Advertisement

Detecting Counterfeit RFID Tags Using Digital Forensic

  • JingHuey Khor
  • Widad Ismail
  • Mohammad Ghulam Rahman
Part of the Studies in Computational Intelligence book series (SCI, volume 555)

Abstract

Radio frequency identification (RFID) tag counterfeiting issue is prevalent throughout the world, especially in the access control and information technology sectors. Counterfeit detection is vital in digital forensic practices, especially for counterfeit RFID tag analysis. Hence, electronic fingerprint matching method is proposed to be used as a detection mechanism to detect counterfeit tags. The electronic fingerprint matching method is presented in the digital forensic investigation model that consists of seven phases.The received and backscatter powers of tag are proposed to be used as unique electronic fingerprint in the fingerprint matching method. Two statistical tests, namely, t-test and ANOVA test, are used in the fingerprint matching method. Five fingerprint matching methods are presented and are categorized based on the power response of tag and the statistical test used. Method V which uses three way ANOVA test to analyze backscatter power of tag has the most accurate results. This is because Method V has the highest area under curve (AUC) (0.999) and lowest equal error rate (EER) (0.01) values. Besides that, the false acceptance rate (FAR) and false rejection rate (FRR) obtained are 0.1 % and 1.3 %, respectively. Therefore, the proposed Method V has been proven able to detect counterfeit tags efficiently.

