Abstract
The problem of food safety is a critical issue in recent years. To address the issue, the technologies of the Internet of Things are used to offer the possibilities to easily track the processes in the production, storage, transportation, sale, and even using phases of foods. This paper, therefore, introduces the design of an electronic pedigree system for food safety, which uses electronic pedigrees to enhance the safety of food supply. The system implements an extension of the pedigree standard of EPCglobal, and offers a more trustworthily tracking service to monitor and supervise the production and supply of food. We discuss the key issues of the design, and implement a prototype to evaluate the feasibility of the design. Finally, we analyze the trustworthiness assurance and security of our electronic pedigree system.







Similar content being viewed by others
References
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: a survey. Computer Networks, 54, 2787–2805.
Boldyreva, A., Fischlin, M., Palacio, A., & Warinschi, B. (2007). A closer look at PKI: security and efficiency. PKC 2007 (LNCS 4450), 458–475.
Domingo, M. (2012). An overview of the internet of things for people with disabilities. Journal of Network and Computer Applications, 35, 584–596.
EPCglobal. (2007). Pedigree ratified standard, 2007, http://www.gs1.org/gsmp/kc/epcglobal/pedigree/pedigree_1_0-standard-20070105.pdf. Accessed April 2012.
GS1. (2011a). The global language of business, 2011, http://www.gs1.org/. Access April 2012.
GS1. (2011b). EPCIS - EPC Information Services Standard, 2011, http://www.gs1.org/gsmp/kc/epcglobal/epcis. Access April 2012.
Gu, Y., & Jing, T. (2011). The IOT research in supply chain management of fresh agricultural products. In: Proceedings of the 2nd international conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC) (7382–7385).
Han, W., & Lei, C. (2012). A survey on policy languages in network and security management. Computer Networks, 56(1), 477–489.
Harrison, M., & Inaba, T. (2008). Improving the safety and security of the pharmaceutical supply chain. Networked RFID Systems and Lightweight Cryptography, III, 223–246.
Kumar, S., Kadow, B., & Lamkin, M. (2011). Challenges with the introduction of radio-frequency identification systems into a manufacturer’s supply chain – a pilot study. Enterprise Information Systems, 5(2), 235–253.
Kwok, S., Tsang, A., Ting, J., Cheung, W., & Cheung, B. (2008). An intelligent RFID-based Electronic Anti-Counterfeit System (InRECS) for the manufacturing industry. In: Proceedings of the 17th world congress the international federation of automatic control. Seoul, Korea.
Lehtonen, M., Michahelles, F., & Fleisch, E. (2007). Trust and security in RFID-based product authentication systems. IEEE Systems Journal, 1(2), 129–144.
Li, L. (2012). Effects of enterprise technology on supply chain collaboration: analysis of China-linked supply chain. Enterprise Information Systems, 6(1), 55–77.
Li, L., & Liu, J. (2012). An efficient and flexible web services-based multidisciplinary design optimisation framework for complex engineering systems. Enterprise Information Systems, 6(3), 345–371.
Li, S., Xu, L., Wang, X., & Wang, J. (2012). Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterprise Information Systems, 6(2), 165–187.
Meng, S., Chiu, D., Kafeza, E., Wenyin, L., & Li, Q. (2010). Automated management of assets based on RFID triggered alarm messages. Information Systems Frontiers, 12, 563–578.
MITRE. (2004). Horizontal Integration: broader access models for realizing information dominance. JASON Report, JSR–04–132.
Mitrokotsa, A., Rieback, M., & Tanenbaum, A. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers, 12(5), 491–505.
Muckstadt, J., Murray, D., Rappold, J., & Collins, D. (2001). Guidelines for collaborative supply chain system design and operation. Information Systems Frontiers, 4, 427–453.
Pan, G., Qi, G., Wu, Z., Zhang, D., & Li, S. (2012). Land-use classification using taxi GPS traces. IEEE Transactions on Intelligent Transportation Systems, doi:10.1109/TITS.2012.2209201.
Shon, T., & Choi, W. (2007). An analysis of mobile WiMAX security: vulnerabilities and Solutions. Network-based information systems (LNCS 4658), 88–97.
