Skip to main content

Securing a Web-Based Anti-counterfeit RFID System

  • Conference paper
Security and Privacy in Communication Networks (SecureComm 2013)

Abstract

The use of RFID (Radio Frequency Identification) technology can be employed for automating and streamlining safe and accurate brand identification (ID) uniquely in real-time to protect consumers from counterfeited products. By placing brand tags (RFID tags) on brands at the point of manufacture, vendors and retailers can trace products throughout the supply chain. We outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. Despite these potential benefits, security, and privacy issues are the key factors in the deployment of a web-based RFID-enabled system in anti-counterfeiting schemes. This paper proposes an asymmetric cryptosystem to secure RFID transmission in retail supply chain using Elliptic Curve Cryptographic (ECC) techniques. The uses of ECC techniques provide greater strength than other current cryptosystems (such as RSA, and DSA) for any given key length, enables the use of smaller key size, resulting in significantly lower memory requirements, and faster computations, thus, making it suitable for wireless and mobile applications, including handheld devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. International Anti-counterfeiting Coalition, IACC (2005)

    Google Scholar 

  2. International Intellectual Property Institute, IIPI (2003)

    Google Scholar 

  3. Amine, L.S., Magnusson, P.: Cost-benefit models of stakeholders in the global counterfeiting industry and marketing response strategies. Multinational Business Review, 1–23 (2007)

    Google Scholar 

  4. Organisation for Economic Co-operation and Development, The economic impact of counterfeiting. Organisation for Economic Co-operation and Development, Paris (1998)

    Google Scholar 

  5. WHO, The Need for Global Standards and Solutions to Combat Counterfeiting (2012), http://www.gs1.org/docs/GS1_Anti-Counterfeiting_White_Paper.pdf (accessed on July 05, 2013)

  6. Phau, I., Teah, M., Lee, A.: Targeting buyers of counterfeits of luxury brands: A study on attitudes of Singaporean consumers. Journal of Targeting, Measurement & Analysis for Marketing 17(1), 3–15 (2009)

    Article  Google Scholar 

  7. Staake, T., Thiesse, F., Fleisch, E.: The emergence of counterfeit trade: a literature review Export. European Journal of Marketing 43(3-4), 320–349 (2009)

    Article  Google Scholar 

  8. Bloch, P.H., Bush, R.F., Campbell, L.: Consumer “accomplices” in product counterfeiting. Journal of Consumer Marketing 10(4), 27–36 (1993)

    Article  Google Scholar 

  9. Cordell, V.V., Wongtada, N., Kieschnick, R.L.: Counterfeit purchase intentions: Role of lawfulness attitudes and product traits as determinants. Journal of Business Research 35(1), 41–53 (1996)

    Article  Google Scholar 

  10. Wee, C.H., Ta, S.J., Cheok, K.H.: Non-price determinants of intention to purchase counterfeit goods: An exploratory study. International Marketing Revie 12(6), 19–46 (1995)

    Article  Google Scholar 

  11. Bush, R.F., Bloch, P.H., Dawson, S.: Remedies for product counterfeiting. Business Horizons 32(1), 59–65 (1989)

    Article  Google Scholar 

  12. Siponen, M.T., Vartiainen, T.: Unauthorized copying of software and levels of moral development: Implications for research and practice. Information Systems Journal 14(4), 387–407 (2004)

    Article  Google Scholar 

  13. Cottman, L.: It’s not the real thing. Security Management 36(12), 68–70 (1992); Cole, C.A.: Deterrence and consumer fraud. Journal of Retailing 65, 107–120 (1989)

    Google Scholar 

  14. Veloutsou, C., Bian, X.: A cross-national examination of consumer perceived risk in the context of non-deceptive counterfeit brands. Journal of Consumer Behavior 7(1), 3–20 (2008)