Keywords

Counterfeit EPCglobal Class-1 Generation-2 Fingerprinting Matching Method RFID 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hagl, A., Aslanidis, K.: RFID: Fundamentals and Applications. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 3–26. Springer US (2009)Google Scholar
  2. 2.
    Piramuthu, S.: Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 38(3), 360–376 (2008)CrossRefGoogle Scholar
  3. 3.
    Tuyls, P., Batina, L.: RFID-Tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    King, B., Zhang, X.: RFID: An Anticounterfeiting Tool. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 27–55. Springer US (2009)Google Scholar
  5. 5.
    Li, T., Lim, T.-L.: RFID Anticounterfeiting: An Architectural Perspective. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 131–146. Springer US (2009)Google Scholar
  6. 6.
    Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network: The Potential of RFID in Anti-Counterfeiting. In: Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, New Mexico, pp. 1607–1612 (2005)Google Scholar
  7. 7.
    MarketsandMarkets: Global Anti Counterfeit Packaging Market Food and Pharmaceuticals (2010)Google Scholar
  8. 8.
    RNCOS: Research Report on Global RFID Market Analysis Till 2010 (2010)Google Scholar
  9. 9.
    Henrici, D.: RFID Security and Privacy. Concepts, Protocols, and Architectures. LNEE, vol. 17. Springer, Heidelberg (2008)Google Scholar
  10. 10.
    Sharif, A., Potdar, V.: A Critical Analysis of RFID Security Protocols. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops, GinoWan, Okinawa, Japan, pp. 1357–1362 (2008)Google Scholar
  11. 11.
    Stadlober, S.: An Evaluation of Security Threats and Countermeasures in Distributed RFID Infrastructures. Graz University of Technology, Graz (2005)Google Scholar
  12. 12.
    Martínez-Sala, A.S., Egea-López, E., García-Sánchez, F., García-Haro, J.: Tracking of Returnable Packaging and Transport Units with Active RFID in The Grocery Supply Chain. Computers in Industry 60, 161–171 (2009)CrossRefGoogle Scholar
  13. 13.
    Razaq, A., Luk, W.T., Shum, K.M., Cheng, L.M., Yung, K.N.: Second-Generation RFID. IEEE Security & Privacy, 21–22 (2008)Google Scholar
  14. 14.
    Juels, A.: Strengthening EPC Tags Against Cloning. In: Proceedings of the 4th ACM Workshop on Wireless Security, pp. 67–76. ACM, Cologne (2005)CrossRefGoogle Scholar
  15. 15.
    Rieback, M.R., Crispo, B., Tanenbaum, A.S.: The Evolution of RFID Security. IEEE Pervasive Computing 5(1), 62–69 (2006)CrossRefGoogle Scholar
  16. 16.
    Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An Efficient Forward Private RFID Protocol. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA (2009)Google Scholar
  17. 17.
    Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classification of RFID Attacks. In: Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges, Barcelona, Spain, pp. 73–86 (2008)Google Scholar
  18. 18.
    Wong, K.H.M., Hui, P.C.L., Chan, A.C.K.: Cryptography and Authentication on RFID Passive Tags for Apparel Products. Computers in Industry 57(4), 342–349 (2006)CrossRefGoogle Scholar
  19. 19.
    Mirowski, L., Hartnett, J., Williams, R.: An RFID Attacker Behavior Taxonomy. IEEE Pervasive Computing 8(4), 79–84 (2009)CrossRefGoogle Scholar
  20. 20.
    Lehtonen, M.O., Michahelles, F., Fleisch, E.: Trust and Security in RFID-Based Product Authentication Systems. IEEE Systems Journal 1(2), 129–144 (2007)CrossRefGoogle Scholar
  21. 21.
    Koscher, K., Juels, A., Brajkovic, V., Kohno, T.: EPC RFID Tag Security Weaknesses and Defenses: Passport Cards, Enhanced Drivers Licenses, and Beyond. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, pp. 33–42 (2009)Google Scholar
  22. 22.
    Juels, A., Molnar, D., Wagner, D.: Security Issues in E-Passports. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, pp. 74–88 (2005)Google Scholar
  23. 23.
    Khor, J.H., Ismail, W., Younis, M.I., Sulaiman, M.K., Rahman, M.G.: Security Problems in an RFID System. Wireless Personal Communications 59(1), 17–26 (2010)CrossRefGoogle Scholar
  24. 24.
    Kamoun, F.: RFID System Management: State-of-the Art and Open Research Issues. IEEE Transactions on Network and Service Management 6(3), 190–205 (2009)CrossRefMathSciNetGoogle Scholar
  25. 25.
    Bailey, D.V., Juels, A.: Shoehorning Security into the EPC Tag Standard. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 303–320. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  26. 26.
    Zuo, Y.: Survivable RFID Systems: Issues, Challenges, and Techniques. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 40(4), 406–418 (2010)CrossRefGoogle Scholar
  27. 27.
    Ghayal, A., Khan, Z., Moona, R.: SmartRF - A Flexible and Light-Weight RFID Middleware. In: Proceedings of the IEEE International Conference on e-Business Engineering, Xi’an, China, pp. 317–324 (2008)Google Scholar
  28. 28.
    Lin, F., Chen, B., Chan, C.Y., Wu, C.H., Ip, W.H., Mai, A., Wang, H., Liu, W.: The Design of a Lightweight RFID Middleware. International Journal of Engineering Business Management 1(2), 25–30 (2009)Google Scholar
  29. 29.
    Li, T.Y., Lim, T.L.: RFID Anticounterfeiting: An Architectural Perspective. In: Kitsos, P., Zhang, Y. (eds.) RFID Security, pp. 131–146. Springer US (2009)Google Scholar
  30. 30.
    Zanetti, D., Danev, B., Capkun, S.: Physical-Layer Identification of UHF RFID Tags. In: Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, Chicago, Illinois, USA, pp. 353–364 (2010)Google Scholar