Sun, H., Hsieh, B., & Tseng, S. (2005). On the security of some proxy blind signature schemes. Journal of Systems and Software, 74(3), 297–302.
Tan, C., & Li, Q. (2006). A robust and secure RFID-based pedigree system. In: Proceedings of the 8th international conference on information and communications security (LNCS 4307) (21–29).
Thompson, C. (2004). Radio frequency tags for identifying legitimate drug products discussed by tech industry. American Journal of Health-System Pharmacy, 1430.
Xin, H., & Stone, R. (2007). Chinese probe unmasks high-tech adulteration with melamine. Science, 322(5906), 1310–1311.
Xu, L. (2011). Enterprise systems: state-of-the-art and future trends. IEEE Transactions on Industrial Informatics, 7(4), 630–640.
Yan, Q. (2008). A security evaluation approach for information systems in telecommunication enterprises. Enterprise Information Systems, 2(3), 309–324.
Yin, J., Zhang, X., Lu, Q., Xin, C., Liu, C., & Chen, Z. (2011). IOT based provenance platform for vegetables supplied to Hong Kong. Recent Advances in CSIE 2011 (LNEE 127), 591–596.
Zdravković, M., Panetto, H., Trajanović, M., & Aubry, A. (2011). An approach for formalising the supply chain operations. Enterprise Information Systems, 5(4), 401–421.
Zheng, L., Zhang, H., Han, W., Zhou, X., He, J., Zhang, Z., Gu, Y., & Wang, J. (2011). Technologies, applications, and governance in the Internet of Things. In: Internet of things - Global technological and societal trends. From smart environments and spaces to green ICT. River Publishers.
Acknowledgment
This paper is supported by the 863 project (Grant NO: 2011AA100701), the Project-sponsored by SRF for ROCS, SEM, and the project of Natural Science Foundation of Shanghai (Grant NO: 12ZR1402600). The corresponding author is Lirong Zheng. The documents can be viewed at http://crypto.fudan.edu.cn/epedigree/homepage.html. Thank Ms. Min Li for her English polish.
Author information
Authors and Affiliations
Corresponding author
Appendix A: Pedigree types in the previous pedigree standard of EPCglobal
Appendix A: Pedigree types in the previous pedigree standard of EPCglobal
Initial pedigree
This kind of electronic pedigree is used to describe the initial condition of the products. When a product is produced, its initial pedigree should be generated. Initial pedigree includes a product’s serial number and its initial information. Environment pedigrees and birth pedigrees can be related to initial pedigrees, which record the initial environment and birth condition of the product.
Repacking pedigree
This kind of electronic pedigree is always used to record the repacking information. When a product is split into several smaller products or several products are merged into one product, a repacking pedigree is required. Repacking pedigree includes the repacking information such as repacking time and location. Besides, the previous pedigree’s identifier should be related to the new repacking pedigrees so that we can trace the complete product information through it.
Alt pedigree
This kind of electronic pedigree is used to link accessories. Other electronic pedigrees can only contain word information. But sometimes pictures, audio or video are necessary. Besides, in some cases, certificates with much data need to be related into an electronic pedigree while the amount of information in an electronic pedigree is limited. So we use the alt pedigrees to link the accessories.
Shipped pedigree
This kind of electronic pedigree is used to record the shipping information. When the present company ships the products to another company, shipped pedigree should be generated. The shipped pedigree includes shipping time, location, receiver and other shipping information.
Received pedigree
This kind of electronic pedigree is used to record the receiving information. When the company receives products, their received pedigrees should be generated. The received pedigree includes receiving time, location, recipient and other receiving information.
Unsigned received pedigree
This kind of electronic pedigree is similar to the received pedigree, except that it has not a digital signature. In some cases, the product is refused by other companies for some reasons after shipment. It means the company will generate a received electronic pedigree based on a shipped pedigree which is generated by the same company. So the digital signature is redundant since the product is always under the control of the present company. In this case, we may generate an unsigned received pedigree instead of a received pedigree.
Rights and permissions
About this article
Cite this article
Han, W., Gu, Y., Wang, W. et al. The design of an electronic pedigree system for food safety. Inf Syst Front 17, 275–287 (2015). https://doi.org/10.1007/s10796-012-9372-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-012-9372-y