Skip to main content

The Potential of RFID and NFC in Anti-Counterfeiting

  • Chapter
Book cover Networked RFID Systems and Lightweight Cryptography

Abstract

In this paper, we investigate how RFID and NFC could improve current customs processes to fight illicit trade. During the import process, customs officers have to evaluate which consignments are inspected and, when an inspection takes place, whether intellectual property rights have been infringed. We propose and evaluate new micro processes that leverage the dualexistence of products and logistic units in order to enable easier, faster and more reliable inspection of goods. The impact of the improved processes is analyzed with an example case.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. European Commission: Regulation (EC) no. 1383/2003. Official Journal of 2 March (2003) L 196, page 7

    Google Scholar 

  2. European Commission: Counterfeiting & piracy: Frequently asked questions. MEMO/05/364, Brussels, 11 October (2005)

    Google Scholar 

  3. European Commission: International customs operation ”FAKE”. IP/05/1383. Brussels, 8 November (2005)

    Google Scholar 

  4. European Commission: Community-wide counterfeit statistics for 2004. Available from: http://ec.europa.eu/taxation_customs/customs/customs_controls/ counterfeit_piracy/statistics/index_en.htm (26.3.2007)

    Google Scholar 

  5. European Commission: Standardized framework for risk management in the customs administrations of the EU (2006)

    Google Scholar 

  6. EPCglobal: Object naming service (ONS) specification version 1.0. EPCglobal public document, October (2005)

    Google Scholar 

  7. EPCglobal: EPCglobal architecture framework version 1.0. EPCglobal public document, July (2005)

    Google Scholar 

  8. U.S. Food and Drug Administration: Combating counterfeit drugs - a report of the food and drug administration. February (2004)

    Google Scholar 

  9. Organization for Economic Co-operation and Development: The economic impact of counterfeiting (1998)

    Google Scholar 

  10. RFID Journal: E-Seals smooth border crossings. News Article, September 3 (2002) Available from: http://www.rfidjournal.com/

    Google Scholar 

  11. RFID Journal: RFID speeds border crossings. News Article, October 15, 2002. Available from: http://www.rfidjournal.com/

    Google Scholar 

  12. RFID Journal: Wal-Mart draws line in the sand. News Article, June 11, 2003. Available from: http://www.rfidjournal.com/

    Google Scholar 

  13. RFID Journal: Interest grows for tagging cargo. News Article, February 2 (2005). Available from: http://www.rfidjournal.com/

    Google Scholar 

  14. RFID Journal: Colombian shipper to use RFID. News Article, May 15 (2006). Available from: http://www.rfidjournal.com/

    Google Scholar 

  15. RFID Journal: Coping with regulations. Perspective Article (2006). Available from: http://www.rfidjournal.com/

    Google Scholar 

  16. RFID Journal: DHS subcommittee advises against RFID. News Article, May 22 (2006). Available from: http://www.rfidjournal.com/

    Google Scholar 

  17. Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-passports. In Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, Athens, Greece (2005)

    Google Scholar 

  18. Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: From identification to authentication – a review of RFID product authentication techniques. Printed handout of Workshop on RFID Security – RFIDSec 06, July (2006)

    Google Scholar 

  19. Nokia: Nokia unveils the world”s first NFC product - Nokia NFC shell for Nokia 3220 phone (2004). Available from: http://press.nokia.com (29.6.2006)

    Google Scholar 

  20. International Chamber of Commerce: The fight against piracy and counterfeiting of intellectual property. Policy Statement. Submitted to the 35th ICC World Congress, Marrakesh, 7 June (2004)

    Google Scholar 

  21. World Customs Organization: The Kyoto convention: Customs contributing to the development of international trade. Fact Sheet (2006)

    Google Scholar 

  22. Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network - the potential of RFID in anti-counterfeiting. In 2005 ACM symposium on Applied computing, pages 1607–1612, New York (NY), ACM Press (2005)

    Google Scholar 

  23. NFC Forum, http://www.nfc-forum.org/home (2006)

    Google Scholar 

  24. Tsudik, G.: YA-TRAP: Yet another trivial RFID authentication protocol. In International Conference on Pervasive Computing and Communications – PerCom, March 2006, Pisa, Italy. IEEE, IEEE Computer Society Press (2006)

    Google Scholar 

  25. United Nations: The Review of Maritime Transport, 2003. United Nations Publication UNCTAD/RMT/2003 (2003). ISBN 92–1-112582–0

    Google Scholar 

  26. United Nations: The Review of Maritime Transport, 2005. United Nations Publication UNCTAD/RMT/2005 (2005). ISBN 92–1-112674–6

    Google Scholar 

  27. World Trade Organization: International Trade Statistics (2004)

    Google Scholar 

  28. U.S. Customs and Border Protection: Securing the Global Supply Chain: Customs- Trade Partnership Against Terrorism (C-TPAT) Strategic Plan (2004). Available from: http://www.customs.gov/linkhandler/cgov/import/commercial_enforcement/ ctpat/ctpat_strategicplan.ctt/ctpat_strategicplan.pdf (29.8.2006)

    Google Scholar 

  29. Schlesinger, A.: Mitigating Container Security Using Real-Time Monitoring with Active Radio Frequency Identification and Sensors. Master”s Thesis, Massachusetts Institute of Technology, June (2005)

    Google Scholar 

  30. Ecma International: Near Field Communication. White Paper Ecma/TC32- TG19/2004/1 (2004)

    Google Scholar 

  31. RFID Journal: TwinLinx Proposes to Marry NFC and EPC. News Article, Dec. 19 (2006). Available from: http://www.rfidjournal.com/

    Google Scholar 

  32. Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: Strengthening the Security of Machine Readable Documents by Combining RFID and Optical Memory Devices. In Ambient Intelligence Developments Conference (AmI.d), September (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E. (2008). The Potential of RFID and NFC in Anti-Counterfeiting. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71641-9_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71640-2

  • Online ISBN: 978-3-540-71641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics