skip to main content
research-article

RF-Chain: Decentralized, Credible, and Counterfeit-proof Supply Chain Management with Commodity RFIDs

Published:11 January 2023Publication History
Skip Abstract Section

Abstract

Blockchain-based supply chains provide a new solution to decentralized multi-party product management. However, existing methods, including ID-based and cryptographic-based solutions, cannot achieve both counterfeit resistance and decentralization in supply chain management. We argue that this dilemma comes from the disconnection and inconsistency of the data records and physical product entities. This paper proposes RF-Chain, a novel decentralized supply chain management solution that uniquely combines data record authentication and physical-layer RFID tag authentication to effectively achieve credibility and counterfeit resistance. The main contribution of this work is to integrate physical-layer authentication of cheap commodity RFID tags into a blockchain-based information management system, and RF-Chain is the first to do so. The proposed cross-layer authentication can effectively defend against counterfeit attacks without relying on a central key management service. Real-world experiments utilizing the Ethereum (ETH) platform and more than 100 RFID tags demonstrate that RF-Chain is secure, effective, time-efficient, and cost-efficient.

References

  1. Elkhiyaoui, Kaoutar and Blass, Erik Oliver and Molva, Refik. 2012. CHECKER: On-site checking in RFID-based supply chains. Proceedings of ACM WiSec (2012).Google ScholarGoogle Scholar
  2. Mansoor Alblooshi, Khaled Salah, and Yousof Alhammadi. 2018. Blockchain-based ownership management for medical IoT (MIoT) devices. In Proceedings on IEEE IIT. IEEE, 151--156.Google ScholarGoogle ScholarCross RefCross Ref
  3. Mehmet Baygin, Orhan Yaman, Nursena Baygin, and Mehmet Karakose. 2022. A blockchain-based approach to smart cargo transportation using UHF RFID. Expert Systems with Applications 188 (2022), 116030.Google ScholarGoogle ScholarCross RefCross Ref
  4. Britney Brown. 2021. 10 Retail companies using blockchain technology. https://www.getdor.com/blog/2021/09/14/retail-companies-using-blockchain- technology/Google ScholarGoogle Scholar
  5. S. Cai, T. Li, C. Ma, Y. Li, and R. H. Deng. 2009. Enabling secure secret updating for unidirectional key distribution in RFID-enabled supply chains. In Information & Communications Security, International Conference, Icics, Beijing, China, December.Google ScholarGoogle Scholar
  6. Roberto Casado-Vara, Javier Prieto, Fernando De la Prieta, and Juan M Corchado. 2018. How blockchain improves the supply chain: Case study alimentary supply chain. Procedia computer science 134 (2018), 393--398.Google ScholarGoogle Scholar
  7. Arijit Chakrabarti and Ashesh Kumar Chaudhuri. 2017. Blockchain and its scope in retail. International Research Journal of Engineering and Technology 4, 7 (2017), 3053--3056.Google ScholarGoogle Scholar
  8. Xingyu Chen, Jia Liu, Xia Wang, Haisong Liu, Dong Jiang, and Lijun Chen. 2020. Eingerprint: Robust energy-related fingerprinting for passive RFID tags. In Proceedings of USENIX NSDI. 1101--1113.Google ScholarGoogle Scholar
  9. Marco Conoscenti, Antonio Vetro, and Juan Carlos De Martin. 2016. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of IEEE/ACS AICCSA. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  10. Boris Danev, Thomas S Heydt-Benjamin, and Srdjan Capkun. 2009. Physical-layer Identification of RFID Devices.. In Usenix Security Symposium. 199--214.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. 2010. Attacks on physical-layer identification. In Proceedings of the third ACM conference on Wireless network security. ACM, 89--98.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. EPCglobal. 2005. EPC™ radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz--960 MHz.Google ScholarGoogle Scholar
  13. Santiago Figueroa, Javier Añorga, and Saioa Arrizabalaga. 2019. An attribute-based access control model in RFID systems based on blockchain decentralized applications for healthcare environments. Computers 8, 3 (2019), 57.Google ScholarGoogle ScholarCross RefCross Ref
  14. Vishal Gaur and Abhinav Gaiha. 2020. Building a Transparent Supply Chain. https://hbr.org/2020/05/building-a-transparent-supply-chain Accessed, May-June, 2020.Google ScholarGoogle Scholar
  15. Poonam Ghuli, Urvashi Priyam Kumar, and Rajashree Shettar. 2017. A review on blockchain application for decentralized decision of ownership of IoT devices. Advances in Computational Sciences and Technology 10, 8 (2017), 2449--2456.Google ScholarGoogle Scholar
  16. F. Guo, M. Yi, W. Susilo, and V. Varadharajan. 2017. Privacy-preserving mutual authentication in RFID with designated readers. Wireless Personal Communications 96, 3 (2017), 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Wei Xi, Zhiping Jiang, and Zhi Wang. 2016. Twins: Device-free object tracking using passive tags. IEEE/ACM Transactions on Networking (TON) 24, 3 (2016), 1605--1617.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Han, C. Qian, P. Yang, D. Ma, Z. Jiang, W. Xi, and J. Zhao. 2016. GenePrint: Generic and accurate physical-layer identification for UHF RFID tags. IEEE/ACM Transactions on Networking (TON) (2016).Google ScholarGoogle Scholar
  19. Jinsong Han, Chen Qian, Yuqin Yang, Ge Wang, Han Ding, Xin Li, and Kui Ren. 2018. Butterfly: Environment-independent physical-layer authentication for passive rfid. Proceedings of the ACM Ubicomp 2, 4 (2018), 1--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Shruti Jain. [n. d.]. Can blockchain accelerate Internet of Things (IoT) adoption? https://www2.deloitte.com/ch/en/pages/innovation/articles/blockchain-accelerate-iot-adoption.html.Google ScholarGoogle Scholar
  21. A. Juels and B. Parno. 2010. Unidirectional key distribution across time and space with applications to RFID security. Cryptology ePrint Archive (2010).Google ScholarGoogle Scholar
  22. J. H. Khor, W. Ismail, and M. G. Rahman. 2012. Prevention and Detection Methods for Enhancing Security in an RFID System. International Journal of Distributed Sensor Networks (2012), 264--283.Google ScholarGoogle Scholar
  23. J. H. Khor, W. Ismail, and M. G. Rahman. 2014. Detecting counterfeit RFID tags using digital forensic. Studies in Computational Intelligence 555 (2014), 211--251.Google ScholarGoogle Scholar
  24. Kari Korpela, Jukka Hallikas, and Tomi Dahlberg. 2017. Digital supply chain transformation toward blockchain integration. In Proceedings of Hawaii system sciences.Google ScholarGoogle ScholarCross RefCross Ref
  25. N. Kumar, K. Kaur, S. C. Misra, and R. Iqbal. 2016. An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications 9, 5 (2016), 824--840.Google ScholarGoogle ScholarCross RefCross Ref
  26. M. Langheinrich and R. Marti. 2007. Practical Minimalist Cryptography for RFID Privacy. IEEE Systems Journal 1, 2 (2007), 115--128.Google ScholarGoogle ScholarCross RefCross Ref
  27. Aleksandr Lanko, Nickolay Vatin, and Arturas Kaklauskas. 2018. Application of RFID combined with blockchain technology in logistics of construction materials. In Matec Web of conferences, Vol. 170. EDP Sciences, 03032.Google ScholarGoogle ScholarCross RefCross Ref
  28. Iuon-Chang Lin, Hung-Huei Hsu, and Chen-Yang Cheng. 2015. A cloud-based authentication protocol for RFID supply chain systems. Journal of Network and Systems Management 23, 4 (2015), 978--997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. C. Lv, X. Jia, J. Lin, J. Jing, and L. Tian. 2011. An efficient group-based secret sharing scheme. Lecture Notes in Computer Science 6672 (2011), 288--301.Google ScholarGoogle ScholarCross RefCross Ref
  30. Saikat Mondal, Kanishka P Wijewardena, Saranraj Karuppuswami, Nitya Kriti, Deepak Kumar, and Premjeet Chahal. 2019. Blockchain inspired RFID-based information architecture for food supply chain. IEEE Internet of Things Journal 6, 3 (2019), 5803--5813.Google ScholarGoogle ScholarCross RefCross Ref
  31. U. Mujahid, M. Najam-Ul-Islam, and M. Khalid. 2017. Efficient hardware implementation of KMAP+: an ultralightweight mutual authentication protocol. Journal of Circuits, Systems and Computers 27, 2 (2017), 1850033.1--1850033.16.Google ScholarGoogle ScholarCross RefCross Ref
  32. Senthilkumar Chinnappa Gounder Periaswamy, Dale R Thompson, and Jia Di. 2011. Fingerprinting RFID tags. IEEE Transactions on Dependable and Secure Computing 8, 6 (2011), 938--943.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Sara Saberi, Mahtab Kouhizadeh, Joseph Sarkis, and Lejia Shen. 2019. Blockchain technology and its relationships to sustainable supply chain management. International Journal of Production Research 57, 7 (2019), 2117--2135.Google ScholarGoogle ScholarCross RefCross Ref
