The International Chamber of Commerce estimates that seven percent of the world trade is in counterfeit goods, with the counterfeit market being worth 500 billion USD in 2004. Many companies already use overt anti-counterfeiting measures like holograms to confine counterfeiting and product piracy. However, current techniques are not suited for automated tests of product authenticity as required in warehouses, or do not provide the required level of security. In this context, Radio Frequency Identification (RFID) is a promising approach, providing an extensible, flexible and secure measure against counterfeiting. Unique product identification numbers together with an infrastructure to seamlessly share RFID-related data over the Internet are a basis of efficient Track & Trace applications. An emerging infrastructure is the EPC Network, which can be used to provide pedigree information of products and makes plausibility checks possible. In this paper, we propose a solution for products requiring authentication mechanisms that go beyond track & trace. Therefore, the evolving EPC Network should comprehend the functionality to handle tags which support strong cryptography. We suggest extending the upcoming EPC Network infrastructure with an EPC Product Authentication Service. Moreover, the development of cost-effective, dedicated authentication devices as well as the belonging standardization is motivated.
[1]
M. Feldhofer.
An authentication protocol in a security layer for RFID smart tags
,
2004,
Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521).
[2]
Jon Brumbaugh,et al.
DEPARTMENT OF HEALTH AND HUMAN SERVICES FOOD AND DRUG ADMINISTRATION
,
2000
.
[3]
Robert M. Deiters.
Organization for Economic Co-Operation and Development (OECD).
,
1968
.
[4]
Paul Müller,et al.
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
,
2004,
IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[5]
Thomas Bieger,et al.
Die wirtschaftlichen Effekte des Kultur- und Kongresszentrums Luzern (KKL)
,
2002
.
[6]
Roger M. Needham,et al.
TEA, a Tiny Encryption Algorithm
,
1994,
FSE.
[7]
István Vajda,et al.
Lightweight Authentication Protocols for Low-Cost RFID Tags
,
2003
.
[8]
Joseph H. Silverman,et al.
NTRU: A Ring-Based Public Key Cryptosystem
,
1998,
ANTS.