Selwyn Piramuthu's research while affiliated with University of Florida and other places

Publications (185)

Article
We discuss a few different IoT-based applications in agriculture and related food supply chains that help facilitate environmental sustainability. Specifically, we consider edibles as they move from farm to fork in terms of reduced environmental footprint that includes less energy consumption, reduced resource requirements, and less food wastage. W...
Article
Full-text available
Supply chains with either perishables or non-perishables have been well-studied as evidenced through extant published literature. Among these studies, very few consider supply chains with both perishable and non-perishable products. Since the early 2000s, RFID (Radio-Frequency IDentification) tags have been increasingly used in supply chains that d...
Article
Full-text available
Agile supply chains facilitate sustainability through higher effectiveness and lower wastage. Agile supply chain frameworks in extant literature are designed for static supply chains and high-granular data that are only available at fixed periods. With the increasing interest in the Internet of Things (IoT) and blockchain technology for supply chai...
Article
Ticket-switching is the process by which the price information on a relatively expensive item is switched with one from a cheap item. This allows the customer to pay the cheap item price for the expensive item. Evidence suggests that ticket-switching events in retail supply chains may not be rare and therefore need to be addressed. We consider tick...
Article
Full-text available
As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag authentication in systems where these tags are assigned to be read by a single reader is challenging enough due to resource constraints related to memory and processing power at the tag’s side, it is...
Article
Warehouses play a significant role in the seamless distribution, integration, and storage of items as well as in supply chain operations. Automated identification (auto-ID) technologies that include barcode and RFID provide class- or item-level visibility to facilitate effective and efficient decisions in their respective environments. A warehouse...
Article
Full-text available
Sensors and IoT (Internet of Things), which include RFID (Radio-Frequency IDentification) tags, have witnessed widespread adoption across a wide variety of application domains over the last two decades. These sensors and IoT devices are often a part of distributed sensor networks. As with any distributed processing scenario, there is a need to ensu...
Article
Full-text available
Sustainability has become an important objective of city logistics management. Smart city, being a technology and data driven paradigm for a city’s sustainable development, has entailed new research opportunities from different perspectives. It is foreseeable that smart city will keep evolving in the domain of city logistics, which plays a key role...
Chapter
With the emergence of big data and business analytics, many new concepts and business models driven by data have been introduced in recent years. Does “big” really matter? We attempt to explain when and why big does not matter in many business cases. In those occasions where “Big” does matter, we outline the data strategy framework that differentia...
Book
This book constitutes the refereed proceedings of the Second Symposium on Machine Learning and Metaheuristics Algorithms, and Applications, SoMMA 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 12 full papers and 7 short papers presented in this volume were thoroughly reviewed and se...
Article
Automated identification (auto-ID) has been widely used in practice for more than five decades, beginning with the commercial use of barcodes in the early 1970s. More recently, since about 2003, RFID (Radio Frequency IDentification) use has seen widespread adoption. While these automated identification technologies help improve convenience, effecti...
Article
Deterioration rate is an important characteristic of perishable products. While deterioration in perishables is unavoidable, there are proven ways to lower their deterioration rates. Deterioration rate is commonly treated as an exogenous parameter in extant inventory management literature. We define deterioration rate as one of the controllable var...
Article
We develop a secure attribute-based search protocol for Radio Frequency Identification (RFID) systems. This protocol can be used to simultaneously identify groups of items that share a set of attribute values. To the best of our knowledge, this is the first such work with the potential to significantly enhance the security and intelligence of RFID-...
Book
This book constitutes the refereed proceedings of the 5th International Symposium on Advances in Signal Processing and Intelligent Recognition Systems, SIRS 2019, held in Trivandrum, India, in December 2019. The 19 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 63 submissions. The papers cover w...
Article
Relay attacks generally occur between two entities that communicate with each other through wireless means. When a relay attack between a honest prover and a honest verifier occurs, an adversary tricks the prover and verifier into believing that they are indeed communicating with each other. Such attacks are rather difficult to identify and prevent...
Chapter
The past two decades have witnessed the explosive growth of RFID-based applications in healthcare settings. This includes applications that are related to ePedigree for pharmaceuticals, asset tracking and workflow management in hospitals, pervasive healthcare, among others. We consider some of the benefits that are provided by RFID-based systems in...
