RFID Product Authentication in EPCglobal Network

نویسندگان

  • Tieyan Li
  • Wei He
چکیده

Estimated by the International Chamber of Commerce (ICC) in 2006, nearly 5-7% of the global world trade is in counterfeit goods, with the counterfeit market being worth approximately US$600 billion annually. Existing technical countermeasures, such as holograms, smart cards, biometric markers and inks, represent a flexible portfolio of solutions against some counterfeiting behaviors. Recently, RFID was reportedly used in product authentication solutions to achieve a higher degree of automation when checking the authenticity of a product. For example, Euro banknotes are attached with RFID chips to combat counterfeiting by European Central Bank. The United States Food and Drug Administration (US FDA) has issued a report that endorses RFID as a tool to combat counterfeiting of pharmaceuticals. So far, these RFID-based solutions seem pretty promising [28]. With wide adoption of RFID technology witnessed in various industries, the future of RFID for product authentication purpose looks optimistic. The main objective of a product authentication solution is to distinguish a genuine product from a fake one. The basic concept of applying RFID to product authentication lies in its original function of identification. Imagine a scenario in the future, in which every object will be attached with an RFID tag that contains a unique number belonging to the object. Once the tag is interrogated, the unique object number is emitted and interpreted by the back-end system to identify the object. If, for instance, all the unique object numbers are stored in a database, we can then check the database to verify the identity of an object. Unfortunately, identification alone is insufficient for solving the anti-counterfeiting problem. Problems exist in such a straightforward solution. For example, the unique object number can be eavesdropped and copied onto blank tags to produce clones, and the database would not be able to distinguish a legitimate tag from a cloned tag containing the same object number. There are many other ways to attack such a simplified identification system. For example, in a “tag removal and reapply” attack, counterfeiter can remove a tag from an authentic product, perform reverse engineering on the tag to extract out key attributes, and replicate these attributes onto blank tags. In fact, product authentication has stronger requirements on security and needs a more complex system to implement. RFID-based product authentication solutions leverage on the benefits provided by the RFID tags and the back-end information system within the RFIDO pe n A cc es s D at ab as e w w w .in te ch w eb .o rg

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards

Radio-frequency identification (RFID) has become the center of attention in automatic identification technology. However, many security problems still could be found in the system design. Recent researches have pointed out the applications of RFID to ownership transfer, but these applications cannot achieve the Electronic Product Code (EPC) Class-1 Generation-2 standards. In this paper, we prop...

متن کامل

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our s...

متن کامل

Multipolarity for the Object Naming Service

The Object Naming Service (ONS) is a central lookup service of the EPCglobal Network. Its main function is the address retrieval of manufacturer information services for a given Electronic Product Code (EPC) identifier. This allows dynamic and globally distributed information sharing for items equipped with RFID tags compatible to EPCglobal standards. However, unlike in the DNS system, the ONS ...

متن کامل

On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags

RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications, different authentication schemes have been proposed to ...

متن کامل

An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System

The nature of data security vulnerability and location privacy invasion of RFID systems have become a serious problem after hundreds of RFID application systems deployed all over the world. One of the promising solution directions is to provide an efficient authentication scheme with the compliance of international RFID standards such as EPCglobal, ISO18000-1 and ISO18000-6. In this study, we p...

متن کامل

Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard

In 2006 EPCglobal and the International Organization for Standards (ISO) ratified the EPC Class-1 Generation-2 (Gen-2) [1] and the ISO 18000-6C standards [2], respectively. These efforts represented major advancements in the direction of universal standardization for low-cost RFID tags. However, a cause for concern is that security issues do not seem to be properly addressed. In this paper, we ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012