CHECKER: On-site checking in RFID-based supply chains

Elkhiyaoui, Kaoutar; Blass, Erik-Oliver; Molva, Refik
WISEC 2012, 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, April 16-18, 2012, Tucson, Arizona, USA

Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for counterfeit detection in RFID-based supply chains through on-site checking. While RFID-equipped products travel through the supply chain, RFID readers can verify product genuineness by checking the validity of the product's path. CHECKER uses a polynomial-based encoding to represent paths in the supply chain. Each tag T in CHECKER stores an IND-CCA encryption of T's identifier ID and a signature of ID using the polynomial encoding of T's path as secret key. CHECKER is provably secure and privacy preserving. An adversary can neither inject fake products into the supply chain nor trace products. Moreover, RFID tags in CHECKER can be cheap read/write only tags that do not perform any computation. Per tag, only 120 Bytes storage are required.

 


DOI
Type:
Conference
City:
Tucson
Date:
2012-04-16
Department:
Digital Security
Eurecom Ref:
3660
Copyright:
© ACM, 2012. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in WISEC 2012, 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, April 16-18, 2012, Tucson, Arizona, USA http://dx.doi.org/10.1145/2185448.2185471

PERMALINK : https://www.eurecom.fr/publication/3660