Browse > Article
http://dx.doi.org/10.9717/kmms.2015.18.6.710

Anti-Counterfeiting Mechanism Based on RFID Tag Ownership Transfer Protocol  

Lee, Jae-Dong (Dept. of Computer Science and Engineering, Kyungnam University)
Publication Information
Abstract
Counterfeit products have been a major concern in global market. With the emergence of RFID systems, to detect counterfeit products in supply chain is relatively easy. Many anti-counterfeiting techniques for products attached by RFID tag are proposed. Most of the previous anti-counterfeiting techniques are not considering the distribution of the counterfeit from a customer to a customer. Using the ownership transfer protocols we can prevent the counterfeit from being distributed on the supply chain as well as between the customers and the customers. The ownership transfer protocols must be modified for anti-counterfeiting because of the usage of the protocol. In this paper, we modify the ownership transfer protocol proposed by G. Kapoor and S. Piramuthu[1] to be able to detect the counterfeit and track and trace the products in the supply chain. Our proposed protocol consists of three phases: the products delivery phase, the products takeover phase, and the products sale phase. We show that our protocol is anti-counterfeiting as well as secure against the security attacks.
Keywords
RFID Security; Ownership Transfer Protocol; Anti-Counterfeiting;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, “Design and Implementation of PUF-Based “Unclonable” RFID ICs for Anti-Counterfeiting and Security Applications,” Proceedings of the IEEE International Conference on RFID, pp. 58-64, 2008.
2 P. Tuyls and L. Batina, “RFID-Tags for Anti-Counterfeiting,” Topics in Cryptology - CT-RSA 2006, Lecture Notes in Computer Science, Vol. 3860, pp. 115-131, 2006.   DOI
3 E.O. Blass, K. Elkhiyaoui, and R. Molva, “Tracker: Security and Privacy for RFIDbased Supply Chains,” Procceding of 18th Annual Network and Distributed System Security Symposium, pp. 455-472, 2011.
4 K. Elkhiyaoui, E.O. Blass, and R. Molva, “CHECKER: On-site Checking in RFID-based Supply Chains,” Proceedings of the fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 173-184, 2012.
5 C.L. Chen, Y.Y. Chen, Y.C. Huang, C.S. Liu, C.I. Lin, and T.F. Shih, “Anti-counterfeiting Ownership Transfer Protocol for Low Cost RFID System,” The World Scientific and Engineering Academy and Society Transactions on Computers, Vol. 7, Issue 8, pp. 1149-1158, 2008.
6 L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, "Lightweight Mutual Authentication and Ownership Transfer for RFID Systems," IEEE INFOCOM, pp. 251-255, 2010.
7 K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, "An Effcient and Secure RFID Security Method with Ownership Transfer," Proceeding of International Conference on Computational Intelligence and Security, pp. 1090-1095, 2006.
8 S. Fouladgar and H. Afifi, "An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags," Proceeding of The First International EURASIP Workshop on RFID Technology, pp. 59-62, 2007.
9 S. Song, "RFID Tag Ownership Transfer," Workshop on RFID Security, 2008.
10 J. Satio, K. Imamoto, and K. Sakurai, "Reassignment Scheme of an RFID Tag's Key for Owner Transfer," Lecture Notes in Computer Science, Vol. 3823, pp. 1303-1312, 2005.   DOI
11 J.D. Lee, “RFID Tag Ownership Transfer Protocol using Lightweight Computing Operators,” Journal of Korea Multimedia Society, Vol. 16, No. 12, pp. 1413-1426, 2013.   DOI
12 G. Kapoor and S. Piramuthu, "Single RFID Tag Ownership Transfer Protocols," IEEE Transactions on Systems, Man, and Cybernetics, Vol. 42, No. 2, pp. 164-173, 2012.   DOI
13 OECD, The Economic Impact of Counterfeiting and Privacy, Organisation for Economic Co-operation and Development, 2008.
14 S.H. Choi and C.H. Poon, “An RFID-based Anti-counterfeiting System,” IAENG International Journal of Computer Science, Vol. 35, No. 1, pp. 1-12, 2008.
15 M. Cerlinca, C. Turcu, T. Cerlinca, R. Prodan, and V. Popa, “Anti-counterfeiting ISO 15693 RFID Solutions Involving Authentication and Traceability using Symmetric and Asymmetric Cryptography,” Proceedings of the 11th International Conference on Development and Application Systems, pp. 175-178, 2012.
16 H.H. Cheung and S.H. Choi, “Implementation Issues in RFID-based Anti-counterfeiting Systems,” Computers in Industry, Vol. 62, No. 7, pp. 708-718, 2011.   DOI
17 C.L. Chen, Y.Y. Chen, T.F. Shih, and T.M. Kuo, “An RFID Authentication and Anticounterfeiting Transaction Protocol,” Proceedings of International Symposium on Computer, Consumer and Control, pp. 419-422, 2012.
18 M.P. Schapranow, A. Zeier, F. Leupold, and T. Schubotz, “Securing EPCglobal Object Name Service-Privacy Enhancements for Anti-counterfeiting,” Proceedings of Second Intelligent Systems, Modelling and Simulation, pp. 332-337, 2011.
19 A. Arbit, Y. Oren, and A. Wool, “Toward Practical Public key Anti-Counterfeiting for Low-Cost EPC Tags,” Proceeding of International IEEE Conference on RFID, pp. 184-191, 2011.
20 M.Q. Saeed, Z. Bilal, and C.D. Walter, “An NFC Based Consumer-level Counterfeit Detection FrameWork,” Proceeding of 11th Annual Conference on Privacy, Security and Trust, pp. 135-142, 2013.