Abstract
In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our solution is secure, privacy-preserving, and practical. It leverages on the standard EPCglobal network to share information about paths and parties in path authentication. Our solution can be implemented on standard EPC class 1 generation 2 tags with only 720 bits storage and no computational capability.
The second author’s work is supported in part by the Office of Research at Singapore Management University. The third author is supported in part by an NSFC grant No. 61070248, and a grant from Shanghai Municipal Education Commission.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
http://www1.cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf/index.html
ICC Commercial Crime Services. Counterfeiting intelligence bureau (2011), http://www.icc-ccs.org/home/cib
Ó hÉigeartaigh, C.: Pairing computation on hyperelliptic curves of genus 2. PhD thesis, Dublin City University (2006)
Ateniese, G., Camenisch, J., Medeiros, B.D.: Untraceable RFID tags via insubvertible encryption. In: CCS, New York, USA, pp. 92–101 (2005)
Blass, E.O., Elkhiyaoui, K., Molva, R.: Tracker: Security and privacy for RFID-based supply chains. Cryptology ePrint Archive, Report 2010/219 (2010)
Blass, E.O., Elkhiyaoui, K., Molva, R.: Tracker: security and privacy for RFID-based supply chains. In: NDSS, San Diego, California, USA (2011)
Boldyreva, A., Gentry, C., O’Neill, A., Yum, D.H.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: CCS, New York, NY, USA, pp. 276–285 (2007)
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: A survey of two signature aggregation techniques. CryptoBytes 6(2) (2003)
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Cai, S., Li, Y., Li, T., Deng, R.H.: Attacks and improvements to an rifd mutual authentication protocol and its extensions. In: WISEC, Zurich, Switzerland, pp. 51–58 (2009)
Dolev, D., Yao, A.C.: On the security of public key protocols. Technical report, Stanford, CA, USA (1981)
Gattorna, J.: Living Supply Chains. Pearson Education (2006)
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. In: CT–RSA, San Francisco, California, USA, pp. 163–178 (2004)
Juels, A.: Minimalist Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract). In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 149–164. Springer, Heidelberg (2005)
Juels, A., Pappu, R., Parno, B.: Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. In: USENIX, San Jose, California, USA, pp. 75–90 (2008)
Krawczyk, H., Bellare, M., Canetti, R.: RFC2104 - HMAC:Keyed-Hashing for Message Authentication. RFC Editor (1997)
Langheinrich, M., Marti, R.: Practical Minimalist Cryptography for RFID Privacy. IEEE Systems Journal, Special Issue on RFID Technology 1(2), 115–128 (2007)
Langheinrich, M., Marti, R.: RFID Privacy Using Spatially Distributed Shared Secrets. In: Ichikawa, H., Cho, W.-D., Satoh, I., Youn, H.Y. (eds.) UCS 2007. LNCS, vol. 4836, pp. 1–16. Springer, Heidelberg (2007)
Li, Y., Ding, X.: Protecting rfid communications in supply chains. In: ASIACCS, New York, NY, USA, pp. 234–241 (2007)
Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: CCS, Washington, DC, USA, pp. 210–219 (2004)
Noubir, G., Vijayan, K., Nussbaumer, H.J.: Signature-based method for run-time fault detection in communication protocols. Computer Communications 21, 21–25 (1998)
Reed, I.S., Solomon, G.: Polynomial codes Over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics 8(2), 300–304 (1960)
Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: Fast Software Encryption, Cambridge Security Workshop, London, UK, pp. 191–204 (1994)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Song, B., Mitchell, C.J.: RFID Authentication Protocol for Low-cost Tags. In: WISEC, Alexandria, Virginia, USA, pp. 140–147 (2008)
Zanetti, D., Fellmann, L., Capkun, S.: Privacy-preserving Clone Detection for RFID-enabled Supply Chains. In: IEEE RFID, Orlando, Florida, USA, pp. 37–44 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Cai, S., Li, Y., Zhao, Y. (2012). Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds) Information Security and Privacy Research. SEC 2012. IFIP Advances in Information and Communication Technology, vol 376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30436-1_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-30436-1_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30435-4
Online ISBN: 978-3-642-30436-1
eBook Packages: Computer ScienceComputer Science (R0)