Chapter
With the widespread adoption and use of RFID tags, a valid scenario is one in which an RFID-tagged object includes several components that each have their own individual RFID tags. Under such a context, each of the components are bound to be included in or excluded from the main object over its lifetime. In order for only the tags that are a part o...
Book
This book constitutes the refereed proceedings of the 5th International Conference on Future Network Systems and Security, FNSS 2019, held in Melbourne, Australia, in November 2019. The 16 full papers and two short papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on emerging net...
Article
Full-text available
Faced with the challenges associated with sustainably feeding the world’s growing population, the food industry is increasingly relying on operations research (OR) techniques to achieve economic, environmental and social sustainability. It is therefore important to understand the context-specific model-oriented applications of OR techniques in the...
Article
Automated identifiers such as barcodes and RFID (Radio-Frequency IDentification) tags help with the quick identification of their associated items. When such an identifier is associated with an item, it is generally assumed that these two entities (the identifier and the tagged item) remain inseparable as long as is necessary. However, unintentiona...
Article
Full-text available
Organizations are continually looking for ways to increase the effectiveness of their product and service delivery through supply chain collaborations. Recent technologies (both software and hardware) have been designed to facilitate supply chain collaboration and partnership. Due to the different operational environment throughout the supply chain...
Chapter
A majority of existing RFID authentication protocols consider tagged items that are independent of other tagged items. However, as RFID tags permeate to item-level granularity where several items comprise an object of interest there is a need to develop protocols that seamlessly accommodate inclusion and exclusion of tags on such an object. We prop...
Article
Full-text available
Online customer reviews complement information from product and service providers. While the latter is directly from the source of the product and/or service, the former is generally from users of these products and/or services. Clearly, these two information sets are generated from different perspectives with possibly different sets of intentions....
Article
Full-text available
The rise of ubiquitous systems is sustained by the development and progressive adoption of the Internet of Things (IoT) devices and their enabling technologies. IoT has been shown to have significant potential in high-risk Environment, Health, and Safety (EHS) industries. In these industries, human lives are at stake and IoT-based applications are...
Conference Paper
We investigate the temporal ownership boundary that exists in the sharing economy. We find that temporal factors play an important role in the decisions of collaborative contribution. A collaborative contributor need not only consider the engagement duration and the potential income, but also the holding/inventory/maintenance costs during its owner...
Article
Full-text available
The identity of a product in a retail store setting is commonly represented by attached tag(s) and/or labels. This identification mechanism works reasonably well in practice. However, there are situations where such identification information may be intentionally or unintentionally separated from the associated item. While it is possible, in princi...
Article
Effective data acquisition for business process monitoring has become a critical element in today’s business world. While the need for monitoring is generally agreed upon by both re- searchers and practitioners alike, the means and mechanisms are often vague. This is especially salient with the fast growing availability of various technologies to m...
Article
A relay attack is accomplished by simply relaying messages between a prover (e.g., an RFID tag) and a verifier (e.g., an RFID reader) with the goal of convincing the verifier of its close physical proximity to the prover. In almost all relay attack scenarios, the verifier essentially communicates with a prover that is outside the verifier’s read-ra...
Article
Full-text available
We propose a smart warehouse environment where not only inventory items but also the shelves are tracked by an RFID-based system. Both operational activities and warehouse configurations are continually monitored to facilitate real-time response. We study the dynamics of a flexible warehouse scenario where items of any type can be dropped off anywh...
Article
We propose a secure RFID tag search protocol that ensures the security and privacy of the tags being searched. To our knowledge, not much work has been done in this area of RFID systems. Further, most of the current methods do not comply with the EPC standard as they use expensive hash operations or encryption schemes that cannot be implemented on...
Article
A majority of RFID authentication scenarios involve a single tag that is identified independent of other tags in the field of the reader. However, there are situations that necessitate simultaneous authentication of multiple tags as well as the verification of their simultaneous physical proximity to the reader. Juels (2004) introduced yoking proof...
Book
This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017. The 15 full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on protocol design and...
Book
Radio Frequency Identification (RFID) is a key technology in the food industry that facilitates real-time visibility of items as they move through the supply chain and on to the end-consumer. Among all the currently available automatic identification technologies, RFID has clear dominance in terms of its ability to support real-time two-way communi...
Chapter
This chapter provides an overview of radio-frequency identification (RFID) technology, Electronic Product Code (EPC) standards, sensor networks, and their market potential. In general, RFID and sensor networks can be broadly utilized throughout the food supply chain, from precision agriculture, food processing and packaging, transportation, storage...
