Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept

  • Gaith Al.Email author
  • Robin Doss
  • Morshed Chowdhury
  • Biplob Ray
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 670)


Since the RFID technology has been found couple of decades ago, there was much involvement of this emerging technology in the improvement of supply chain management. As this technology made the industry more reliable and faster to process, yet there were always some technical issues and security threats that emerged from the heavy use of the RFID tags in the SCM, or other industries. Hereby we represent a new protocol based on a new idea that can be used to manage and organize tags as well as the objects attached to them in SCM, to prevent counterfeiting and reduce the security threats taking into consideration the security and privacy concerns that faces the industry today. This new approach will open a new horizon to the supply chain management as well as the RFID systems technology since it will handle multi- tags attached to objects managed in one location as an entity of one in one. We called our approach the MATRYOSHKA approach since it has the same idea of the russian doll, in managing multi-tags as one entity and prevent counterfeiting. We also added extra authentication process based on a mathematical exchange key formation to increase the security during communication to prevent threats and attacks and to provide a secure mutual authentication method.


RFID Matryoshka SCM Anti-counterfeiting 


  1. 1.
    Al, T., Al, G.K.D.: A case study in developing the ICT skills for a group of mixed abilities and mixed aged learners at ITEP in Dubai-UAE and possible future RFID implementations. In: Luaran, J.E., Sardi, J., Aziz, A., Alias, N.A. (eds.) Envisioning the Future of Online Learning, pp. 133–146. Springer, Heidelberg (2016)CrossRefGoogle Scholar
  2. 2.
    Chen, X., Cao, T., Guo, Y.: A new scalable RFID delegation protocol. Appl. Math. 8(4), 1917–1924 (2014)Google Scholar
  3. 3.
    RFID ARENA. Benefits-of-implementing-rfid-in-supply-chain-management (2015).
  4. 4.
    AL, G., Ray, B., Chowdhury, M.: RFID tag ownership transfer protocol for a closed loop system. In: 2014 IIAI 3rd International Conference on Advanced Applied Informatics (IIAIAAI), pp. 575–579, August 2014Google Scholar
  5. 5.
    Al, G., Ray, B., Chowdhury, M.: Multiple scenarios for a tag ownership transfer protocol for a closed loop system. IJNDC 3(2), 128–136 (2015)CrossRefGoogle Scholar
  6. 6.
    Cooper, M.C., Lambert, D.M., Pagh, J.D.: Supply chain management: more than a new name for logistics. Int. J. Logist. Manag. 8(1), 1–14 (1997)CrossRefGoogle Scholar
  7. 7.
    Keely, L.C., Garcia-Dastugue, S.J., Lambert, D.M., Rogers, D.S.: The supply chain management processes. Int. J. Logist. Manag. 12(2), 13–36 (2001)CrossRefGoogle Scholar
  8. 8.
    Michael, K., McCathie, L.: The pros and cons of RFID in supply chain management. In: International Conference on Mobile Business (ICMB 2005), pp. 623–629. IEEE (2005)Google Scholar
  9. 9.
    Juels, A.: “Yoking-proofs” for RFID tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 138–143. IEEE (2004)Google Scholar
  10. 10.
    Bolotnyy, L., Robins, G.: Generalized “yoking-proofs” for a group of RFID tags. In: 2006 Third Annual International Conference on Mobile, Ubiquitous Systems Networking & Services, pp. 1–4. IEEE (2006)Google Scholar
  11. 11.
    Ray, B.R., Abawajy, J., Chowdhury, M.: Scalable RFID security framework and protocol supporting Internet of Things. Comput. Netw. 67, 89–103 (2014)CrossRefGoogle Scholar
  12. 12.
    Song, B., Mitchell, C.J.: Scalable RFID security protocols supporting tag ownership transfer. Comput. Commun. 34(4), 556–566 (2011)CrossRefGoogle Scholar
  13. 13.
    Molnar, D., Wagner, D.: Privacy, security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM (2004)Google Scholar
  14. 14.
    Fouladgar, S., Afifi, H.: Scalable privacy protecting scheme through distributed RFID tag identification. In: Proceedings of the Workshop on Applications of Private and Anonymous Communications, p. 3. ACM (2008)Google Scholar
  15. 15.
    Solanas, A., Domingo-Ferrer, J., Martínez-Ballesté, A., Daza, V.: A distributed architecture for scalable private RFID tag identification. Comput. Netw. 51(9), 2268–2279 (2007)CrossRefzbMATHGoogle Scholar
  16. 16.
    Stickel, E.: A new method for exchanging secret keys. In: Third International Conference on Information Technology and Applications (ICITA 2005), vol. 2, pp. 426–430. IEEE (2005)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Gaith Al.
    • 1
    Email author
  • Robin Doss
    • 1
  • Morshed Chowdhury
    • 1
  • Biplob Ray
    • 2
  1. 1.School of Information TechnologyDeakin UniversityGeelongAustralia
  2. 2.School of Engineering TechnologyCQ UniversityRockhamptonAustralia

Personalised recommendations