    Article  Google Scholar 

  15. Richetto, D.: Advanced security prevents counterfeit products, Inside Secure - November 4 (2011)

    Google Scholar 

  16. Chaudhry, P.E., Cordell, V., Zimmerman, A.: Modeling anti-counterfeiting strategies in response to protecting intellectual property rights in a global environment (2005)

    Google Scholar 

  17. Phau, I., Prendergast, G.: ‘Custom-made fakes: A mutant strain of counterfeit products’. In: Proceedings of Globalisation of Business Conference, Cyprus, November 16-18 (1998b)

    Google Scholar 

  18. International Trademark Association, Addressing the Sale of Counterfeits on the Internet (2009), http://www.inta.org/Advocacy/Documents/INTA%20Best%20Practices%20for%20Addressing%20the%20Sale%20of%20Counterfeits%20on%20the%20Internet.pdf (accessed on July 05, 2013)

  19. Chowdhury, B., Khosla, R., Chowdhury, M.: Real-time Secured RFID-based Smart Healthcare Management System. International Journal of Computer & Information Science (IJCIS) 9(3) (2008)

    Google Scholar 

  20. Shepard, S.: RFID Radio Frequency Identification. The McGraw-Hall Companies, Inc., USA (2005)

    Google Scholar 

  21. Cottman, L.: It’s not the real thing. Security Management 36(12), 68–70 (1992); Cole, C.A.: Deterrence and consumer fraud. Journal of Retailing 65, 107–120 (1989)

    Google Scholar 

  22. Die, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2, 107–125 (1992)

    Article  MathSciNet  Google Scholar 

  23. National Security Agency, The Case for Elliptic Curve Cryptography (2009), http://www.nsa.gov/business/programs/elliptic_curve.shtml (accessed on July 09, 2013)

  24. Beller, M.J., Chang, L.-F., Yacobi, J.: Privacy and authentication on a portable communications systems. IEEE Journal on Selected Areas in Communications 11(6), 821–829 (1993)

    Article  Google Scholar 

  25. U.S. Government Accountability Office, “Radio Frequency Identification Technology in the Federal Government”, 441 G Street NW, Room LM Washington, D.C. 20548 (2005)

    Google Scholar 

  26. Glover, B., Bhatt, H.: RFID Essentials. O’Reilly Media, Inc. 1005 Gravenstein Highway North, Sebastopol, CA 95472 (January 2006)

    Google Scholar 

  27. Denis, L.: What is WiFi? An Introduction to Wireless Networks for the Small/Medium Enterprise (SME), http://www.openxtra.co.uk/articles/wifiintroduction.php (accessed on February 10, 2007)

  28. Bacheldor, B.: Strong sales growth expected for RFID tags, Manufacturers’ Monthly (December 10, 2007), http://www.manmonthly.com.au/articles/Strong-salesgrowth-expected-for-RFID-tags_z138655.htm (accessed on February 11, 2011)

  29. Enge, A.: Elliptic curves and their applications to cryptography. Kluwer Academic Publishers, Norwell (1999)

    Book  MATH  Google Scholar 

  30. Menezes, J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)

    Book  MATH  Google Scholar 

  31. Lopez, J., Dahab, R.: An overview of elliptic curve cryptography (May 2000)

    Google Scholar 

  32. Richetto, D.: Advanced security prevents counterfeit products, Inside Secure - November 4 (2011)

    Google Scholar 

  33. Riley, B., Schmidt, A., Tubin, G.: SMS in Financial Services: Accessing Your Customers on Their Terms, TowerGroup (2011), Research is available on the Internet at http://www.towergroup.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chowdhury, B., Chowdhury, M., Abawajy, J. (2013). Securing a Web-Based Anti-counterfeit RFID System. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds) Security and Privacy in Communication Networks. SecureComm 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 127. Springer, Cham. https://doi.org/10.1007/978-3-319-04283-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04283-1_21

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04282-4

  • Online ISBN: 978-3-319-04283-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics