Probabilistic Approach for Location-Based Authentication

This paper explores location-based product authentication in a situation where only the past locations of products that flow in a supply chain are known. We transform location-based authentication into a pattern recognition problem and investigate different solutions based on machine-learning techniques. The proposed solutions are studied with computer simulations that model the flow of genuine and counterfeit products in a generic pharmaceutical supply chain. The results suggest that machine-learning techniques could be used to automatically identify suspicious products from the incomplete location information. This paper is published in the proceedings of first International Workshop on Security for Spontaneous Interaction, IWSSI 2007, organized in the 9th International Conference on Ubiquitous Computing, Austria, September 2007.

[1]  Alex Acero,et al.  Spoken Language Processing: A Guide to Theory, Algorithm and System Development , 2001 .

[2]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[3]  Lawrence R. Rabiner,et al.  A tutorial on Hidden Markov Models , 1986 .

[4]  David G. Stork,et al.  Pattern Classification , 1973 .

[5]  Salvatore J. Stolfo,et al.  Distributed data mining in credit card fraud detection , 1999, IEEE Intell. Syst..

[6]  F. Zambonelli,et al.  Spreading Pheromones in Everyday Environments through RFID Technology , 2005 .

[7]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[8]  Jayashankar M. Swaminathan,et al.  Modeling Supply Chain Dynamics: A Multiagent Approach , 1998 .

[9]  Salvatore J. Stolfo,et al.  Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 , 1997 .

[10]  R. C. Rose,et al.  Keyword detection in conversational speech utterances using hidden Markov model based continuous speech recognition , 1995, Comput. Speech Lang..

[11]  Sandra Dominikus,et al.  Symmetric Authentication for RFID Systems in Practice , 2005 .

[12]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[13]  E. Amoroso Intrusion Detection , 1999 .

[14]  Luke Mirowski,et al.  Detecting Clone Radio Frequency Identification Tags , 2006 .

[15]  Elgar Fleisch,et al.  Product specific security features based on RFID technology , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).