  34. Longfei Shangguan. 2016. USRP Gen2 Reader. https://github.com/shanggdlk/Gen2-UHF-RFID-Reader/.Google ScholarGoogle Scholar
  35. Michail Sidorov, Ming Tze Ong, Ravivarma Vikneswaren Sridharan, Junya Nakamura, Ren Ohmura, and Jing Huey Khor. 2019. Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. IEEE Access 7 (2019), 7273--7285.Google ScholarGoogle ScholarCross RefCross Ref
  36. T. Staake, F. Thiesse, and E. Fleisch. 2005. Extending the EPC network - the potential of RFID in anti-vounterfeiting. Proceedings of ACM Symp. Comput. (2005), 1607--1612.Google ScholarGoogle Scholar
  37. P. Syverson. 1991. The use of logic in the analysis of cryptographic protocols. In Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on.Google ScholarGoogle ScholarCross RefCross Ref
  38. Aakanksha Tewari and Brij B Gupta. 2017. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. Journal of Supercomputing 73, 3 (2017), 1085--1102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Feng Tian. 2016. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In Proceedings of IEEE ICSSSM. IEEE, 1--6.Google ScholarGoogle Scholar
  40. K. Toyoda, P. T. Mathiopoulos, I. Sasase, and T. Ohtsuki. 2017. A novel blockchain-based product ownership Management System (POMS) for anti-counterfeits in the post supply dhain. IEEE Access (2017), 1--1.Google ScholarGoogle Scholar
  41. K. Toyoda and I. Sasase. 2015. Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains. In Proceedings of IEEE RFID.Google ScholarGoogle Scholar
  42. Remko Van Hoek. 2019. Exploring blockchain implementation in the supply chain: Learning from pioneers and RFID research. International Journal of Operations & Production Management (2019).Google ScholarGoogle Scholar
  43. Vincenzo Varriale, Antonello Cammarano, Francesca Michelino, and Mauro Caputo. 2021. Sustainable supply chains with blockchain, IoT and RFID: A simulation on order management. Sustainability 13, 11 (2021), 6372.Google ScholarGoogle ScholarCross RefCross Ref
  44. Ge Wang, Haofan Cai, Chen Qian, Jinsong Han, Xin Li, Han Ding, and Jizhong Zhao. 2018. Towards replay-resilient RFID authentication. In Proceedings of ACM MobiCom. 385--399.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. G. Wang, H. Cai, C. Qian, J. Han, and J. Zhao. 2020. Hu-Fu: Replay-Resilient RFID Authentication. IEEE/ACM Transactions on Networking PP, 99 (2020), 1--14.Google ScholarGoogle Scholar
  46. Siye Wang, Shaoyi Zhu, and Yanfang Zhang. 2018. Blockchain-based mutual authentication security protocol for distributed RFID systems. In Proceedings of IEEE ISCC. IEEE, 00074--00077.Google ScholarGoogle ScholarCross RefCross Ref
  47. Yingli Wang, Jeong Hugh Han, and Paul Beynon-Davies. 2019. Understanding blockchain technology for future supply chains: a systematic literature review and research agenda. Supply Chain Management: An International Journal (2019).Google ScholarGoogle Scholar
  48. Chris West, Mishelle Madigan, Logan Webb, Victor Wiercioch, Dan Thomas, and Andressa Silva. [n. d.]. RFID Technology in Walmart. https://walmartsupplychain.weebly.com/rfid-technology.htmlGoogle ScholarGoogle Scholar
  49. D. Zanetti, S. Capkun, and A. Juels. 2013. Tailing RFID Tags for Clone Detection. In Proceedings of NDSS.Google ScholarGoogle Scholar
  50. Davide Zanetti, Boris Danev, et al. 2010. Physical-layer identification of UHF RFID tags. In Proceedings of ACM MOBICOM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Davide Zanetti, Pascal Sachs, and Srdjan Capkun. 2011. On the practicality of UHF RFID fingerprinting: How real is the RFID tracking problem?. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 97--116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Pamela J Zelbst, Kenneth W Green, Victor E Sower, and Philip L Bond. 2019. The impact of RFID, IIoT, and Blockchain technologies on supply chain transparency. Journal of Manufacturing Technology Management (2019).Google ScholarGoogle Scholar

Index Terms

  1. RF-Chain: Decentralized, Credible, and Counterfeit-proof Supply Chain Management with Commodity RFIDs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
      Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 6, Issue 4
      December 2022
      1534 pages
      EISSN:2474-9567
      DOI:10.1145/3580286
      Issue’s Table of Contents

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 January 2023
      Published in imwut Volume 6, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader