Batch Clone Detection in RFID-enabled supply chain

Radio Frequency IDentification (RFID) technology plays an important role in deterring counterfeit products. There are, however, many unsolved challenges in designing an effective and efficient RFID system for anti-counterfeiting purpose. The first challenge lies in designing a system which is suitable for standard passive RFID tags, especially EPC C1G2 tags, which are widely used in real-world supply chains. These tags cannot afford strong security primitives due to very limited storage and computational capability. The second challenge lies in designing a system which can efficiently handle a increasing number of RFID products. Existing approaches for clone tag detection suffer from performance bottlenecks because a centralized detection server is required in these approaches to record and analyze the traces of all individual products. Thirdly, a practical approach to clone tag detection should work efficiently in real-world RFID systems, where products are moved and processed in batches. To address these challenges, we propose a Batch Clone Detection (BCD) scheme, which is simple, efficient, and practical. It requires only a few bits of storage in RFID tags and no computation on RFID tags, which makes it suitable for standard EPC C1G2 tags. In BCD scheme, the clone tag detection is performed at a batch level, which significantly reduces the storage and computational overheads on the server side.

[1]  Srdjan Capkun,et al.  Tailing RFID Tags for Clone Detection , 2013, NDSS.

[2]  Yingjiu Li,et al.  Secure and Practical Key Distribution for RFID-Enabled Supply Chains , 2011, SecureComm.

[3]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[4]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[5]  Jacky Hartnett,et al.  Deckard: A System to Detect Change of RFID Tag Ownership , 2007 .

[6]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[7]  Tim Kerins,et al.  An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..

[8]  Lei Yang,et al.  Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.

[9]  Florian Kerschbaum,et al.  Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting , 2010, RFIDSec.

[10]  Elgar Fleisch,et al.  Probabilistic Approach for Location-Based Authentication , 2007 .

[11]  Florian Michahelles,et al.  Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.

[12]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[13]  Elisa Bertino,et al.  RFID Security and Privacy , 2013, Synthesis Lectures on Information Security, Privacy, and Trust.

[14]  Sandra Dominikus,et al.  Symmetric Authentication for RFID Systems in Practice , 2005 .

[15]  Davide Zanetti,et al.  Privacy-preserving clone detection for RFID-enabled supply chains , 2010, 2010 IEEE International Conference on RFID (IEEE RFID 2010).

[16]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[17]  Bryan Parno,et al.  Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.

[18]  Frédéric Thiesse,et al.  Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.

[19]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[20]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[21]  Jun Murai,et al.  Group coding of RF tags to verify the integrity of group of objects , 2011, 2011 IEEE International Conference on RFID.