Counterfeiting Detection in RFID-enabled Supply Chain

Counterfeiting is a generalized term which includes both the act of RFID tags, cloning and fraud. RFID tag counterfeiting attacks lead to financial losses, loss of trust and confidence in the adoption and acceptance of RFID technology. The challenge of implementing a cost-based counterfeit detection system in RFID supply chains is non-trivial because counterfeit tags exist across billions of RFID tags. In this paper, a cost-sensitive learning approach is presented. The motivation of this work is to effectively reduce the overall cost of counterfeiting attack for RFID tagged products. Experiments are conducted to present the efficiency, effectiveness, misclassification cost and test cost evaluations. Findings from this paper conclude that MetaCost learners provide the best result. However, when compared to AdaCost, MetaCost is more expensive in classifying counterfeit tags.

[1]  Damith C. Ranasinghe,et al.  Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting , 2010 .

[2]  Peter D. Turney Types of Cost in Inductive Concept Learning , 2002, ArXiv.

[3]  Peter D. Turney Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm , 1994, J. Artif. Intell. Res..

[4]  T. Saaty An exposition of the AHP in reply to the paper “remarks on the analytic hierarchy process” , 1990 .

[5]  Damith C. Ranasinghe,et al.  EPC Network Architecture , 2008 .

[6]  Robert C. Holte,et al.  Exploiting the Cost (In)sensitivity of Decision Tree Splitting Criteria , 2000, ICML.

[7]  Jian Huang,et al.  An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[8]  Aiko M. Hormann,et al.  Programs for Machine Learning. Part I , 1962, Inf. Control..

[9]  Kai Ming Ting,et al.  Inducing Cost-Sensitive Trees via Instance Weighting , 1998, PKDD.

[10]  Sherali Zeadally,et al.  TMS-RFID: Temporal management of large-scale RFID applications , 2011, Inf. Syst. Frontiers.

[11]  Yoav Freund,et al.  Experiments with a New Boosting Algorithm , 1996, ICML.

[12]  Manmeet Mahinderjit Singh,et al.  Trust Framework for RFID Tracking in Supply Chain Management , 2009, IWRT.

[13]  John Langford,et al.  Cost-sensitive learning by cost-proportionate example weighting , 2003, Third IEEE International Conference on Data Mining.

[14]  Salvatore J. Stolfo,et al.  AdaCost: Misclassification Cost-Sensitive Boosting , 1999, ICML.

[15]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[16]  Florian Michahelles,et al.  Trust and Security in RFID-Based Product Authentication Systems , 2007, IEEE Systems Journal.

[17]  Chi-Sung Laih,et al.  IDSIC: an intrusion detection system with identification capability , 2007, International Journal of Information Security.

[18]  Gary M. Weiss,et al.  Cost-Sensitive Learning vs. Sampling: Which is Best for Handling Unbalanced Classes with Unequal Error Costs? , 2007, DMIN.

[19]  Xue Li,et al.  A Cost-based Model for Risk Management in RFID-Enabled Supply Chain Applications , 2011 .

[20]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.

[21]  Salvatore J. Stolfo,et al.  A Multiple Model Cost-Sensitive Approach for Intrusion Detection , 2000, ECML.

[22]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[23]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[24]  Pedro M. Domingos MetaCost: a general method for making classifiers cost-sensitive , 1999, KDD '99.

[25]  Elgar Fleisch,et al.  How to detect cloned tags in a reliable way from incomplete RFID traces , 2009, 2009 IEEE International Conference on RFID.

[26]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[27]  Kai Ming Ting,et al.  A Comparative Study of Cost-Sensitive Boosting Algorithms , 2000, ICML.

[28]  Pedro M. Domingos,et al.  Tree Induction for Probability-Based Ranking , 2003, Machine Learning.

[29]  Manmeet Mahinderjit Singh,et al.  Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.

[30]  David J. Hand,et al.  Measuring classifier performance: a coherent alternative to the area under the ROC curve , 2009, Machine Learning.

[31]  Xue Li,et al.  RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.