Secure Cryptographic Protocol For Military Supply Chain

  • Ahmed M, Alblooshi

Student thesis: Master's Thesis


Radio Frequency Identification (RFID) technology is growing very fast and replacing the barcodes due to its properties. The most popular uses for RFID systems are commercial supply chain, where they provide clarity throughout the life cycle of product processing and provide improved efficiencies in supply chain management. RFID systems are vulnerable to many malicious attacks; likewise, any other wireless networks. Therefore many researchers have offered hundreds of solutions in terms of cryptographic protocols and have published papers in international forums and various platforms that are focusing on safeguarding different stages of the commercial supply chain. Unfortunately, the military supply chain did not receive the same attention, despite its importance, which is concerned primarily with securing all stages of chain management and not accepting any compromise. In this paper, we propose a novel cryptographic protocol that offers confidentiality and integrity to semipassive tags, which are attached explicitly to metallic equipment or weapons in the last phase of the military supply chain. This paper also presents an overview of military supply chain phases, which include Military Equipment Manufacturing Phase, Military Equipment Distribution Phase, Military Base Warehouse Distribution Phase, and lastly, Military User Base Usage. Also, the reasons for using semi-passive are specifically explained. The description and security analysis of the proposed protocol is provided and compared with the related works that are talked about in this thesis. Furthermore, the proposed protocol is justified to be not traceable by an adversary using a formal tool known as a ProVerif and outcome results after running the codes are given too. Future work includes proposing secure cryptographic protocols that secure all different phases of the military supply chain consolidating with the RFID technology. The main effort is to find a way to reducing the time spent in finding weapon parts plus mitigating the risk of losing these parts and consumables in moving from the operational duties areas to others.
Date of AwardMay 2020
Original languageAmerican English


  • RFID
  • Passive tag
  • Semi-Passive tag
  • Active tag
  • Confidentiality
  • Integrity
  • Availability
  • Eavesdropping
  • Man in the middle
  • Denial of service
  • Spoofing and Reply attack
  • Cryptographic Protocol
  • ProVerif.

Cite this