Skip to main content

Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting

  • Conference paper
Radio Frequency Identification: Security and Privacy Issues (RFIDSec 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6370))

Abstract

Traces of RFID-equipped item can be used to detect counterfeits. Nevertheless companies are reluctant to share the necessary traces, since it is unclear what can be inferred from them. In this paper we present a provably secure pattern matching algorithm that can be used for distributed anomaly detection. We improve performance and detection capabilities compared to competing approaches by storing partial, malleable information on the RFID tag.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Applebaum, B., Freedman, M., Ringberg, H., Caesar, M., Rexford J.: Collaborative, Privacy-Preserving Data Aggregation At Scale (2009), http://eprint.iacr.org/2009/180.pdf

  2. Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proceesings of the 15th ACM Conference on Computer and Communications Security, CCS (2008)

    Google Scholar 

  3. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th annual ACM symposium on Theory of computing (1988)

    Google Scholar 

  4. Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Security through Private Information Aggregation (2009), http://arxiv1.library.cornell.edu/abs/0903.4258

  5. Du, W., Atallah, M.: Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. In: Proceedings of the Workshop on New Security Paradigms (2001)

    Google Scholar 

  6. European Commission. Report on Community Customs Activities on Counterfeit and Piracy (2008)

    Google Scholar 

  7. Flajolet, P., Gardy, D., Thimonier, L.: Birthday paradox, coupon collectors, caching algorithms and self-organizing search. Discrete Applied Mathematics 39(3) (1992)

    Google Scholar 

  8. Goldreich, O.: Secure Multi-party Computation (2002), www.wisdom.weizmann.ac.il/~oded/pp.html

  9. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th ACM Symposium on Theory of Computing (1987)

    Google Scholar 

  10. Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Proceedings of the 5th Theory of Cryptography Conference (2008)

    Google Scholar 

  11. Kerschbaum, F.: Practical Privacy-Preserving Benchmarking. In: Proceedings of the 23rd IFIP International Information Security Conference (2008)

    Google Scholar 

  12. Kerschbaum, F., Dahlmeier, D., Schröpfer, A., Biswas, D.: On the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols. In: Proceedings of the 24th ACM Symposium on Applied Computing (2009)

    Google Scholar 

  13. Kuerschner, C., Thiesse, F., Fleisch, E.: An analysis of data-on-tag concepts in manufacturing. In: Proceedings of the 3rd Konferenz Ubiquitäre und Mobile Informationssysteme (2008)

    Google Scholar 

  14. Lee, A., Tabriz, P., Borisov, N.: A Privacy-Preserving Interdomain Audit Framework. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society (2006)

    Google Scholar 

  15. Lehtonen, M., Michahelles, F., Fleisch, E.: How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces. In: Proceedings of the IEEE RFID Conference (2009)

    Google Scholar 

  16. Lincoln, P., Porras, P., Shmatikov, V.: Privacy-Preserving Sharing and Correlation of Security Alerts. In: Proceedings of the USENIX Security Symposium (2004)

    Google Scholar 

  17. Locasto, M., Parekh, J., Keromytis, A., Stolfo, S.: Towards Collaborative Security and P2P Intrusion Detection. In: Proceedings of the Information Assurance Workshop (2005)

    Google Scholar 

  18. Mirowski, L., Hartnett, J.: Deckard: A System to Detect Change of RFID Tag Ownership. International Journal of Computer Science and Network Security 7(7) (2007)

    Google Scholar 

  19. Oertel, N.: Tracking based product authentication: Catching intruders in the supply chain. In: Proceedings of the 17th European Conference on Information Systems (2008)

    Google Scholar 

  20. Parekh, J., Wang, K., Stolfo, S.: Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection. In: Proceedings of the SIGCOMM Workshop on Large-Scale Attack Defense (2006)

    Google Scholar 

  21. Porras, P., Shmatikov, V.: Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges. In: Proceedings of the Workshop on New Security Paradigms (2006)

    Google Scholar 

  22. Santos, B., Smith, L.: RFID in the Supply Chain: Panacea or Pandora’s Box? Communications of the ACM 51(10) (2008)

    Google Scholar 

  23. Sarma, S., Brock, D., Engels, D.: Radio frequency identification and the electronic product code. IEEE Micro. 21(6) (2001)

    Google Scholar 

  24. Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network – The Potential of RFID in Anti-Counterfeiting. In: Proceedings of the 20th ACM Symposium on Applied Computing (2005)

    Google Scholar 

  25. Yao, A.: Protocols for Secure Computations. In: Proceedings of the IEEE Symposium on Foundations of Computer Science (1982)

    Google Scholar 

  26. Zanetti, D., Fellmann, L., Capkun, S.: Privacy-preserving Clone Detection for RFID-enabled Supply Chains. In: Proceedings of the IEEE International Conference on RFID (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kerschbaum, F., Oertel, N. (2010). Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting. In: Ors Yalcin, S.B. (eds) Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010. Lecture Notes in Computer Science, vol 6370. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16822-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16822-2_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16821-5

  • Online ISBN: 978-3-642-16822-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics