Device-Level Extensions

Part of the In-Memory Data Management Research book series (IMDM)


In the preceding chapter, I depicted possible attacks that motivate the need for specific security requirements for RFID environments. The following chapter deals with concrete device-level security extensions for use in combination with low-cost RFID tags to keep product surcharges low. To support the fast adoption of RFID technology in the pharmaceutical supply chain, I developed the following authentication protocols to address device-level security aspects. They are designed to keep tag production costs low due to my assumption that this is the primary barrier for wide spreading of RFID-aided supply chains and EPCglobal networks in the pharmaceutical supply chain. In terms of the security matrix introduced in Sect. 3.3 device-level security extensions focus on (a) tag and reader devices from the technical view and (b) product counterfeits from the business view. In the following, I introduce authentication protocols, which were designed for use with passive low-cost tags from the technical perspective while improving the detection of product counterfeits from the business perspective.


  1. 1.
    D.-H. Seo, J.-M. Baek, D. Cho, Secure RFID authentication scheme for EPC class Gen2, in Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication (ACM, New York, 2009), pp. 221–227Google Scholar
  2. 2.
    D.C. Ranasimghe, Lightweight cryptography for low cost RFID, in Networked RFID Systems and Lightweight Cryptography, vol. 4. (Springer, 2008), pp. 311–346Google Scholar
  3. 3.
    Global standards 1: EPC radio-frequency identity protocols—class-1 generation-2 UHF RFID protocol for communications at 860 MHz–960 MHz - 1.2.0, (2008), Accessed 8 Mar 2012
  4. 4.
    A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot, Handbook of Applied Cryptography (CRC Press, Inc., Boca Raton, 1996)Google Scholar
  5. 5.
    A. Juels, Minimalist cryptography for low-cost RFID tags, in Security in Communication Networks, ed. by C. Blundo, S. Cimato. Lecture Notes in Computer Science, vol. 3352. (Springer, Berlin, 2005), pp. 149–164Google Scholar
  6. 6.
    D.E. Holcomb, W.P. Burleson, Initial SRAM state as a fingerprint and source of true random numbers for RFID tags, in Proceedings of the Conference on RFID Security, July, 2007Google Scholar
  7. 7.
    P. Tuyls, L. Batina, RFID-tags for anti-counterfeiting, in Proceedings of the RSA Conference on Topics in Cryptology. Lecture Notes in Computer Science, vol. 3860. (Springer, Heidelberg, 2006), pp. 115–131Google Scholar
  8. 8.
    B. Song, C.J. Mitchell, RFID authentication protocol for low-cost tags, in Proceedings of the 1st Conference on Wireless Network Security (ACM, New York, 2008), pp. 140–147Google Scholar
  9. 9.
    H. Birgit, RFID: technology, systems and applications, in Federal Association for Information Technology Telecommunications and New Media, Whitepaper, 2005Google Scholar
  10. 10.
    A.S. Tanenbaum, Computer Networks, 4th edn. (Prentice Hall, New Jersey, 2003)Google Scholar
  11. 11.
    M. Feldhofer, S. Dominikus, J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, in Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, pp. 357–370, 2004Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Hasso Plattner InstitutePotsdamGermany

Personalised recommendations