A Robust and Secure RFID-Based Pedigree System (Short Paper)

  • Chiu C. Tan
  • Qun Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4307)


There has been considerable interest recently on developing a system to track items like pharmaceutical drugs or food products. Such a system can help prevent counterfeits, aid product recall, and improve general logistics. In this paper, we present such system based on radio frequency identity (RFID) technology. Our solution provides the means of storing the entire movement of the item from original manufacturer to final consumer on the RFID tag itself, and also makes it more difficult to introduce large numbers of counterfeits. The solution also allows the end user to easily verify the authenticity of the item.


Memory Cell Counterfeit Product Pharmaceutical Supply Chain Malicious Agent Electronic Pedigree 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, Athens, Greece. IEEE, Los Alamitos (2005)Google Scholar
  3. 3.
    Gonzalez, H., Han, J., Li, X., Klabjan, D.: Warehousing and analyzing massive rfid data sets. In: ICDE 2006: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006), Washington, DC, USA, p. 83. IEEE Computer Society, Los Alamitos (2006)Google Scholar
  4. 4.
    Hassan, T., Chatterjee, S.: A taxonomy for rfid. HICSS 8, 184 (2006)Google Scholar
  5. 5.
    Juels, A.: Strengthening EPC tags against cloning. In: WiSe 2005: Proceedings of the 4th ACM workshop on Wireless security, pp. 67–76. ACM Press, New York (2005)CrossRefGoogle Scholar
  6. 6.
    Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Computing 24(2), 381–394 (2006)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Juels, A., Pappu, R.: Squealing euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Texas Instruments Incorporated. Securing the pharmaceutical supply chain with rfid and public-key infrastructure (PKI) technologies, http://www.ti.com/rfid/docs/customer/eped-form.shtml
  9. 9.
  10. 10.
  11. 11.
    Rieback, M., Crispo, B., Tanenbaum, A.: The evolution of RFID security. IEEE Pervasive Computing 5(1), 62–69 (2006)CrossRefGoogle Scholar
  12. 12.
    Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC network: the potential of rfid in anti-counterfeiting. In: SAC 2005: Proceedings of the 2005 ACM symposium on Applied computing, pp. 1607–1612. ACM Press, New York (2005)CrossRefGoogle Scholar
  13. 13.
    Yoshida, J.: Tests reveal e-passport security flaw. EE Times (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Chiu C. Tan
    • 1
  • Qun Li
    • 1
  1. 1.Department of Computer ScienceCollege of William and Mary 

Personalised recommendations