Authentication pedigree scheme for supply chain

In this paper, we present a novel idea of multilayer aggregate authentication scheme that can be used in any distribution phase of supply chain for more accurate tracking of packages and for innovative authentication of the hierarchy of packages. With minimal modification cost, our scheme can be adapted to any existing cryptographic hash chain based authentication schemes such as RFID-based scheme. By allowing the aggregate authentication of multiple layers (for example a bigger package and its smaller inner packages) at once, our scheme provides more reliable and accurate way to track the packages and effectively thwarts the counterfeiters at every phase of the supply chain. Our scheme also enables any entity in the entire supply chain including the producers, transporters, distributors, sellers, and even consumers to easily authenticate the authenticity of a package/product along its packaging hierarchy.

[1]  Shao-Yong Lu,et al.  A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme , 2015, Sensors.

[2]  Chi Fai Cheung,et al.  Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication , 2010, Comput. Ind..

[3]  Florian Michahelles,et al.  Trust and Security in RFID-Based Product Authentication Systems , 2007, IEEE Systems Journal.

[4]  Jung-Hui Chiu,et al.  An RFID Based Multi-batch Supply Chain Systems , 2012, Wirel. Pers. Commun..

[5]  Mark Mohammad Tehranipoor,et al.  Anti-counterfeit Techniques: From Design to Resign , 2013, 2013 14th International Workshop on Microprocessor Test and Verification.

[6]  Sheikh Iqbal Ahamed,et al.  Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols , 2012, Personal and Ubiquitous Computing.

[7]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[8]  Manki Min,et al.  Product authentication using hash chains and printed QR codes , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[9]  Avishai Wool,et al.  Toward practical public key anti-counterfeiting for low-cost EPC tags , 2011, 2011 IEEE International Conference on RFID.

[10]  Chunling Sun Application of RFID Technology for Logistics on Internet of Things , 2012 .

[11]  Brian King,et al.  Securing the Pharmaceutical Supply Chain using RFID , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[12]  Mikko Lehtonen,et al.  From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .

[13]  Mazen Saghir,et al.  The Concept of Packaging Logistics , 2004 .