Skip to main content
Log in

Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

RFID technology facilitates processing of product information, making it a promising technology for anti-counterfeiting. However, in large-scale RFID applications, such as supply chain, retail industry, pharmaceutical industry, total tag estimation and tag authentication are two major research issues. Though there are per-tag authentication protocols and probabilistic approaches for total tag estimation in RFID systems, the RFID authentication protocols are mainly per-tag-based where the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, one at a time. This increases the protocol execution time due to the large volume of authentication data. In this paper, we propose to detect counterfeit tags in large-scale system using efficient batch authentication protocol. We propose FSA-based protocol, FTest, to meet the requirements of prompt and reliable batch authentication in large-scale RFID applications. FTest can determine the validity of a batch of tags with minimal execution time which is a major goal of large-scale RFID systems. FTest can reduce protocol execution time by ensuring that the percentage of potential counterfeit products is under the user-defined threshold. The experimental result demonstrates that FTest performs significantly better than the existing counterfeit detection approaches, for example, existing authentication techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Pollinger ZA (2008) Counterfeit goods and their potential financing of international terrorism. Mich J Bus 1(1):85–102

    Google Scholar 

  2. Juels A (2005) RFID security and privacy: a research survey. Manuscript

  3. Weis S, Sarma S, Rivest R, Engels D et al (2004) Security and privacy aspects of low-cost radio frequency identification systems. Lect Notes Comput Sci

  4. Dimitriou T (2006) A secure and efficient RFID protocol that could make Big Brother (partially) obsolete. In: Proceedings of IEEE PerCom’06. WA, USA, pp 269–275

  5. Lu L, Han J, Hu L, Liu Y, Ni LM et al (2007) Dynamic key-updating: privacy-preserving authentication for RFID systems. In: Proceedings of IEEE PerCom’07, NY, USA, pp 13–22

  6. Hoque ME, Rahman F, Ahamed SI et al (2011) AnonPri: an efficient anonymous private authentication protocol. In: Proceedings of IEEE PerCom 11, WA, USA, pp 102–110

  7. Lee SR, Joo SD, Lee CW et al (2005) An enhanced dynamic framed slotted aloha algorithm for RFID tag identification. In: Proceedings of IEEE MobiQuitous

  8. Syamsuddin I, Dillon T, Chang E, Han S et al (2008) A survey of RFID authentication protocols based on Hash-Chain method. In: Proceedings of the third international conference on convergence and hybrid information technology

  9. Lu L, Han J, Xiao R, Liu Y et al (2009) ACTION: breaking the privacy barrier for RFID systems. In: Proceedings of IEEE INFOCOM, pp 1953–1961

  10. Avoine G, Oechslin P (2005) A scalable and provably secure hash based RFID protocol. In Proceedings of PerCom workshop-PerSec 05, pp 110–114

  11. Hoque ME, Rahman F, Ahamed SI, Park JH et al (2009) Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments. Wirel Pers Commun 55(1):65–79

    Article  Google Scholar 

  12. Hoque ME, Rahman F, Ahamed SI et al (2009) Supporting recovery, privacy and security in RFID systems using a robust authentication protocol. In: Proceedings of SAC 2009, USA, pp 1062–1066

  13. Ahamed SI, Rahman F, Hoque ME, Kawsar F, Nakajima T et al (2008) YA-SRAP: yet another serverless RFID authentication protocol. In: Proceedings of international conference on intelligent environment (IE 2008), USA, pp 1–8

  14. EPCglobal radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz. (Last accessed: 20 May 2012). http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_0_9-standard-20050126.pdf

  15. O’Neill M (2008) Low-cost SHA-1 hash function architecture for RFID tags. In: Workshop on RFID security (RFIDSec’08)

  16. Kodialam M, Nandagopal T et al (2006) Fast and reliable estimation schemes in RFID systems. In Proceedings of ACM MOBICOM, pp 322–333

  17. Tan CC, Sheng B, Li Q et al (2008) How to monitor for missing RFID tags. In: Proceedings of IEEE ICDCS, pp 295–302

  18. Lee DW, Bang OK, Im SY, Lee HJ et al (2008) Dual bias Q-algorithm and optimum weights for EPC class1 generation 2 protocol. In: 2008 European wireless, pp 1–5

  19. Zhen B, Kobayashi M, Shimizui M et al (2005) Framed Aloha for multiple RFID objects ID. IEICE Trans Commun 991–999

  20. E. Microelectronics. Supertag category protocols. Datasheet. (Last accessed 20 May, 2012). http://www.gaw.ru/doc/EM-Marin/P4022.PDF

  21. Abraham C, Ahuja V, Ghosh A, Pakanati P et al (2002) Inventory management using passive RFID tags: a survey. Department of Computer Science, The University of Texas at Dallas, Richardson, TX, pp 1–16

    Google Scholar 

  22. Sheng B, Li Q, Mao W et al (2009) Efficient continuous scanning in RFID systems. In: Proceedings of IEEE INFOCOM, pp 1–9

  23. Yang L, Han J, Qi Y, Liu Y et al (2010) Identification-free batch authentication for RFID tags. In: Proceedings of IEEE ICNP, pp 154–163

  24. Roussos G, Kostakos V et al (2008) RFID in pervasive computing: state-of-the-art and outlook. J Pervasive Mob Comput 5(1):110–131

    Article  Google Scholar 

  25. Molnar D, Wagner D et al (2004) Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of computer and communications security (CCS 04), USA, pp 210–219

  26. Avoine G, Dysli E, Oechslin P et al (2005) Reducing time complexity in RFID systems. Sel Areas Cryptogr 3897:291–306

    Article  MathSciNet  Google Scholar 

  27. Buttyan L, Holczer T, Vajda, I Optimal key-trees for tree-based private authentication. In: Proceedings of privacy enhancing technologies workshop (PET 06), pp 332–350

  28. Nohl K, Evans D et al (2006) Quantifying information leakage in tree-based hash protocols. In: Proceedings of information and communications security (ICICS 06), pp 228–237

  29. Avoine G, Buttyan L, Holczer T, Vajda I et al (2007) Group-based private authentication. In: Proceedings of world of wireless, mobile and multimedia networks (WoWMoM 07), Finland, pp 1–6

  30. Yao Q, Qi Y, Han J, Zhao J, Li X, Liu Y et al (2009) Randomizing RFID private authentication. In Proceedings of pervasive computing and communications workshop (PerCom Workshops 09), pp 1–10

  31. Rahman F, Ahamed SI et al (2012) Looking for needles in a haystack: detecting counterfeits in large scale RFID systems using batch authentication protocol. In: Proceedings of IEEE PerCom workshop on pervasive wireless networking (PWN12)

  32. Sheng B, Tan CC, Li Q, Mao W et al (2008). Finding popular categories for RFID tags. In: Proceedings of ACM MobiHoc, pp 159–168

  33. Qian C, Ngan H, Liu Y et al (2008) Cardinality estimation for large-scale RFID systems. In: Proceedings of IEEE PerCom (Percom 08), pp 30–39

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farzana Rahman.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rahman, F., Ahamed, S.I. Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols. Pers Ubiquit Comput 18, 177–188 (2014). https://doi.org/10.1007/s00779-012-0629-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-012-0629-8

Keywords

Navigation