  31. 31.
    Periaswamy, S.C.G., Thompson, D.R., Jia, D.: Fingerprinting RFID Tags. IEEE Transactions on Dependable and Secure Computing 8(6), 938–943 (2011)CrossRefGoogle Scholar
  32. 32.
    Van Staden, F.R., Venter, H.S.: Adding Digital Forensic Readiness to The Email Trace Header. In: Information Security for South Africa (ISSA), pp. 1–4 (2010)Google Scholar
  33. 33.
    Sammons, J.: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Elsevier (2012)Google Scholar
  34. 34.
    Palmer, G.: A Road Map for Digital Forensic Research. In: The First Digital Forensic Research Workshop, Utica, New York (2001)Google Scholar
  35. 35.
    Khor, J.H., Ismail, W., Rahman, M.G.: Prevention and Detection Methods for Enhancing Security in an RFID System. International Journal of Distributed Sensor Networks 2012, 8 (2012)CrossRefGoogle Scholar
  36. 36.
    Chang, K.: RF and Microwave Wireless Systems. Wiley-Interscience (2000)Google Scholar
  37. 37.
    Du, K.-L., Swamy, M.N.S.: Wireless Communication Systems: From RF Subsystems to 4G Enabling Technologies. Cambridge University Press (2010)Google Scholar
  38. 38.
    Lu, D., So, D.K.C., Brown, A.K.: Receive Antenna Selection Scheme for V-BLAST with Mutual Coupling in Correlated Channels. In: IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, Cannes, France, pp. 1970–1974 (2008)Google Scholar
  39. 39.
    Lim, S., Ling, H.: Design of Electrically Small Yagi Antenna. Electronics Letters 43(5), 256–258 (2007)CrossRefGoogle Scholar
  40. 40.
    Thomas, J.R., Nelson, J.K., Silverman, S., Silverman, S.J.: Research Methods in Physical Activity. Human Kinetics (2010)Google Scholar
  41. 41.
    Montgomery, D.: Design and Analysis of Experiments. John Wiley and Sons (2001)Google Scholar
  42. 42.
    Venkatesan, S.: Investigation of RFID Readability for License Plates in Static and Motion Testing. University of Nebraska, Lincoln (2011)Google Scholar
  43. 43.
    Tamhane, A.C.: Statistical Analysis of Designed Experiments: Theory and Applications Wiley-Interscience (2009)Google Scholar
  44. 44.
    Jian, Z., Shirai, H., Takahashi, I., Kuroiwa, J., Odaka, T., Ogura, H.: A Hybrid Command Sequence Model for Anomaly Detection. In: Zhou, Z.-H., Li, H., Yang, Q. (eds.) PAKDD 2007. LNCS (LNAI), vol. 4426, pp. 108–118. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  45. 45.
    Tronci, R., Giacinto, G., Roli, F.: Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method. In: Perner, P. (ed.) MLDM 2009. LNCS, vol. 5632, pp. 163–177. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  46. 46.
    Wu, J.C.: Operational Measures and Accuracies of ROC Curve on Large Fingerprint Data Sets. National Institute of Standards and Technology 1(1), 1–23 (2008)Google Scholar
  47. 47.
    Ramachandra, A.C., Pavithra, K., Yashasyini, K., Raja, K.B., Venugopal, K.R., Patnaik, L.M.: Cross-Validation for Graph Matching Based Offline Signature Verification. In: Annual IEEE India Conference, Kanpur, India, pp. 17–22 (2008)Google Scholar
  48. 48.
    Kutlu, Y., Kuntalp, D.: A Multi-Stage Automatic Arrhythmia Recognition and Classification System. Journal of Computers in Biology and Medicine 41(1), 37–45 (2011)CrossRefGoogle Scholar
  49. 49.
    Chevillotte, C.J., Ali, M.H., Trousdale, R.T., Larson, D.R., Gullerud, R.E., Berry, D.J.: Inflammatory Laboratory Markers in Periprosthetic Hip Fractures. Journal of Arthroplasty 24(5), 722–727 (2009)CrossRefGoogle Scholar
  50. 50.
    Lehmann, E.L., Romano, J.P.: Testing Statistical Hypotheses. Springer, New York (2005)MATHGoogle Scholar
  51. 51.
    Taneja, S., Akcamete, A., Akinci, B., Garrett, J., Soibelman, L., East, E.: Analysis of Three Indoor Localization Technologies for Supporting Operations and Maintenance Field Tasks. Journal of Computing in Civil Engineering 26(6), 708–719 (2012)CrossRefGoogle Scholar
  52. 52.
    Bockstiegel, K.H., Benko, M.: Space Law: Basic Legal Documents. Eleven International Publishing (1990)Google Scholar
  53. 53.
    Hayes, A.F.: Statistical Methods for Communication Science. Taylor & Francis (2012)Google Scholar
  54. 54.
    Wooldridge, J.M.: Introductory Econometrics: A Modern Approach. South Western, Cengage Learning (2009)Google Scholar
  55. 55.
    Bradley, T.: Essential Statistics for Economics, Business and Management. John Wiley & Sons (2007)Google Scholar
  56. 56.
    Rumsey, D.: Intermediate Statistics For Dummies. Wiley (2007)Google Scholar
  57. 57.
    Scutchfield, F.D., Keck, C.W.: Principles of Public Health Practice. Thomson/Delmar Learning (2003)Google Scholar
  58. 58.
    Sinclair, A., Nantel, P., Catling, P.: Dynamics of Threatened Goldenseal Populations and Implications for Recovery. Biological Conservation 123(3), 355–360 (2005)CrossRefGoogle Scholar
  59. 59.
    Jackson, S.L.: Statistics: Plain and Simple. Cengage Learning (2009)Google Scholar
  60. 60.
    Creighton, T.B.: Schools and Data: The Educator’s Guide for Using Data to Improve Decision Making. SAGE Publications (2006)Google Scholar
  61. 61.
    Lee, I.: Mobile Applications and Knowledge Advancements in E-Business. IGI Global (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • JingHuey Khor
    • 1
  • Widad Ismail
    • 1
  • Mohammad Ghulam Rahman
    • 1
  1. 1.Auto-ID Laboratory, School of Electrical and Electronic EngineeringUniversiti Sains Malaysia (USM)Nibong TebalMalaysia

Personalised recommendations