Skip to main content

RFID Anticounterfeiting: An Architectural Perspective

  • Chapter
RFID Security

Abstract

Counterfeit goods have always been an enormous threat to the world economy, but they could potentially be combatted by employing an emerging technology – Radio Frequency IDentification (RFID) — in the near future. In this chapter, we present an architectural perspective on RFID-based anticounterfeiting solutions. An overview of an RFID-enabled anticounterfeiting system is described and analyzed. In the end system, we emphasize on the importance of a secure binding between the target object and RFID tag, as well as the security of the mutual authentication protocol between the RFID tag and reader. As for the backend system, we describe the closed-loop systems that are deployed in the pharmaceutical industry, and the open-loop solution specified by the EPCglobal committee. On building practical and cost-effective anticounterfeiting solutions in realistic environments, we can learn and gain valuable experience from the current efforts put into RFID pilots. While we may potentially be facing more challenges ahead of us, we are optimistic that with advancements in RFID technology, better and more complete solutions toward anticounterfeiting can be provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AIM Global Analysis: Counterfeit Tags, June 2005

    Google Scholar 

  2. A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An ultra-lightweight block cipher. Cryptographic Hardware and Embedded Systems - CHES 2007, Vienna, Austria, Sept. 2007

    Google Scholar 

  3. J. Bringer, H. Chabanne, and E. Dottax. HB++ : A lightweight authentication protocol secure against some attacks. In: Proc. of SecPerU'06, pp. 28–33, IEEE Computer Society Press, Washington, DC, 2006

    Google Scholar 

  4. B. Defend, K. Fu, and A. Juels. Cryptanalysis of two lightweight RFID authentication schemes. In Fourth IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) Workshop, March 2007

    Google Scholar 

  5. D.N. Duc, J. Park, H. Lee, and K. Kim, Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning, In The 2006 Symposium on Cryptography and Information Security, 2006

    Google Scholar 

  6. EPCglobal, 13.56 MHz ISM Band Class 1 Radio Frequency (RF) Identification Tag Interface Specification

    Google Scholar 

  7. EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.0.9

    Google Scholar 

  8. EPCglobal, Pedigree Standard v1.0http://www.epcglobalinc.org/standards/pedigree/Pedigree 1 0-StandardRatified- 20070105.pdf

  9. EPCglobal, Architecture Framework Standard v1.0http://www.epcglobalinc.org/standards/architecture/Architecture 1 0-StandardApproved- 20050701.pdf

  10. M. Feldhofer and J. Wolkerstorfer. Strong crypto for RFID TagsCa comparison of low-power hardware implementations, In: IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp.1839–1842, New Orleans, USA, May 27–30, 2007

    Chapter  Google Scholar 

  11. H. Gilbert, M. Bobshaw, and H. Silbert, An active attack against HB+ - A probable secure lightweight authentication protocol, Cryptology ePrint Archive, Report 2005/237, 2007

    Google Scholar 

  12. T. Good, W. Chelton, and M. Benaissa. Hardware results for selected stream cipher candidates. In SASC 2007, February 2007

    Google Scholar 

  13. R. Johnston, Tamper-indicating seals, American Scientist, Nov-Dec 2005

    Google Scholar 

  14. A. Juels and R. Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In: Proc. of FC'03, LNCS 2742, pp. 103–121, Springer, Berlin, 2003

    Google Scholar 

  15. A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In: Proc. of CRYPTO'05, LNCS 3126, pp. 293–308, Springer, Berlin, 2005

    Google Scholar 

  16. M. Lehtonen, T. Staake, F. Michahelles, and E. Fleisch, Strengthening the security of machine readable documents by combining RFID and optical memory devices. In Conference on Ambient Intelligence Developments - AmID, Sophia-Antipolis, France, September 2006

    Google Scholar 

  17. Z. Nochta, T. Staake, and E. Fleisch, Product specific security features based on RFID technology. In Proceedings of the International Symposium on Applications and the Internet Workshops, IEEE Computer Society press, Washington, DC, 2006

    Google Scholar 

  18. Y. Oren and A. Shamir. Remote password extraction from RFID tags. In: IEEE Transactions on Computers, 56(9): 1292–1296, 2007

    Article  MathSciNet  Google Scholar 

  19. S. Sarma, S. Weis, and D. Engels. RFID systems and security and privacy implications. In: Proc. of CHES'02, LNCS 2523, pp. 454–469, Springer, Berlin, 2002

    Google Scholar 

  20. T. Staake, F. Thiesse, and E. Fleisch, Extending the EPC network - The potential of RFID in anti-counterfeiting. In Proceedings of the 2005 ACM symposium on Applied computing, pp. 1607–1612, ACM Press, New York, NY, 2005

    Chapter  Google Scholar 

  21. Texas Instruments and VeriSign Inc.: Securing the pharmaceutical supply chain with RFID and public-key infrastructure technologies. Whitepaper, 2005

    Google Scholar 

  22. I. Vajda and L. Buttyan. Lightweight authentication protocols for low-cost RFID tags. In: Proc. of UBICOMP'03, 2003

    Google Scholar 

  23. S. Weis. Security parallels between people and pervasive devices. In: Proc. of PERSEC'05, pp. 105–109, IEEE Computer Society Press, Washington, DC, 2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Li, T., Lim, TL. (2008). RFID Anticounterfeiting: An Architectural Perspective. In: Kitsos, P., Zhang, Y. (eds) RFID Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-76481-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-76481-8_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-76480-1

  • Online ISBN: 978-0-387-76481-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics