43 research outputs found
Efficient Detection of Counterfeit Products in Large-scale RFID Systems Using Batch Authentication Protocols
RFID technology facilitates processing of product information, making it a promising technology for anti-counterfeiting. However, in large-scale RFID applications, such as supply chain, retail industry, pharmaceutical industry, total tag estimation and tag authentication are two major research issues. Though there are per-tag authentication protocols and probabilistic approaches for total tag estimation in RFID systems, the RFID authentication protocols are mainly per-tag-based where the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, one at a time. This increases the protocol execution time due to the large volume of authentication data. In this paper, we propose to detect counterfeit tags in large-scale system using efficient batch authentication protocol. We propose FSA-based protocol, FTest, to meet the requirements of prompt and reliable batch authentication in large-scale RFID applications. FTest can determine the validity of a batch of tags with minimal execution time which is a major goal of large-scale RFID systems. FTest can reduce protocol execution time by ensuring that the percentage of potential counterfeit products is under the user-defined threshold. The experimental result demonstrates that FTest performs significantly better than the existing counterfeit detection approaches, for example, existing authentication techniques
Ensuring Application Specific Security, Privacy and Performance Goals in RFID Systems
Radio Frequency IDentification (RFID) is an automatic identification technology that uses radio frequency to identify objects. Securing RFID systems and providing privacy in RFID applications has been the focus of much academic work lately. To ensure universal acceptance of RFID technology, security and privacy issued must be addressed into the design of any RFID application. Due to the constraints on memory, power, storage capacity, and amount of logic on RFID devices, traditional public key based strong security mechanisms are unsuitable for them. Usually, low cost general authentication protocols are used to secure RFID systems. However, the generic authentication protocols provide relatively low performance for different types of RFID applications. We identified that each RFID application has unique research challenges and different performance bottlenecks based on the characteristics of the system. One strategy is to devise security protocols such that application specific goals are met and system specific performance requirements are maximized.
This dissertation aims to address the problem of devising application specific security protocols for current and next generation RFID systems so that in each application area maximum performance can be achieved and system specific goals are met. In this dissertation, we propose four different authentication techniques for RFID technologies, providing solutions to the following research issues: 1) detecting counterfeit as well as ensuring low response time in large scale RFID systems, 2) preserving privacy and maintaining scalability in RFID based healthcare systems, 3) ensuring security and survivability of Computational RFID (CRFID) networks, and 4) detecting missing WISP tags efficiently to ensure reliability of CRFID based system\u27s decision. The techniques presented in this dissertation achieve good levels of privacy, provide security, scale to large systems, and can be implemented on resource-constrained RFID devices
Rapid Node Cardinality Estimation in Heterogeneous Machine-to-Machine Networks
Machine-to-Machine (M2M) networks are an emerging technology with
applications in various fields, including smart grids, healthcare, vehicular
telematics and smart cities. Heterogeneous M2M networks contain different types
of nodes, e.g., nodes that send emergency, periodic, and normal type data. An
important problem is to rapidly estimate the number of active nodes of each
node type in every time frame in such a network. In this paper, we design two
schemes for estimating the active node cardinalities of each node type in a
heterogeneous M2M network with types of nodes, where is an
arbitrary integer. Our schemes consist of two phases-- in phase 1, coarse
estimates are computed, and in phase 2, these estimates are used to compute the
final estimates to the required accuracy. We analytically derive a condition
for one of our schemes that can be used to decide as to which of two possible
approaches should be used in phase 2 to minimize its execution time. The
expected number of time slots required to execute and the expected energy
consumption of each active node under one of our schemes are analysed. Using
simulations, we show that our proposed schemes require significantly fewer time
slots to execute compared to estimation schemes designed for a heterogeneous
M2M network in prior work, and also, compared to separately executing a
well-known estimation protocol designed for a homogeneous network in prior work
times to estimate the cardinalities of the node types, even though all
these schemes obtain estimates with the same accuracy.Comment: 14 pages, 21 figure
Internet of Things Strategic Research Roadmap
Internet of Things (IoT) is an integrated part of Future Internet including existing and evolving Internet and network developments and could be conceptually defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual “things” have identities, physical attributes, and virtual personalities, use intelligent interfaces, and are seamlessly integrated into the information network
Distributed Wireless Algorithms for RFID Systems: Grouping Proofs and Cardinality Estimation
The breadth and depth of the use of Radio Frequency Identification (RFID) are becoming more substantial. RFID is a technology useful for identifying unique items through radio waves. We design algorithms on RFID-based systems for the Grouping Proof and Cardinality Estimation problems.
A grouping-proof protocol is evidence that a reader simultaneously scanned the RFID tags in a group. In many practical scenarios, grouping-proofs greatly expand the potential of RFID-based systems such as supply chain applications, simultaneous scanning of multiple forms of IDs in banks or airports, and government paperwork. The design of RFID grouping-proofs that provide optimal security, privacy, and efficiency is largely an open area, with challenging problems including robust privacy mechanisms, addressing completeness and incompleteness (missing tags), and allowing dynamic groups definitions. In this work we present three variations of grouping-proof protocols that implement our mechanisms to overcome these challenges.
Cardinality estimation is for the reader to determine the number of tags in its communication range. Speed and accuracy are important goals. Many practical applications need an accurate and anonymous estimation of the number of tagged objects. Examples include intelligent transportation and stadium management. We provide an optimal estimation algorithm template for cardinality estimation that works for a {0,1,e} channel, which extends to most estimators and ,possibly, a high resolution {0,1,...,k-1,e} channel
Recommended from our members
EFFICIENT HARDWARE PRIMITIVES FOR SECURING LIGHTWEIGHT SYSTEMS
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is increasingly being handled by lightweight Integrated Circuits. Efficient hardware implementations of crytographic primitives for resource constrained applications have become critical, especially block ciphers which perform fundamental operations such as encryption, decryption, and even hashing. We study the efficiency of block ciphers under different implementation styles. For low latency applications that use unrolled block cipher implementations, we design a glitch filter to reduce energy consumption. For lightweight applications, we design a novel architecture for the widely used AES cipher. The design eliminates inefficiencies in data movement and clock activity, thereby significantly improving energy efficiency over state-of-the-art architectures. Apart from efficiency, vulnerability to implementation attacks are a concern, which we mitigate by our randomization capable lightweight AES architecture. We fabricate our designs in a commercial 16nm FinFET technology and present measured testchip data on energy consumption and side channel resistance. Finally, we address the problem of supply chain security by using image processing techniques to extract fingerprints from surface texture of plastic IC packages for IC authentication and counterfeit prevention. Collectively these works present efficient and cost effective solutions to secure lightweight systems
New authentication applications in the protection of caller ID and banknote
In the era of computers and the Internet, where almost everything is interconnected, authentication plays a crucial role in safeguarding online and offline data. As authentication systems face continuous testing from advanced attacking techniques and tools, the need for evolving authentication technology becomes imperative. In this thesis, we study attacks on authentication systems and propose countermeasures. Considering various nominated techniques, the thesis is divided into two parts.
The first part introduces caller ID verification (CIV) protocol to address caller ID spoofing in telecommunication systems. This kind of attack usually follows fraud, which not only inflicts financial losses on victims but also reduces public trust in the telephone system. We propose CIV to authenticate the caller ID based on a challenge-response process. We show that spoofing can be leveraged, in conjunction with dual tone multi-frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We conduct extensive experiments showing that our solution can work reliably across the legacy and new telephony systems, including landline, cellular and Internet protocol (IP) network, without the cooperation of telecom providers.
In the second part, we present polymer substrate fingerprinting (PSF) as a method to combat counterfeiting of banknotes in the financial area. Our technique is built on the observation that the opacity coating leaves uneven thickness in the polymer substrate, resulting in random translucent patterns when a polymer banknote is back-lit by a light source. With extensive experiments, we show that our method can reliably authenticate banknotes and is robust against rough daily handling of banknotes. Furthermore, we show that the extracted fingerprints are extremely scalable to identify every polymer note circulated globally. Our method ensures that even when counterfeiters have procured the same printing equipment and ink as used by a legitimate government, counterfeiting banknotes remains infeasible
Enhancing supply chain performance using RFID technology and decision support systems in the industry 4.0: a systematic literature review
Supply Chain processes are continuously marred by myriad factors including varying demands, changing routes, major disruptions, and compliance issues. Therefore, supply chains require monitoring and ongoing optimization. Data science uses real-time data to provide analytical insights, leading to automation and improved decision making. RFID is an ideal technology to source big data, particularly in supply chains, because RFID tags are consumed across supply chain process, which includes scanning raw materials, completing products, transporting goods, and storing products, with accuracy and speed. This study carries out a systematic literature review of research articles published during the timeline (2000-2021) that discuss the role of RFID technology in developing decision support systems that optimize supply chains in light of Industry 4.0. Furthermore, the study offers recommendations on operational efficiency of supply chains while reducing the costs of implementing the RFID technology. The core contribution of this paper is its analysis and evaluation of various RFID implementation methods in supply chains with the aim of saving time effectively and achieving cost efficiencies
Recommended from our members
IN BLOCKCHAIN WE TRUST? The examination of an anti-counterfeiting solution
Product Counterfeiting is deemed a major and pertinent threat to the global luxury sector. The entanglement of luxury and counterfeiting has evolved into a complex problem for the modern milieu. This aim of exploring this topic as social phenomena seeks to expose the shadow economy of counterfeiting, unpack issues of intellectual property and the threat posed through the integration and adoption of blockchain technology as an anticounterfeiting solution and high trust system of exchange.
Luxury counterfeited brands offers a perspective which considers the complexities surrounding fashion consumption, the globalisation of brands, brand culture, and the connotations of luxury today, including its place in the criminological sphere. Academics call for studies pertaining to the under explored area of counterfeited luxury goods owing to a rise in the grey and copycat markets further catalysed by recent market demand for second-hand luxury goods (Wall and Large, 2010; Wang et al., 2020). The consumption of such goods not only pilfers innovation and affects industry but is entwined with a mirrored underworld of counterfeit production and consumption which has given rise to more sinister activities with linkages to organized crime, modern slavery, and terrorist activities.
Against this backdrop, this research will seek to achieve the following research aims:
A. Examine product counterfeiting of luxury goods as a social phenomenon
a. Critically examine the socio-economic, historical, and cultural implications of counterfeiting.
b. How are issues of copyright and trademark infringement impacting counterfeiters?
B. Examine Blockchain as an anti-counterfeiting solution and its enhancement of supply chain management.
a. Can Blockchain-based supply chains enable transparency and product traceability?
i. Can the integration of a blockchain solve issues of provenance?
ii. What is the value of blockchain-enabled services?
iii. Identify threats to adoption and regulation of blockchain technologies in the UK.
b. Can Blockchain enable a high-trust ecosystem?
i. Does block-tech ensure accountability and create trust?
ii. Examine the proposition that non-fungible tokens can create unprecedented models of ownership allowing for product circularity.
The study seeks to unveil the shadow industry of counterfeiting’s impact and to assess blockchain technologies merit as an anti-counterfeiting solution via an examination of issues existing in luxury goods supply chains. Thomas’ (2019) description of fractured supply chains and the utilisation of sub-contracting via offshore producers are central to establishing a case for enterprise blockchain-based solutions to combat counterfeiting and to create transparent supply chains. To achieve the above-mentioned aims, this literature review will highlight the impact of product counterfeiting through the provision of an ontological examination of counterfeiting with a particular focus on luxury goods. The penultimate section offers a sociological examination of the luxury goods industry, anticounterfeiting measures and addresses inherent issues overlooked in studies regarding counterfeiting of luxury and their interrelationship. The final section of the literary review will provide a theoretical examination of blockchain technology (block-tech) within an epistemological framework to assess block-tech capability to enhance supply chains to foster transparent and traceable chains, and, in doing so ameliorate the effects and risks of counterfeiting within the global luxury goods industry.
As this research is exploratory in nature, it will undertake a qualitative methodological approach, investigated through elite interviews and ethnographic data collection. The study will address this surge in the demand for counterfeit luxury goods and its accumulation into a trillion-dollar generating industry, as a social and criminological phenomenon. The researcher will examine issues pertaining to, and solutions of traceability, authentication, and supply chain provenance. In fulfilling the research objectives, it is imperative to identify current anti-counterfeiting strategies’ effectiveness through a critical and comparative examination, with a focus on the distributed ledger technology (DLT) known as Blockchain. Henceforth, blockchain will be referenced throughout as ‘block-tech’ and otherwise ‘the technology’ or ‘blockchain technology’, or on its own ‘blockchain’. Initial findings reveal the emergence of conscious consumers, a rise in re-commerce of luxury goods and a shift toward circularity within a microcosm of the industry