Abstract
The use of RFID (Radio Frequency Identification) technology can be employed for automating and streamlining safe and accurate brand identification (ID) uniquely in real-time to protect consumers from counterfeited products. By placing brand tags (RFID tags) on brands at the point of manufacture, vendors and retailers can trace products throughout the supply chain. We outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. Despite these potential benefits, security, and privacy issues are the key factors in the deployment of a web-based RFID-enabled system in anti-counterfeiting schemes. This paper proposes an asymmetric cryptosystem to secure RFID transmission in retail supply chain using Elliptic Curve Cryptographic (ECC) techniques. The uses of ECC techniques provide greater strength than other current cryptosystems (such as RSA, and DSA) for any given key length, enables the use of smaller key size, resulting in significantly lower memory requirements, and faster computations, thus, making it suitable for wireless and mobile applications, including handheld devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
International Anti-counterfeiting Coalition, IACC (2005)
International Intellectual Property Institute, IIPI (2003)
Amine, L.S., Magnusson, P.: Cost-benefit models of stakeholders in the global counterfeiting industry and marketing response strategies. Multinational Business Review, 1–23 (2007)
Organisation for Economic Co-operation and Development, The economic impact of counterfeiting. Organisation for Economic Co-operation and Development, Paris (1998)
WHO, The Need for Global Standards and Solutions to Combat Counterfeiting (2012), http://www.gs1.org/docs/GS1_Anti-Counterfeiting_White_Paper.pdf (accessed on July 05, 2013)
Phau, I., Teah, M., Lee, A.: Targeting buyers of counterfeits of luxury brands: A study on attitudes of Singaporean consumers. Journal of Targeting, Measurement & Analysis for Marketing 17(1), 3–15 (2009)
Staake, T., Thiesse, F., Fleisch, E.: The emergence of counterfeit trade: a literature review Export. European Journal of Marketing 43(3-4), 320–349 (2009)
Bloch, P.H., Bush, R.F., Campbell, L.: Consumer “accomplices” in product counterfeiting. Journal of Consumer Marketing 10(4), 27–36 (1993)
Cordell, V.V., Wongtada, N., Kieschnick, R.L.: Counterfeit purchase intentions: Role of lawfulness attitudes and product traits as determinants. Journal of Business Research 35(1), 41–53 (1996)
Wee, C.H., Ta, S.J., Cheok, K.H.: Non-price determinants of intention to purchase counterfeit goods: An exploratory study. International Marketing Revie 12(6), 19–46 (1995)
Bush, R.F., Bloch, P.H., Dawson, S.: Remedies for product counterfeiting. Business Horizons 32(1), 59–65 (1989)
Siponen, M.T., Vartiainen, T.: Unauthorized copying of software and levels of moral development: Implications for research and practice. Information Systems Journal 14(4), 387–407 (2004)
Cottman, L.: It’s not the real thing. Security Management 36(12), 68–70 (1992); Cole, C.A.: Deterrence and consumer fraud. Journal of Retailing 65, 107–120 (1989)
Veloutsou, C., Bian, X.: A cross-national examination of consumer perceived risk in the context of non-deceptive counterfeit brands. Journal of Consumer Behavior 7(1), 3–20 (2008)
Richetto, D.: Advanced security prevents counterfeit products, Inside Secure - November 4 (2011)
Chaudhry, P.E., Cordell, V., Zimmerman, A.: Modeling anti-counterfeiting strategies in response to protecting intellectual property rights in a global environment (2005)
Phau, I., Prendergast, G.: ‘Custom-made fakes: A mutant strain of counterfeit products’. In: Proceedings of Globalisation of Business Conference, Cyprus, November 16-18 (1998b)
International Trademark Association, Addressing the Sale of Counterfeits on the Internet (2009), http://www.inta.org/Advocacy/Documents/INTA%20Best%20Practices%20for%20Addressing%20the%20Sale%20of%20Counterfeits%20on%20the%20Internet.pdf (accessed on July 05, 2013)
Chowdhury, B., Khosla, R., Chowdhury, M.: Real-time Secured RFID-based Smart Healthcare Management System. International Journal of Computer & Information Science (IJCIS) 9(3) (2008)
Shepard, S.: RFID Radio Frequency Identification. The McGraw-Hall Companies, Inc., USA (2005)
Cottman, L.: It’s not the real thing. Security Management 36(12), 68–70 (1992); Cole, C.A.: Deterrence and consumer fraud. Journal of Retailing 65, 107–120 (1989)
Die, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107–125 (1992)
National Security Agency, The Case for Elliptic Curve Cryptography (2009), http://www.nsa.gov/business/programs/elliptic_curve.shtml (accessed on July 09, 2013)
Beller, M.J., Chang, L.-F., Yacobi, J.: Privacy and authentication on a portable communications systems. IEEE Journal on Selected Areas in Communications 11(6), 821–829 (1993)
U.S. Government Accountability Office, “Radio Frequency Identification Technology in the Federal Government”, 441 G Street NW, Room LM Washington, D.C. 20548 (2005)
Glover, B., Bhatt, H.: RFID Essentials. O’Reilly Media, Inc. 1005 Gravenstein Highway North, Sebastopol, CA 95472 (January 2006)
Denis, L.: What is WiFi? An Introduction to Wireless Networks for the Small/Medium Enterprise (SME), http://www.openxtra.co.uk/articles/wifiintroduction.php (accessed on February 10, 2007)
Bacheldor, B.: Strong sales growth expected for RFID tags, Manufacturers’ Monthly (December 10, 2007), http://www.manmonthly.com.au/articles/Strong-salesgrowth-expected-for-RFID-tags_z138655.htm (accessed on February 11, 2011)
Enge, A.: Elliptic curves and their applications to cryptography. Kluwer Academic Publishers, Norwell (1999)
Menezes, J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)
Lopez, J., Dahab, R.: An overview of elliptic curve cryptography (May 2000)
Richetto, D.: Advanced security prevents counterfeit products, Inside Secure - November 4 (2011)
Riley, B., Schmidt, A., Tubin, G.: SMS in Financial Services: Accessing Your Customers on Their Terms, TowerGroup (2011), Research is available on the Internet at http://www.towergroup.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chowdhury, B., Chowdhury, M., Abawajy, J. (2013). Securing a Web-Based Anti-counterfeit RFID System. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds) Security and Privacy in Communication Networks. SecureComm 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 127. Springer, Cham. https://doi.org/10.1007/978-3-319-04283-1_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-04283-1_21
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04282-4
Online ISBN: 978-3-319-04283-1
eBook Packages: Computer ScienceComputer Science (R0)