A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs

Counterfeiting is a very serious threat to supply chain management systems. RFID systems are widely used to automate and speed up the process of remotely identifying products, however these systems are vulnerable to counterfeiting. In this paper, we propose a hierarchical anti-counterfeiting mechanism which uses a layered approach to identify dishonest middle parties involved in both counterfeiting and processing stolen/missing items. Our layered approach, which is designed for EPC Class-1 Gen-2 standard compliant tags, offers scalability and is suitable for different sizes of groups of tagged items.

[1]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[2]  Sandra Dominikus,et al.  Symmetric Authentication for RFID Systems in Practice , 2005 .

[3]  Josep M. Miret,et al.  A Secure Elliptic Curve-Based RFID Protocol , 2009, Journal of Computer Science and Technology.

[4]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[5]  Sandra Dominikus,et al.  An Application of RFID Tags using Secure Symmetric Authentication , 2005 .

[6]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[7]  Damith C. Ranasinghe,et al.  Networked RFID Systems and Lightweight Cryptography , 2008 .

[8]  Kazuo Takaragi,et al.  An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.

[9]  Tim Kerins,et al.  An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..

[10]  Bryan Parno,et al.  Unidirectional Key Distribution Across Time and Space with Applications to RFID Security , 2008, USENIX Security Symposium.

[11]  Tanja Lange,et al.  Computing Small Discrete Logarithms Faster , 2012, INDOCRYPT.

[12]  Young-Sil Lee,et al.  Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[13]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[14]  Brian King,et al.  Securing the Pharmaceutical Supply Chain using RFID , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[15]  Mikko Lehtonen,et al.  From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .

[16]  Elgar Fleisch,et al.  From Identification to Authentication; ; ; Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting , 2007 .

[17]  Frédéric Thiesse,et al.  Extending the EPC network: the potential of RFID in anti-counterfeiting , 2005, SAC '05.

[18]  Avishai Wool,et al.  Toward practical public key anti-counterfeiting for low-cost EPC tags , 2011, 2011 IEEE International Conference on RFID.

[19]  Daniel W. Engels,et al.  A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) , 2012, IACR Cryptol. ePrint Arch..

[20]  Feng Cheng,et al.  Exploring the impact of RFID on supply chain dynamics , 2004, Proceedings of the 2004 Winter Simulation Conference, 2004..

[21]  Daniel W. Engels,et al.  The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.

[22]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[23]  C. Paar,et al.  A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications , 2006 .