Abstract
Traces of RFID-equipped item can be used to detect counterfeits. Nevertheless companies are reluctant to share the necessary traces, since it is unclear what can be inferred from them. In this paper we present a provably secure pattern matching algorithm that can be used for distributed anomaly detection. We improve performance and detection capabilities compared to competing approaches by storing partial, malleable information on the RFID tag.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Applebaum, B., Freedman, M., Ringberg, H., Caesar, M., Rexford J.: Collaborative, Privacy-Preserving Data Aggregation At Scale (2009), http://eprint.iacr.org/2009/180.pdf
Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proceesings of the 15th ACM Conference on Computer and Communications Security, CCS (2008)
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th annual ACM symposium on Theory of computing (1988)
Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Security through Private Information Aggregation (2009), http://arxiv1.library.cornell.edu/abs/0903.4258
Du, W., Atallah, M.: Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. In: Proceedings of the Workshop on New Security Paradigms (2001)
European Commission. Report on Community Customs Activities on Counterfeit and Piracy (2008)
Flajolet, P., Gardy, D., Thimonier, L.: Birthday paradox, coupon collectors, caching algorithms and self-organizing search. Discrete Applied Mathematics 39(3) (1992)
Goldreich, O.: Secure Multi-party Computation (2002), www.wisdom.weizmann.ac.il/~oded/pp.html
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th ACM Symposium on Theory of Computing (1987)
Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Proceedings of the 5th Theory of Cryptography Conference (2008)
Kerschbaum, F.: Practical Privacy-Preserving Benchmarking. In: Proceedings of the 23rd IFIP International Information Security Conference (2008)
Kerschbaum, F., Dahlmeier, D., Schröpfer, A., Biswas, D.: On the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols. In: Proceedings of the 24th ACM Symposium on Applied Computing (2009)
Kuerschner, C., Thiesse, F., Fleisch, E.: An analysis of data-on-tag concepts in manufacturing. In: Proceedings of the 3rd Konferenz Ubiquitäre und Mobile Informationssysteme (2008)
Lee, A., Tabriz, P., Borisov, N.: A Privacy-Preserving Interdomain Audit Framework. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society (2006)
Lehtonen, M., Michahelles, F., Fleisch, E.: How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces. In: Proceedings of the IEEE RFID Conference (2009)
Lincoln, P., Porras, P., Shmatikov, V.: Privacy-Preserving Sharing and Correlation of Security Alerts. In: Proceedings of the USENIX Security Symposium (2004)
Locasto, M., Parekh, J., Keromytis, A., Stolfo, S.: Towards Collaborative Security and P2P Intrusion Detection. In: Proceedings of the Information Assurance Workshop (2005)
Mirowski, L., Hartnett, J.: Deckard: A System to Detect Change of RFID Tag Ownership. International Journal of Computer Science and Network Security 7(7) (2007)
Oertel, N.: Tracking based product authentication: Catching intruders in the supply chain. In: Proceedings of the 17th European Conference on Information Systems (2008)
Parekh, J., Wang, K., Stolfo, S.: Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection. In: Proceedings of the SIGCOMM Workshop on Large-Scale Attack Defense (2006)
Porras, P., Shmatikov, V.: Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges. In: Proceedings of the Workshop on New Security Paradigms (2006)
Santos, B., Smith, L.: RFID in the Supply Chain: Panacea or Pandora’s Box? Communications of the ACM 51(10) (2008)
Sarma, S., Brock, D., Engels, D.: Radio frequency identification and the electronic product code. IEEE Micro. 21(6) (2001)
Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network – The Potential of RFID in Anti-Counterfeiting. In: Proceedings of the 20th ACM Symposium on Applied Computing (2005)
Yao, A.: Protocols for Secure Computations. In: Proceedings of the IEEE Symposium on Foundations of Computer Science (1982)
Zanetti, D., Fellmann, L., Capkun, S.: Privacy-preserving Clone Detection for RFID-enabled Supply Chains. In: Proceedings of the IEEE International Conference on RFID (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kerschbaum, F., Oertel, N. (2010). Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting. In: Ors Yalcin, S.B. (eds) Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010. Lecture Notes in Computer Science, vol 6370. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16822-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-16822-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16821-5
Online ISBN: 978-3-642-16822-2
eBook Packages: Computer ScienceComputer Science (R0)