Chapter
This chapter addresses modern marketing concepts enabled by granularized product-retailing information as well as customized consumer information. These concepts and practices are mostly enabled by radio-frequency identification (RFID) and other recent advances in information and communication technologies. The food distribution processes nowadays...
Chapter
With the increase in globalization as well as the urgent need to reduce perishable food spoilage, wastage, and contamination, the market for cold chain has witnessed steady growth, which is expected to continue at least in the immediately foreseeable future. This chapter discusses visibility in cold chains with specific emphasis on traceability and...
Chapter
This chapter first focuses on biological pathogens as well as chemical contaminants from the perspective of food quality, safety and security. It then presents the discussion on the use of different types of biosensors for foodborne pathogen detection. The potential use of biosensor-integrated radio-frequency identification (RFID) tags, which are e...
Chapter
This chapter reviews the technologies and procedures used in food processing, including preparation and separation, conversion, structural formation, stabilization, and packaging. It discusses the role and importance of radio-frequency identification (RFID) and sensor networks in various food-processing procedures. Moreover, from the vantage point...
Chapter
This chapter discusses international food policies and regulations. Specifically, it considers food-safety certification and good manufacturing practice (GMP) regulation. GMP provides the framework regarding adequately controlled manufacturing operations, which may include hygienic manufacturing facilities, controlled manufacturing processes, adequ...
Chapter
This chapter discusses big data and its applications in the food industry. Big data seems to have quickly become a strategic tool candidate for many organizations to consider seriously. Manufacturers, supply-chain managers, retailers, and even consumers use radio-frequency identification (RFID) tags that generate a relatively large amount of data,...
Chapter
This introductory chapter presents an overview of key concepts discussed in this book. The chapter first discusses a few general trends that affect the food industry- population growth and the increased interest in food quality and safety. Changing consumer preferences, rising cost of energy and raw materials, safety and legislative factors, and su...
Chapter
This chapter first investigates the role of radio-frequency identification (RFID) in reducing food waste as well as energy consumption throughout the supply chain. It then introduces the concepts of carbon footprint (CF) and life cycle sustainability assessment (LCA). Environmental LCA has been widely used by decision makers for over two decades to...
Article
The process of value creation was traditionally driven almost exclusively within the firm. Product design and production were performed with minimal input from consumers, and the role of the consumer was witnessed only at the end of the product development process. Co-creation is generally considered by innovative firms that seek to achieve or main...
Book
This book constitutes the refereed proceedings of the International Conference on Future Network Systems and Security, FNSS 2015, held in Paris, France, in June 2015. The 13 full papers presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, communications, systems and security aspects of relevance to...
Conference Paper
Real-time and item-level traceability is critical in many industries such as the food, health care, and pharmaceutical industries. However, it’s still not clear how traceability, especially at the item level and in real time, could impact supply chain health, safety, and environment (HSE) control. In this research-in-progress, we investigate this r...
Article
Inventory inaccuracies in retail stores result from a combination of controllable and uncontrollable factors such as theft, damage, spoilage, misplacement, process errors, ticket-switching, among others. While most shrinkage types affect only one (type of) item, ticket-switching simultaneously affects the inventory of multiple items. Ticket-switchi...
Article
Full-text available
Decision-making process has been explained through several models over the years. Among these, the rational and anarchical models have emerged as important representations of decision-making dynamics. The rational model and its variants of decision making emphasize recognized phases and sequence among them, while anarchical models focus on the lack...
Article
One of the important features of an RFID system is its ability to search for a particular tag among a group of tags. In order to ensure privacy and security of the tags, the search has to be conducted in a secure fashion. To our knowledge not much work has been done in this secure search area of RFID. The minimal work that has been done do not comp...
Article
Full-text available
The rapid adoption of online social networks (OSN) across different stakeholders raises several interesting questions on different facets of its dynamics. Properly governed and designed OSN can play an important role in supporting different types of decision making (DM), as they provide their participants/stakeholders various forms of support, rang...
Article
Ticket-switching incidents simultaneously and directly affect the actual and store information system inventory of multiple products. We model the discrepancy in inventory information stored in the retailer's information system vs. reality and related consequences for the customer and the retail store. We also consider a retail store with constrain...
Article
A majority of social network research deals with explicitly formed social networks. Although only rarely acknowledged for its existence, we believe that implicit social networks play a significant role in the overall dynamics of social networks. We propose a framework to evaluate the dynamics and characteristics of a set of explicit and associated...
Article
Explicit information used in the development of recommender systems includes online customer feed-back. Such explicit input from customers suffers from several types of bias, which directly affect the quality of the resulting recommender system. Recent research has identified sequential bias to be present in online customer reviews. However, to our...
Article
In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use exp...
Article
RFID (Radio Frequency Identification) is increasingly becoming a popular technology due to its many advantages over competing technology (e.g., bar code) across various application areas such as marketing, retailing, health care industry, sport industry, among others. RFID has also been widely adopted due to its relatively low cost when its benefit...
Article
As RFID tags gain popularity for everyday use, issues related to privacy and security of RFID-tagged objects become important. However, the memory and processing power constraints in low-cost RFID tags make securing these tags difficult, if not impossible. Light-weight protocols have been proposed to address this issue. Li and Wang (2007) report se...
Article
Full-text available
Motivated by advances in mass customization in business practice, explosion in the number of internet of things devices, and the lack of published research on privacy differentiation and customization, we propose a contextual information relevance model of privacy. We acknowledge the existence of individual differences with respect to unique securi...
Article
Several grouping proof protocols for RFID systems have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with the EPC class-1 gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, simultaneity, dependence...
Conference Paper
Full-text available
As wearable fitness trackers gain widespread acceptance among the general population, there is a concomitant need to ensure that associated privacy and security vulnerabilities are kept to a minimum. We discuss potential vulnerabilities of these trackers, in general, and specific vulnerabilities in one such tracker - Fitbit - identified by Rahman e...
Article
The importance of accurately measuring consumer preference for service quality management to firms in exceedingly competitive environments where customers have an increasing array of access to information cannot be overstated. There has been a resurgence of interest in consumer preference measurement and service quality management, specifically rea...
Article
Despite their implementations in a wide variety of applications, there are very few instances where every item sold at a retail store is RFID-tagged. While the business case for expensive items to be RFID tagged may be somewhat clear, we claim that even ‘cheap’ items (i.e., those that cost less than an RFID tag) should be RFID tagged for retailers...
Conference Paper
The availability of NFC smartphones has facilitated the development of a large number of related applications. Some of these NFC applications necessitate communication with other systems, which may not necessarily be secure, through communication channels and mechanisms that may be open to vulnerabilities. Security is therefore paramount to the suc...
Article
RFID (Radio-Frequency IDentification) has been proposed as a leading technology that could help reduce wastage in perishable food supply chains. This is due to their cost-effective ability to reliably identify tagged items as well as gather information on their ambient conditions through appropriate sensors. We model and study the utility of sensor...
Article
We consider RFID tags and their applications from a recycling/remanufacturing perspective and propose a novel framework to assist such process based on item-level information visibility and instantaneous tracking/tracing ability enabled by RFID. The incorporation of RFID in the reverse supply chain results in cost reduction, service and production...
Article
Full-text available
With the increase in use of a technology, its misuse possibility also increases in general. Moreover, there are instances where new technologies are implemented without thoroughly testing for vulnerabilities. We consider RFID, a disruptive technology, and related vulnerabilities in existing supply chain applications from an ethics perspective. We d...
Article
Although there is an extensive set of literature on inventory management for perishable items, a majority of these operate at a higher level where all items are assumed to have a fixed shelf-life. However, depending on how they are handled in transit as well as during storage, the remaining shelf-life of perishable items can vary. We consider peris...
Article
When a retail store places an item for sale at a set price, the expectation is that the customer pays this price for the item. However, the ‘customer’ may not necessarily pay this amount due to any number of legitimate (e.g., price promotion) as well as illegitimate (e.g., theft) reasons. We consider ticket-switching, a scenario whereby the custome...
Conference Paper
This paper introduces an innovative concept dealing with Cloud of Secure Elements (CSE), remotely accessed from NFC enable smartphones. The Near Field Communication (NFC) technology enables proximity and mobile applications dealing with payment, ticketing or access control. The idea behind CSE is to host credentials in connected mobiles, which esta...
Conference Paper
The introduction of smartphones enabled with Near Field Communication (NFC) technology facilitates transformation of processes that involve manual intervention such as payment transaction processing in an automated manner. Although payment for transaction using NFC technology is not new, the possibility to use smartphones for payment either through...
