Skip to main content

A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8352))

Abstract

Counterfeiting is a very serious threat to supply chain management systems. RFID systems are widely used to automate and speed up the process of remotely identifying products, however these systems are vulnerable to counterfeiting. In this paper, we propose a hierarchical anti-counterfeiting mechanism which uses a layered approach to identify dishonest middle parties involved in both counterfeiting and processing stolen/missing items. Our layered approach, which is designed for EPC Class-1 Gen-2 standard compliant tags, offers scalability and is suitable for different sizes of groups of tagged items.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lee, Y., Cheng, F., Leung, Y.T.: Exploring the impact of RFID on supply chain dynamics. In: Simulation Conference, December 2004, vol. 2, pp. 1145–1152. IEEE (2004)

    Google Scholar 

  2. Juels, A., Pappu, R., Parno, B.: Unidirectional key distribution across time and space with applications to RFID security. In: Proceedings of the 17th USENIX Security Symposium, July–August 2008, pp. 75–90 (2008)

    Google Scholar 

  3. Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  4. Avery, P., Cerri, F., Fayle, L.H., Olsen, K., Scorpeci, D., Stryzowski, P.: The economic impact of counterfeiting and piracy. Organisation for Economic Co-operation and Development (OECD) (2008)

    Google Scholar 

  5. Standards, G.E.: EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz. In: Specification for RFID Air Interface (2008)

    Google Scholar 

  6. Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: From identification to authentication - a review of RFID product authentication techniques. In: Cole, P.H., Ranasinghe, D.C. (eds.) Networked RFID Systems and Lightweight Cryptography, pp. 169–187. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Saarinen, M.-J.O., Engels, D.: A do-it-all-cipher for RFID: design requirements (extended abstract). Cryptology ePrint Archive, Report 2012/317. IACR (2012)

    Google Scholar 

  8. Koh, R., Schuster, E.W., Chackrabarti, I., Bellman, A.: Securing the pharmaceutical supply chain. White Paper, Auto-ID Labs, Massachusetts Institute of Technology (2003)

    Google Scholar 

  9. Takaragi, K., Usami, M., Imura, R., Itsuki, R., Satoh, T.: An ultra small individual recognition security chip. IEEE Micro 21(6), 43–49 (2001)

    Article  Google Scholar 

  10. Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network: the potential of RFID in anti-counterfeiting. In: Proceedings of the 2005 ACM Symposium on Applied Computing, ser. SAC ’05, vol. 6, pp. 1607–1612. ACM (2005)

    Google Scholar 

  11. Pearson, J.: Securing the pharmaceutical supply chain with RFID and Public-key Infrastructure (PKI) technologies. Texas Instruments White Paper, June 2005

    Google Scholar 

  12. Vajda, I., Buttyán, L.: Lightweight authentication protocols for low-cost RFID tags. In: Second Workshop on Security in Ubiquitous Computing, ser. Ubicomp 2003 (2003)

    Google Scholar 

  13. Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)

    Google Scholar 

  14. Feldhofer, M., Aigner, M., Dominikus, S.: An application of RFID tags using secure symmetric authentication. In: International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 43–49 (2005)

    Google Scholar 

  15. Dominikus, S., Oswald, E., Feldhofer, M.: Symmetric authentication for RFID systems in practice. In: The Ecrypt Workshop on RFID and Lightweight Crypto, July 2005

    Google Scholar 

  16. Poschmann, A., Leander, G., Schramm, K., Paar, C.: A family of light-weight block ciphers based on DES suited for RFID applications. In: Workshop on RFID Security. LNCS (2006)

    Google Scholar 

  17. Arbit, A., Oren, Y., Wool, A.: Toward practical public key anti-counterfeiting for low-cost EPC tags. In: International IEEE Conference on RFID (2011)

    Google Scholar 

  18. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: An elliptic curve processor suitable for RFID-tags. In: IACR (2006)

    Google Scholar 

  19. Martínez, S., Valls, M., Roig, C., Miret, J.M., Giné, F.: A secure elliptic curve-based RFID protocol. J. Comput. Sci. Technol. 24(2), 309–318 (2009)

    Article  Google Scholar 

  20. Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)

    Google Scholar 

  21. Lee, Y.-S., Kim, T.-Y., Lee, H.J.: Mutual authentication protocol for enhanced RFID security and anti-counterfeiting. In: 26th International Conference on Advanced Information Networking and Applications Workshops, 2012, pp. 558–563 (2012)

    Google Scholar 

  22. Juels, A.: Strengthening EPC tags against cloning. RSA Laboratories, March 2005

    Google Scholar 

  23. Engels, D., Saarinen, M.-J., Schweitzer, P., Smith, E.M.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19–31. Springer, Heidelberg (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zeeshan Bilal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bilal, Z., Martin, K. (2014). A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs. In: Danger, J., Debbabi, M., Marion, JY., Garcia-Alfaro, J., Zincir Heywood, N. (eds) Foundations and Practice of Security. FPS 2013. Lecture Notes in Computer Science(), vol 8352. Springer, Cham. https://doi.org/10.1007/978-3-319-05302-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05302-8_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05301-1

  • Online ISBN: 978-3-319-05302-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics