EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.
 EPCglobal Web site. www.epcglobalinc.org, 2005.
 EPC™ Radio-Frequency Identity Protocols Class-1 Generation-2 UHF
RFID Protocol for Communications at 860 MHz - 960 MHz Version
 Thorsten Staake, Frédéric Thiesse, Elgar Fleisch. Extending the EPC
Network - The Potential of RFID in Anti-Counterfeiting, In Proceedings
of the 2005 ACM symposium on Applied computing, pages 1607 - 1612,
 Nokia unveils RFID phone reader. RFID Journal, 17 March 2004.
Available at http://www.r-fidjournal.com/article/view/834/1/13.
 Ari Juels. Minimalist cryptography for low-cost RFID tags. In C. Blundo
and S. Cimato, editors, Security in Communication Networks (SCN 04),
pages 149-164. Springer-Verlag, 2004. LNCS no. 3352.
 Ari Juels. ÔÇÿYoking-proofs- for RFID tags. In PerCom Workshops 2004,
pages 138-143. IEEE Computer Society, 2004.
 David Molnar and David Wagner. Privacy and Security in Library RFID :
Issues, Practices, and Architectures. In B. Pfitzmann and P. McDaniel,
editors, Computer and Communica-tions Security, pages 210 - 219.
 Ari Juels. Strengthening EPC Tags Against Cloning. Available at
 Ari Juels and Ravikanth Pappu. Squealing euros: Privacy protection in
RFID enabled bank-notes. In Rebecca N. Wright, editor, Financial
Cryptography - FC-03, volume 2742 of Lecture Notes in Computer
Science, pages 103-121, Le Gosier, Guadeloupe, French West In-dies,
January 2003. IFCA, Springer-Verlag.
 U. S. Department of Health and Human Services, Food and Drug
Administration (2004) Combating Counterfeit Drugs, A Report of the
Food and Drug Administration. Available at
 P. Golle, M. Jakobsson, A. Juels, and P. Syverson. Universal
re-encryption for mixnets. In T.Okamoto, editor, CT-RSA -04.
 RFID Journal Frequently Asked Questions,
 Mobile RFID Forum, http://www.mrf.or.kr.
 Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W.
Engels. Security and Privacy Aspects of Low-Cost Radio Frequency
Identification Systems. In Security in Pervasive Computing, volume 2802
of Lecture Notes in Computer Science, pages 201-212, 2004.
 The 5-Cent Challenge. RFID Journal, 30 August 2004. Available at
 Test Set for RFID-Enabled Phones. RFID Journal, 20 September 2004.
Available at http:// www.rfidjourn-al.com/article/articleview/1125/1/20/.
 About the EPCglobal Network™. Available at
 IP4 Portable RFID Reader. Available at
 Mobile RFID Forum- Launched. IT Korea Journal March~April 2005,
page 61. Available at
 The International Anti-Counterfeiting Directory 2003. ICC
Counterfeiting Intelligence Bureau. Available at
 RSA Laboratories. What is the RSA cryptosystem? Available at
 Mauro Barni and France Bartolini. Data Hiding for Fighting Piracy. In
IEEE Signal Processing Magazine, March 2004, page 28 ~ 39.
 Digimarc. Enhancing Personal Identity Verification with Digital
Watermarking, Available at
 Stephan J. Engberg, Morten B. Harning, Christian Damsgaard Jensen.
Zero-knowledge Device Authentication: Privacy & Security Enhanced
RFID preservingBusiness Value and Consumer Convenience, In
Proceeding of PST 2004, page 89~100.