Conference Paper
A distinguishing characteristic of all perishable food products is their degradation in quality over time. The rate of degradation depends on the initial quality of the product as well as the ambient conditions they are subjected to until they reach the end of the supply chain. Clearly, a higher initial quality and relatively slow rate of degradati...
Conference Paper
As automation gains increasing popularity in supply chains and retail stores for processes such as inventory management, there is an increasing interest in automating processes in retailing environments to facilitate overall improved customer shopping experience. Advances in identification and communication technologies such as RFID (Radio Frequenc...
Article
As perishable food supply networks become more complex, incidents of contamination in these supply networks have become fairly common. Added to this complexity is the fact that there have been long delays in identifying the contamination source in several such incidents. Even when the contamination source was identified, there have been cases where...
Conference Paper
Identity-based encryption has been proposed as an alternative to public-key cryptography, which relies on the existence of public-key infrastructure and a reliable and trustworthy certification authority. With identity-based encryption, the public key is derived from users' identity information such as email address or phone number and this facilit...
Conference Paper
Ticket-switching incidents where customers switch the price tag or bar code in order to pay a lower amount for their ‘purchased item’ is not uncommon in retail stores. Since the item has to pass through a check-out counter before leaving the store, it has a (even if miniscule) positive probability of being identified. However, when item-level RFID...
Conference Paper
Full-text available
The number and extent of supply chain-related RFID applications far exceed those in the general manufacturing domain. We discuss possible reasons for this state. We review existing applications of RFID in manufacturing and discuss possible applications and related advantages and challenges.
Article
Unless specifically designed for its prevention, none of the existing RFID authentication protocols are immune to relay attacks. Relay attacks generally involve the presence of one or more adversaries who transfer unmodified messages between a prover and a verifier. Given that the message content is not modified, it is rather difficult to address r...
Article
Full-text available
When online retailing became prevalent more than a decade ago, there was a natural tendency for these retailers to mimic as many essential characteristics of the B&M (Brick & Mortar) retail stores as possible to facilitate smooth transfer of customer experience from B&M to the online shopping environment. Online stores have evolved over the years a...
Article
Authentication of Radio Frequency Identification (RFID) tags takes several forms depending on the dictates of the considered scenario. For example, mutual authentication protocols are used in scenarios where both tag and reader need to authenticate each other. We consider and develop ownership transfer protocols for three scenarios in the health ca...
Article
The increasing level of collaboration among firms has necessitated the emergence of decision support tools that span firm boundaries. This essentially translates to decision support systems that seamlessly communicate and operate with disparate system characteristics. We propose and develop a multi-enterprise collaborative decision support system f...
Article
RFID (Radio Frequency IDentification) tags are increasingly being incorporated in a wide variety of applications despite the absence of completely secure authentication protocols. While this is acceptable in some applications, there is an urgent need to address vulnerabilities in existing protocols to develop better, non-vulnerable protocols. Not s...
Article
A majority of extant literature on recommender systems assume the input data as a given to generate recommendations. Both implicit and/or explicit data are used as input in these systems. The existence of various challenges in using such input data including those associated with strategic source manipulations, sparse matrix, state data, among othe...
Article
Security/privacy issues are of paramount importance for widespread acceptance and use of radio-frequency identification (RFID) tags. Over the last few years, researchers have addressed this issue through lightweight cryptographic means. While a majority of existing RFID security/privacy protocols address authentication issues, the ability to change...
Article
Radio Frequency IDentification (RFID) tags have gained wide-spread popularity in a wide variety of application domains. However, their use in the manufacturing environment still remains at a low level. Despite maturity of related technologies, the lack of managerial understanding of potential benefits has been a major impediment to RFID tag's inroa...
Conference Paper
Full-text available
As an integral component of sustainable manufacturing, recycling and remanufacturing have been gaining popularity in line with Green initiatives. While the importance of item-level information their success has been stressed, the potential of RFID technology in recycling/remanufacturing has not received much attention in the research literature. We...
Conference Paper
A majority of RFID tag applications are related to tracking and tracing of the RFID-tagged items throughout supply chains. Tracking and tracing require communication with the tag to identify and authenticate the tag. While identification can be readily accomplished in the absence of adversaries, identification and authentication in the presence of...
Conference Paper
RFID-tagged items in a supply chain experience different types of ownerships, often simultaneously, throughout their lifetime. We consider scenarios related to ownership of RFID tags in a supply chain, specifically the seamless incorporation of third party logistics provider. We develop protocol for authentication of RFID-tagged items under such co...