Nano-Resolution Visual Identifiers Enable Secure Monitoring in Next-Generation Cyber-Physical Systems

—Today’s supply chains heavily rely on cyber-physical systems such as intelligent transportation, online shopping, and E-commerce. It is advantageous to track goods in real-time by web-based registration and authentication of products after any substantial change or relocation. Despite recent advantages in technology-based tracking systems, most supply chains still rely on plainly printed tags such as barcodes and Quick Response (QR) codes for tracking purposes. Although affordable and efficient, these tags convey no security against counterfeit and cloning attacks, raising privacy concerns. It is a critical matter since a few security breaches in merchandise databases in recent years has caused crucial social and economic impacts such as identity loss, social panic, and loss of trust in the community. This paper considers an end-to-end system using dendrites as nano-resolution visual identifiers to secure supply chains. Dendrites are formed by generating fractal metallic patterns on transparent substrates through an electrochemical process, which can be used as secure identifiers due to their natural randomness, high entropy, and unclonable features. The proposed framework compromises the back-end program for identification and authentication, a web-based application for mobile devices, and a cloud database. We review architectural design, dendrite operational phases (personalization, registration, inspection), a lightweight identification method based on 2D graph-matching, and a deep 3D image authentication method based on Digital Holography (DH). A two-step search is proposed to make the system scalable by limiting the search space to samples with high similarity scores in a lower-dimensional space. We conclude by presenting our solution to make dendrites secure against adversarial attacks.

[1]  Hongya Wang,et al.  Fast Key Points Detection and Matching for Tree-Structured Images , 2022, 2022 International Conference on Computational Science and Computational Intelligence (CSCI).

[2]  V. Boumba,et al.  Trends in counterfeit drugs and pharmaceuticals before and during COVID-19 pandemic , 2022, Forensic Science International.

[3]  S. Ofori-Parku Fighting the global counterfeit medicines challenge: A consumer-facing communication strategy in the US is an imperative , 2022, Journal of Global Health.

[4]  W. C. Tan,et al.  Review of RFID and IoT integration in supply chain management , 2022, Operations Research Perspectives.

[5]  Cem Ersoy,et al.  End-to-End Deep Multi-Modal Physiological Authentication With Smartbands , 2021, IEEE Sensors Journal.

[6]  S. Praveen Kumar,et al.  Contactless Authentication Device using Palm Vein and Palm Print Fusion Biometric Technology for Post Covid World , 2021, 2021 International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C).

[7]  In Lee Cybersecurity: Risk management framework and investment cost analysis , 2021 .

[8]  K. R. Seeja,et al.  A novel periocular biometrics solution for authentication during Covid-19 pandemic situation , 2021, Journal of Ambient Intelligence and Humanized Computing.

[9]  Abolfazl Razi,et al.  Consistency Penalized Graph Matching for Image-Based Identification of Dendritic Patterns , 2020, IEEE Access.

[10]  Kelly D. Martin,et al.  Consumer Privacy During (and After) the COVID-19 Pandemic , 2020, Journal of Public Policy & Marketing.

[11]  Weiqing Huang,et al.  ACD: An Adaptable Approach for RFID Cloning Attack Detection , 2020, Sensors.

[12]  Stefan Breuer,et al.  3D-printable portable open-source platform for low-cost lens-less holographic cellular imaging , 2019, Scientific Reports.

[13]  Keke Gai,et al.  Side-Channel Attack on a Protected RFID Card , 2018, IEEE Access.

[14]  A. Markham,et al.  3D Object Reconstruction from a Single Depth View with Adversarial Learning , 2017, 2017 IEEE International Conference on Computer Vision Workshops (ICCVW).

[15]  Abolfazl Razi,et al.  A graph matching algorithm for user authentication in data networks using image-based physical unclonable functions , 2017, 2017 Computing Conference.

[16]  Yibo Zhang,et al.  Phase recovery and holographic image reconstruction using deep learning in neural networks , 2017, Light: Science & Applications.

[17]  Rob Ilic,et al.  MultiFocus Polarization Microscope (MF-PolScope) for 3D polarization imaging of up to 25 focal planes simultaneously. , 2015, Optics express.

[18]  Edgar R. Weippl,et al.  QR Code Security: A Survey of Attacks and Challenges for Usable Security , 2014, HCI.

[19]  W. Kalender,et al.  X-ray computed tomography , 2019, Machine Learning for Tomographic Imaging.

[20]  Abolfazl Razi,et al.  Deep DIH: Single-Shot Digital In-Line Holography Reconstruction by Deep Learning , 2020, IEEE Access.

[21]  Mike Burmester,et al.  RFID Security : Attacks , Countermeasures and Challenges , 2007 .