RFID Security pp 131-146 | Cite as

RFID Anticounterfeiting: An Architectural Perspective

  • Tieyan Li
  • Tong-Lee Lim


Counterfeit goods have always been an enormous threat to the world economy, but they could potentially be combatted by employing an emerging technology – Radio Frequency IDentification (RFID) — in the near future. In this chapter, we present an architectural perspective on RFID-based anticounterfeiting solutions. An overview of an RFID-enabled anticounterfeiting system is described and analyzed. In the end system, we emphasize on the importance of a secure binding between the target object and RFID tag, as well as the security of the mutual authentication protocol between the RFID tag and reader. As for the backend system, we describe the closed-loop systems that are deployed in the pharmaceutical industry, and the open-loop solution specified by the EPCglobal committee. On building practical and cost-effective anticounterfeiting solutions in realistic environments, we can learn and gain valuable experience from the current efforts put into RFID pilots. While we may potentially be facing more challenges ahead of us, we are optimistic that with advancements in RFID technology, better and more complete solutions toward anticounterfeiting can be provided.


Supply Chain Authentication Protocol Supply Chain Partner Electronic Product Code Pharmaceutical Supply Chain 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    AIM Global Analysis: Counterfeit Tags, June 2005Google Scholar
  2. 2.
    A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An ultra-lightweight block cipher. Cryptographic Hardware and Embedded Systems - CHES 2007, Vienna, Austria, Sept. 2007Google Scholar
  3. 3.
    J. Bringer, H. Chabanne, and E. Dottax. HB++ : A lightweight authentication protocol secure against some attacks. In: Proc. of SecPerU'06, pp. 28–33, IEEE Computer Society Press, Washington, DC, 2006Google Scholar
  4. 4.
    B. Defend, K. Fu, and A. Juels. Cryptanalysis of two lightweight RFID authentication schemes. In Fourth IEEE International Workshop on Pervasive Computing and Communication Security (PerSec) Workshop, March 2007Google Scholar
  5. 5.
    D.N. Duc, J. Park, H. Lee, and K. Kim, Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning, In The 2006 Symposium on Cryptography and Information Security, 2006Google Scholar
  6. 6.
    EPCglobal, 13.56 MHz ISM Band Class 1 Radio Frequency (RF) Identification Tag Interface SpecificationGoogle Scholar
  7. 7.
    EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz-960MHz Version 1.0.9Google Scholar
  8. 8.
  9. 9.
  10. 10.
    M. Feldhofer and J. Wolkerstorfer. Strong crypto for RFID TagsCa comparison of low-power hardware implementations, In: IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp.1839–1842, New Orleans, USA, May 27–30, 2007CrossRefGoogle Scholar
  11. 11.
    H. Gilbert, M. Bobshaw, and H. Silbert, An active attack against HB+ - A probable secure lightweight authentication protocol, Cryptology ePrint Archive, Report 2005/237, 2007Google Scholar
  12. 12.
    T. Good, W. Chelton, and M. Benaissa. Hardware results for selected stream cipher candidates. In SASC 2007, February 2007Google Scholar
  13. 13.
    R. Johnston, Tamper-indicating seals, American Scientist, Nov-Dec 2005Google Scholar
  14. 14.
    A. Juels and R. Pappu. Squealing euros: Privacy protection in RFID-enabled banknotes. In: Proc. of FC'03, LNCS 2742, pp. 103–121, Springer, Berlin, 2003Google Scholar
  15. 15.
    A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In: Proc. of CRYPTO'05, LNCS 3126, pp. 293–308, Springer, Berlin, 2005Google Scholar
  16. 16.
    M. Lehtonen, T. Staake, F. Michahelles, and E. Fleisch, Strengthening the security of machine readable documents by combining RFID and optical memory devices. In Conference on Ambient Intelligence Developments - AmID, Sophia-Antipolis, France, September 2006Google Scholar
  17. 17.
    Z. Nochta, T. Staake, and E. Fleisch, Product specific security features based on RFID technology. In Proceedings of the International Symposium on Applications and the Internet Workshops, IEEE Computer Society press, Washington, DC, 2006Google Scholar
  18. 18.
    Y. Oren and A. Shamir. Remote password extraction from RFID tags. In: IEEE Transactions on Computers, 56(9): 1292–1296, 2007CrossRefMathSciNetGoogle Scholar
  19. 19.
    S. Sarma, S. Weis, and D. Engels. RFID systems and security and privacy implications. In: Proc. of CHES'02, LNCS 2523, pp. 454–469, Springer, Berlin, 2002Google Scholar
  20. 20.
    T. Staake, F. Thiesse, and E. Fleisch, Extending the EPC network - The potential of RFID in anti-counterfeiting. In Proceedings of the 2005 ACM symposium on Applied computing, pp. 1607–1612, ACM Press, New York, NY, 2005CrossRefGoogle Scholar
  21. 21.
    Texas Instruments and VeriSign Inc.: Securing the pharmaceutical supply chain with RFID and public-key infrastructure technologies. Whitepaper, 2005Google Scholar
  22. 22.
    I. Vajda and L. Buttyan. Lightweight authentication protocols for low-cost RFID tags. In: Proc. of UBICOMP'03, 2003Google Scholar
  23. 23.
    S. Weis. Security parallels between people and pervasive devices. In: Proc. of PERSEC'05, pp. 105–109, IEEE Computer Society Press, Washington, DC, 2005Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Tieyan Li
    • 1
  • Tong-Lee Lim
  1. 1.Cryptography and Security DepartmentInstitute for Infocomm Research (I2R)Singapore

Personalised recommendations