and variance) of data set [4]. (2)Detection method based on distance Copyright 2014 SERSC 63

Anomaly detection method based on distance judges the abnormal data which have not enough adjacent data. That enough adjacent data is determined based on the given object and the distance of the object. The method is mainly used in large database knowledge discovery. (3) Detection method based on rules Anomaly detection method based on rules has combined with characteristics of application itself and data [5]. The basic idea of analysis method based on rules is: making the classification model by general features, and produces feature database of normal behavior, then decides new data whether it is normal behavior or not. 4 Summary Design of Anomaly Detection System (1) Ideas of Research Anomaly detection method based on statistics mainly appeals to a single attribute, and need know the distribution model and parameter information of data set. The method is not suitable for anomaly detection of RFID data. Anomaly detection method based on distance need calculate the distance between the calculation of normal data and the abnormal data. The method has wide range of application, but there are the problems of efficiency and error. Analysis method based on rules is more effective, which can identify the abnormal data. But some supply chain system can not provide specific business rules, so the range of application is limited. Certificate profile Pedigree Discovery Services Object Name Service Exchange EPC information Services Core Business Vocabulary Application Level Events Discovery Configuration & Initialization Reader Management Capture Low Level Reader Protocol Reader Protocol Tag Protocol Tag Protocol Tag Data Standard Tag Data Translation Identify Fig.1. Architecture of EPCglobal To sum up, based on the summary of the existing abnormal data discrimination method and considering the characteristics of RFID data itself, the paper has con- 64 Copyright 2014 SERSC

structed the anomaly detection system of RFID supply chain data based on EPC [6]. The system can be combined with the detection method based on distance and detection method based on rules to play their respective advantages and provide the graphical display, so managers can easily browse exception information of the supply chain. (2) Architecture of EPCglobal EPCglobal is a neutral, non-profit organization for standardization. It is made up of two standardization organization (EAN and UCC) [7]. Its major responsibility is to establish and maintain the EPC network in the global scope of each industry, and to ensure the automatic, real-time recognition technology. The architecture of EPCglobal is shown in Fig.1 above. 5 Architecture of Anomaly Detection System The architecture of the system is shown in Fig. 2: Constraint rules Visualization Graphical display Anomaly detection based on Rules Anomaly detection based on Distance Abnormal data analysis Pretreatment time Pretreatment path Data source Data preprocessing Fig.2. Architecture of the system This paper has designed three layers of anomaly detection system, such as: data preprocessing layer, anomaly analysis layer and graphical display layer. (1) Data preprocessing layer This layer is mainly to pretreatment the event data of collecting from EPCIS based on two aspects of time and route. By the appropriate transformation of time data, this layer is convenient for the analysis of subsequent anomaly detection, and is more direct to analyzing the abnormal data without further processing. (2)Abnormal Analysis layer The layer by detection method can realize the anomaly detection from the global and local aspects by detection method based on distance and detection method based on rules. Detection method based on distance method transforms the temporal information to frequency domain information, and uses the path similarity of frequency space to exclude abnormal. Detection method based on Copyright 2014 SERSC 65

rules can exclude those data which does not meet the rules, using some predefined rules, such as the flow, speed, residence time. This layer can analyze the large amounts of data for analysis for the purpose of finding abnormal phenomenon. (3) Graphical display layer This layer displays the data flow by anomaly detection based on approach, and can provide a visual interface, convenient managers to view the information of supply chain circulation and exceptions. 6 Conclusions Supply chain management is the important application fields of RFID system. Analysis of the abnormal data is important to the supply chain security and reliability. Through the analysis of RFID supply chain business needs, summary of the existing literature, the paper has presented an anomaly detection scheme for RFID data supply chain based on EPC network. On one hand, the system can be combined with the detection method based on distance and detection method based on rules to play their respective advantages. On the other hand, the system can provide effective supply chain data analysis for the enterprises, and it is convenient for the management to check the data. Acknowledgments. This work was supported by the 12 th Five Year Planning Foundation of Jiangsu Province (Grant No.B-b/2013/01/012). It was also supported by the Modern Education Technology Foundation of Jiangsu Province (Grant No.2013-R24773). References 1. Lehtonen, M., Michahelles, F., Fleisch, E.: How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces. 2009 IEEE International Conference on RFID. (2009) 2. Ilic, A., Andersen, T., Michahelles, F.: Increasing supply-chain visibility with rule-based RFID data Analysis. IEEE Internet Computing. (2009) 3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys (CSUR). (2009) 4. Melski, A., Thoroe, L., Schumann, M.: Managing RFID data in supply chains. International Journal of Internet Protocol Technology. Dec. (2007) 5. Yunxia, L.: Data preprocessing: research and application of statistical methods and data reduction. Xiamen University press,(2011) 6. Jin, G.: RFID supply chain data anomaly detection in EPC [Master thesis]. Shanghai Jiao Tong University School.(2012) 7. Guoshen, L.: RFID path data clustering analysis and frequent pattern mining [Master thesis]. South China University of Technology. (2010) 66 Copyright 2014 SERSC