Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29522


Select areas to restrict search in scientific publication database:
14301
Anti-Counterfeiting Solution Employing Mobile RFID Environment
Abstract:
EPC Class-1 Generation-2 UHF tags, one of Radio frequency identification or RFID tag types, is expected that most companies are planning to use it in the supply chain in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It causes security vulnerabilities, in particular cloning the tags for counterfeits. In this paper, we propose a product authentication solution for anti-counterfeiting at application level in the supply chain and mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication service to general consumers with mobile RFID devices like mobile phone or PDA which has a mobile RFID reader. We will discuss anti-counterfeiting mechanisms which are required to our proposed solution and address requirements that the mechanisms should have.
Digital Object Identifier (DOI):

References:

[1] EPCglobal Web site. www.epcglobalinc.org, 2005.
[2] EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz Version 1.0.9 ttp://www.epcglobalinc.org/stan-dards_technology/EPCglobalClass-1Ge neration-2UHFRF-IDProtocolV109.pdf
[3] Thorsten Staake, Frédéric Thiesse, Elgar Fleisch. Extending the EPC Network - The Potential of RFID in Anti-Counterfeiting, In Proceedings of the 2005 ACM symposium on Applied computing, pages 1607 - 1612, ACM, 2005.
[4] Nokia unveils RFID phone reader. RFID Journal, 17 March 2004. Available at http://www.r-fidjournal.com/article/view/834/1/13.
[5] Ari Juels. Minimalist cryptography for low-cost RFID tags. In C. Blundo and S. Cimato, editors, Security in Communication Networks (SCN 04), pages 149-164. Springer-Verlag, 2004. LNCS no. 3352.
[6] Ari Juels. ÔÇÿYoking-proofs- for RFID tags. In PerCom Workshops 2004, pages 138-143. IEEE Computer Society, 2004.
[7] David Molnar and David Wagner. Privacy and Security in Library RFID : Issues, Practices, and Architectures. In B. Pfitzmann and P. McDaniel, editors, Computer and Communica-tions Security, pages 210 - 219. ACM, 2004.
[8] Ari Juels. Strengthening EPC Tags Against Cloning. Available at http://www.rsasecu-rity.com/rsalabs/staff/bios/ajuels/publications/pdfs/E PC_authentication-16Mar05.pdf
[9] Ari Juels and Ravikanth Pappu. Squealing euros: Privacy protection in RFID enabled bank-notes. In Rebecca N. Wright, editor, Financial Cryptography - FC-03, volume 2742 of Lecture Notes in Computer Science, pages 103-121, Le Gosier, Guadeloupe, French West In-dies, January 2003. IFCA, Springer-Verlag.
[10] U. S. Department of Health and Human Services, Food and Drug Administration (2004) Combating Counterfeit Drugs, A Report of the Food and Drug Administration. Available at http://www.fda.gov/oc/initiatives/counterfeit/report02_04.pdf.
[11] P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal re-encryption for mixnets. In T.Okamoto, editor, CT-RSA -04. Springer-Verlag, 2004.
[12] RFID Journal Frequently Asked Questions, http://www.rfidjournal.com/faq.
[13] Mobile RFID Forum, http://www.mrf.or.kr.
[14] Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing, volume 2802 of Lecture Notes in Computer Science, pages 201-212, 2004.
[15] The 5-Cent Challenge. RFID Journal, 30 August 2004. Available at http://www.rfidjou-rnal.com/article/articleview/1100/1/2/.
[16] Test Set for RFID-Enabled Phones. RFID Journal, 20 September 2004. Available at http:// www.rfidjourn-al.com/article/articleview/1125/1/20/.
[17] About the EPCglobal Network™. Available at http://www.epcglobalinc.com/about/about _epc_network.html.
[18] IP4 Portable RFID Reader. Available at http://www.intermec.com/eprise/main/Intermec/C-ontent/Products/Produ cts_ShowDetail?Product=RFID2_IP4
[19] Mobile RFID Forum- Launched. IT Korea Journal March~April 2005, page 61. Available at http://www.ica.or.kr/lib/ITKorea_Eng(0503)/052%20industry%20news. pdf
[20] The International Anti-Counterfeiting Directory 2003. ICC Counterfeiting Intelligence Bureau. Available at http://www.iccwbo.org/ccs/cib_bureau/CIBDirectory.pdf
[21] RSA Laboratories. What is the RSA cryptosystem? Available at http://www.rsasecurity.co-m/ rsalabs/node.asp?id=2214.
[22] Mauro Barni and France Bartolini. Data Hiding for Fighting Piracy. In IEEE Signal Processing Magazine, March 2004, page 28 ~ 39.
[23] Digimarc. Enhancing Personal Identity Verification with Digital Watermarking, Available at http://csrc.nist.gov/piv-program/FIPS201-Public-Comments/digimarc.pd f
[24] Stephan J. Engberg, Morten B. Harning, Christian Damsgaard Jensen. Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preservingBusiness Value and Consumer Convenience, In Proceeding of PST 2004, page 89~100.
Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007