Abstract
Counterfeit goods have always been an enormous threat to the world economy, but they could potentially be combatted by employing an emerging technology – Radio Frequency IDentification (RFID) — in the near future. In this chapter, we present an architectural perspective on RFID-based anticounterfeiting solutions. An overview of an RFID-enabled anticounterfeiting system is described and analyzed. In the end system, we emphasize on the importance of a secure binding between the target object and RFID tag, as well as the security of the mutual authentication protocol between the RFID tag and reader. As for the backend system, we describe the closed-loop systems that are deployed in the pharmaceutical industry, and the open-loop solution specified by the EPCglobal committee. On building practical and cost-effective anticounterfeiting solutions in realistic environments, we can learn and gain valuable experience from the current efforts put into RFID pilots. While we may potentially be facing more challenges ahead of us, we are optimistic that with advancements in RFID technology, better and more complete solutions toward anticounterfeiting can be provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
AIM Global Analysis: Counterfeit Tags, June 2005
A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An ultra-lightweight block cipher. Cryptographic Hardware and Embedded Systems - CHES 2007, Vienna, Austria, Sept. 2007
J. Bringer, H. Chabanne, and E. Dottax. HB++ : A lightweight authentication protocol secure against some attacks. In: Proc. of SecPerU'06, pp. 28–33, IEEE Computer Society Press, Washington, DC, 2006
B. Defend, K. Fu, and A. Juels. Cryptanalysis of two lightweight RFID authentication schemes. In Fourth IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) Workshop, March 2007
D.N. Duc, J. Park, H. Lee, and K. Kim, Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning, In The 2006 Symposium on Cryptography and Information Security, 2006
EPCglobal, 13.56 MHz ISM Band Class 1 Radio Frequency (RF) Identification Tag Interface Specification
EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.0.9
EPCglobal, Pedigree Standard v1.0http://www.epcglobalinc.org/standards/pedigree/Pedigree 1 0-StandardRatified- 20070105.pdf
EPCglobal, Architecture Framework Standard v1.0http://www.epcglobalinc.org/standards/architecture/Architecture 1 0-StandardApproved- 20050701.pdf
M. Feldhofer and J. Wolkerstorfer. Strong crypto for RFID TagsCa comparison of low-power hardware implementations, In: IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp.1839–1842, New Orleans, USA, May 27–30, 2007
H. Gilbert, M. Bobshaw, and H. Silbert, An active attack against HB+ - A probable secure lightweight authentication protocol, Cryptology ePrint Archive, Report 2005/237, 2007
T. Good, W. Chelton, and M. Benaissa. Hardware results for selected stream cipher candidates. In SASC 2007, February 2007
R. Johnston, Tamper-indicating seals, American Scientist, Nov-Dec 2005
A. Juels and R. Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In: Proc. of FC'03, LNCS 2742, pp. 103–121, Springer, Berlin, 2003
A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In: Proc. of CRYPTO'05, LNCS 3126, pp. 293–308, Springer, Berlin, 2005
M. Lehtonen, T. Staake, F. Michahelles, and E. Fleisch, Strengthening the security of machine readable documents by combining RFID and optical memory devices. In Conference on Ambient Intelligence Developments - AmID, Sophia-Antipolis, France, September 2006
Z. Nochta, T. Staake, and E. Fleisch, Product specific security features based on RFID technology. In Proceedings of the International Symposium on Applications and the Internet Workshops, IEEE Computer Society press, Washington, DC, 2006
Y. Oren and A. Shamir. Remote password extraction from RFID tags. In: IEEE Transactions on Computers, 56(9): 1292–1296, 2007
S. Sarma, S. Weis, and D. Engels. RFID systems and security and privacy implications. In: Proc. of CHES'02, LNCS 2523, pp. 454–469, Springer, Berlin, 2002
T. Staake, F. Thiesse, and E. Fleisch, Extending the EPC network - The potential of RFID in anti-counterfeiting. In Proceedings of the 2005 ACM symposium on Applied computing, pp. 1607–1612, ACM Press, New York, NY, 2005
Texas Instruments and VeriSign Inc.: Securing the pharmaceutical supply chain with RFID and public-key infrastructure technologies. Whitepaper, 2005
I. Vajda and L. Buttyan. Lightweight authentication protocols for low-cost RFID tags. In: Proc. of UBICOMP'03, 2003
S. Weis. Security parallels between people and pervasive devices. In: Proc. of PERSEC'05, pp. 105–109, IEEE Computer Society Press, Washington, DC, 2005
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Li, T., Lim, TL. (2008). RFID Anticounterfeiting: An Architectural Perspective. In: Kitsos, P., Zhang, Y. (eds) RFID Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-76481-8_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-76481-8_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-76480-1
Online ISBN: 978-0-387-76481-8
eBook Packages: EngineeringEngineering (R0)