Abstract
Counterfeiting is a very serious threat to supply chain management systems. RFID systems are widely used to automate and speed up the process of remotely identifying products, however these systems are vulnerable to counterfeiting. In this paper, we propose a hierarchical anti-counterfeiting mechanism which uses a layered approach to identify dishonest middle parties involved in both counterfeiting and processing stolen/missing items. Our layered approach, which is designed for EPC Class-1 Gen-2 standard compliant tags, offers scalability and is suitable for different sizes of groups of tagged items.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lee, Y., Cheng, F., Leung, Y.T.: Exploring the impact of RFID on supply chain dynamics. In: Simulation Conference, December 2004, vol. 2, pp. 1145–1152. IEEE (2004)
Juels, A., Pappu, R., Parno, B.: Unidirectional key distribution across time and space with applications to RFID security. In: Proceedings of the 17th USENIX Security Symposium, July–August 2008, pp. 75–90 (2008)
Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)
Avery, P., Cerri, F., Fayle, L.H., Olsen, K., Scorpeci, D., Stryzowski, P.: The economic impact of counterfeiting and piracy. Organisation for Economic Co-operation and Development (OECD) (2008)
Standards, G.E.: EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz. In: Specification for RFID Air Interface (2008)
Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: From identification to authentication - a review of RFID product authentication techniques. In: Cole, P.H., Ranasinghe, D.C. (eds.) Networked RFID Systems and Lightweight Cryptography, pp. 169–187. Springer, Heidelberg (2008)
Saarinen, M.-J.O., Engels, D.: A do-it-all-cipher for RFID: design requirements (extended abstract). Cryptology ePrint Archive, Report 2012/317. IACR (2012)
Koh, R., Schuster, E.W., Chackrabarti, I., Bellman, A.: Securing the pharmaceutical supply chain. White Paper, Auto-ID Labs, Massachusetts Institute of Technology (2003)
Takaragi, K., Usami, M., Imura, R., Itsuki, R., Satoh, T.: An ultra small individual recognition security chip. IEEE Micro 21(6), 43–49 (2001)
Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network: the potential of RFID in anti-counterfeiting. In: Proceedings of the 2005 ACM Symposium on Applied Computing, ser. SAC ’05, vol. 6, pp. 1607–1612. ACM (2005)
Pearson, J.: Securing the pharmaceutical supply chain with RFID and Public-key Infrastructure (PKI) technologies. Texas Instruments White Paper, June 2005
Vajda, I., Buttyán, L.: Lightweight authentication protocols for low-cost RFID tags. In: Second Workshop on Security in Ubiquitous Computing, ser. Ubicomp 2003 (2003)
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)
Feldhofer, M., Aigner, M., Dominikus, S.: An application of RFID tags using secure symmetric authentication. In: International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 43–49 (2005)
Dominikus, S., Oswald, E., Feldhofer, M.: Symmetric authentication for RFID systems in practice. In: The Ecrypt Workshop on RFID and Lightweight Crypto, July 2005
Poschmann, A., Leander, G., Schramm, K., Paar, C.: A family of light-weight block ciphers based on DES suited for RFID applications. In: Workshop on RFID Security. LNCS (2006)
Arbit, A., Oren, Y., Wool, A.: Toward practical public key anti-counterfeiting for low-cost EPC tags. In: International IEEE Conference on RFID (2011)
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: An elliptic curve processor suitable for RFID-tags. In: IACR (2006)
Martínez, S., Valls, M., Roig, C., Miret, J.M., Giné, F.: A secure elliptic curve-based RFID protocol. J. Comput. Sci. Technol. 24(2), 309–318 (2009)
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)
Lee, Y.-S., Kim, T.-Y., Lee, H.J.: Mutual authentication protocol for enhanced RFID security and anti-counterfeiting. In: 26th International Conference on Advanced Information Networking and Applications Workshops, 2012, pp. 558–563 (2012)
Juels, A.: Strengthening EPC tags against cloning. RSA Laboratories, March 2005
Engels, D., Saarinen, M.-J., Schweitzer, P., Smith, E.M.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19–31. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Bilal, Z., Martin, K. (2014). A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs. In: Danger, J., Debbabi, M., Marion, JY., Garcia-Alfaro, J., Zincir Heywood, N. (eds) Foundations and Practice of Security. FPS 2013. Lecture Notes in Computer Science(), vol 8352. Springer, Cham. https://doi.org/10.1007/978-3-319-05302-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-05302-8_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05301-1
Online ISBN: 978-3-319-05302-8
eBook Packages: Computer ScienceComputer Science (R0)