Abstract
RFID technology facilitates processing of product information, making it a promising technology for anti-counterfeiting. However, in large-scale RFID applications, such as supply chain, retail industry, pharmaceutical industry, total tag estimation and tag authentication are two major research issues. Though there are per-tag authentication protocols and probabilistic approaches for total tag estimation in RFID systems, the RFID authentication protocols are mainly per-tag-based where the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, one at a time. This increases the protocol execution time due to the large volume of authentication data. In this paper, we propose to detect counterfeit tags in large-scale system using efficient batch authentication protocol. We propose FSA-based protocol, FTest, to meet the requirements of prompt and reliable batch authentication in large-scale RFID applications. FTest can determine the validity of a batch of tags with minimal execution time which is a major goal of large-scale RFID systems. FTest can reduce protocol execution time by ensuring that the percentage of potential counterfeit products is under the user-defined threshold. The experimental result demonstrates that FTest performs significantly better than the existing counterfeit detection approaches, for example, existing authentication techniques.
Similar content being viewed by others
References
Pollinger ZA (2008) Counterfeit goods and their potential financing of international terrorism. Mich J Bus 1(1):85–102
Juels A (2005) RFID security and privacy: a research survey. Manuscript
Weis S, Sarma S, Rivest R, Engels D et al (2004) Security and privacy aspects of low-cost radio frequency identification systems. Lect Notes Comput Sci
Dimitriou T (2006) A secure and efficient RFID protocol that could make Big Brother (partially) obsolete. In: Proceedings of IEEE PerCom’06. WA, USA, pp 269–275
Lu L, Han J, Hu L, Liu Y, Ni LM et al (2007) Dynamic key-updating: privacy-preserving authentication for RFID systems. In: Proceedings of IEEE PerCom’07, NY, USA, pp 13–22
Hoque ME, Rahman F, Ahamed SI et al (2011) AnonPri: an efficient anonymous private authentication protocol. In: Proceedings of IEEE PerCom 11, WA, USA, pp 102–110
Lee SR, Joo SD, Lee CW et al (2005) An enhanced dynamic framed slotted aloha algorithm for RFID tag identification. In: Proceedings of IEEE MobiQuitous
Syamsuddin I, Dillon T, Chang E, Han S et al (2008) A survey of RFID authentication protocols based on Hash-Chain method. In: Proceedings of the third international conference on convergence and hybrid information technology
Lu L, Han J, Xiao R, Liu Y et al (2009) ACTION: breaking the privacy barrier for RFID systems. In: Proceedings of IEEE INFOCOM, pp 1953–1961
Avoine G, Oechslin P (2005) A scalable and provably secure hash based RFID protocol. In Proceedings of PerCom workshop-PerSec 05, pp 110–114
Hoque ME, Rahman F, Ahamed SI, Park JH et al (2009) Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments. Wirel Pers Commun 55(1):65–79
Hoque ME, Rahman F, Ahamed SI et al (2009) Supporting recovery, privacy and security in RFID systems using a robust authentication protocol. In: Proceedings of SAC 2009, USA, pp 1062–1066
Ahamed SI, Rahman F, Hoque ME, Kawsar F, Nakajima T et al (2008) YA-SRAP: yet another serverless RFID authentication protocol. In: Proceedings of international conference on intelligent environment (IE 2008), USA, pp 1–8
EPCglobal radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz. (Last accessed: 20 May 2012). http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_0_9-standard-20050126.pdf
O’Neill M (2008) Low-cost SHA-1 hash function architecture for RFID tags. In: Workshop on RFID security (RFIDSec’08)
Kodialam M, Nandagopal T et al (2006) Fast and reliable estimation schemes in RFID systems. In Proceedings of ACM MOBICOM, pp 322–333
Tan CC, Sheng B, Li Q et al (2008) How to monitor for missing RFID tags. In: Proceedings of IEEE ICDCS, pp 295–302
Lee DW, Bang OK, Im SY, Lee HJ et al (2008) Dual bias Q-algorithm and optimum weights for EPC class1 generation 2 protocol. In: 2008 European wireless, pp 1–5
Zhen B, Kobayashi M, Shimizui M et al (2005) Framed Aloha for multiple RFID objects ID. IEICE Trans Commun 991–999
E. Microelectronics. Supertag category protocols. Datasheet. (Last accessed 20 May, 2012). http://www.gaw.ru/doc/EM-Marin/P4022.PDF
Abraham C, Ahuja V, Ghosh A, Pakanati P et al (2002) Inventory management using passive RFID tags: a survey. Department of Computer Science, The University of Texas at Dallas, Richardson, TX, pp 1–16
Sheng B, Li Q, Mao W et al (2009) Efficient continuous scanning in RFID systems. In: Proceedings of IEEE INFOCOM, pp 1–9
Yang L, Han J, Qi Y, Liu Y et al (2010) Identification-free batch authentication for RFID tags. In: Proceedings of IEEE ICNP, pp 154–163
Roussos G, Kostakos V et al (2008) RFID in pervasive computing: state-of-the-art and outlook. J Pervasive Mob Comput 5(1):110–131
Molnar D, Wagner D et al (2004) Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of computer and communications security (CCS 04), USA, pp 210–219
Avoine G, Dysli E, Oechslin P et al (2005) Reducing time complexity in RFID systems. Sel Areas Cryptogr 3897:291–306
Buttyan L, Holczer T, Vajda, I Optimal key-trees for tree-based private authentication. In: Proceedings of privacy enhancing technologies workshop (PET 06), pp 332–350
Nohl K, Evans D et al (2006) Quantifying information leakage in tree-based hash protocols. In: Proceedings of information and communications security (ICICS 06), pp 228–237
Avoine G, Buttyan L, Holczer T, Vajda I et al (2007) Group-based private authentication. In: Proceedings of world of wireless, mobile and multimedia networks (WoWMoM 07), Finland, pp 1–6
Yao Q, Qi Y, Han J, Zhao J, Li X, Liu Y et al (2009) Randomizing RFID private authentication. In Proceedings of pervasive computing and communications workshop (PerCom Workshops 09), pp 1–10
Rahman F, Ahamed SI et al (2012) Looking for needles in a haystack: detecting counterfeits in large scale RFID systems using batch authentication protocol. In: Proceedings of IEEE PerCom workshop on pervasive wireless networking (PWN12)
Sheng B, Tan CC, Li Q, Mao W et al (2008). Finding popular categories for RFID tags. In: Proceedings of ACM MobiHoc, pp 159–168
Qian C, Ngan H, Liu Y et al (2008) Cardinality estimation for large-scale RFID systems. In: Proceedings of IEEE PerCom (Percom 08), pp 30–39
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rahman, F., Ahamed, S.I. Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols. Pers Ubiquit Comput 18, 177–188 (2014). https://doi.org/10.1007/s00779-012-0629-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-012-0629-8