Illegal Interrogation Detectable Products Distribution Scheme in RFID-Enabled Supply Chains

被引:0
|
作者
Toyoda, Kentaroh [1 ]
Sasase, Iwao [1 ]
机构
[1] Keio Univ, Dept Informat & Comp Sci, Yokohama, Kanagawa 2238522, Japan
关键词
RFID-enabled supply chains; security; honeypot;
D O I
10.1587/transcom.2015ADP0008
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In RFID-enabled supply chains, it is necessary to protect the contents of EPCs (Electronic Product Code) since an EPC contains sensitive information such as the product code and serial number and could be used for counterfeits. Although many protection schemes have been proposed, no scheme can limit the number of illegal attempts for discovering EPCs or notice whether an attacker exists. In this paper, we propose an illegal interrogation detectable products distribution scheme for RFID-enabled supply chains. The idea is to detect the attacker by forcing him/her to access an authentication server. Our scheme masks EPCs with random sequences. Masked EPCs are written into genuine tags on products while random sequences are placed on an authentication server with an access code. An access code is divided into shares with a secret sharing scheme and they are written into genuine tags. We also write bogus shares into extra off-the-shelf tags that are not attached to any products. Since an attacker who wants to know genuine EPCs may obtain a large number of access code candidates and must try each on the authentication server, the server can detect the attacker.
引用
收藏
页码:820 / 829
页数:10
相关论文
共 50 条
  • [1] Illegal Interrogation Detectable EPC Distribution Scheme in RFID-enabled Supply Chains
    Toyoda, Kentaroh
    Sasase, Iwao
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS (RFID-TA), 2015, : 159 - 164
  • [2] Practical Key Distribution Scheme with Less Dummy Tags in RFID-enabled Supply Chains
    Sato, Tatsuaki
    Toyoda, Kentaroh
    Sasase, Iwao
    [J]. 2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2016, : 476 - 480
  • [3] Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains
    Abughazalah, Sarah
    Markantonakis, Kostantinos
    Mayes, Keith
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 871 - 878
  • [4] Identifying Discrepant Tags in RFID-enabled Supply Chains
    Gu, Caidong
    Gong, Wei
    Nayak, Amiya
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 162 - 173
  • [5] A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains
    Xie, Xin
    Liu, Xiulong
    Guo, Song
    Qi, Heng
    Li, Keqiu
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [6] Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains
    Cai, Shaoying
    Li, Tieyan
    Ma, Changshe
    Li, Yingjiu
    Deng, Robert H.
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 150 - +
  • [7] Understanding data volume problems of RFID-enabled supply chains
    Ilic, Alexander
    Groessbauer, Andrea
    Michahelles, Florian
    Fleisch, Elgar
    [J]. BUSINESS PROCESS MANAGEMENT JOURNAL, 2010, 16 (06) : 904 - 916
  • [8] Semantic access control model for RFID-enabled supply chains
    Li Z.
    Chu C.-H.
    Yao W.
    [J]. Cryptology and Information Security Series, 2010, 4 : 95 - 108
  • [9] Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
    Cai, Shaoying
    Li, Yingjiu
    Zhao, Yunlei
    [J]. INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 501 - 512
  • [10] RFID-ENABLED TRACEABILITY SYSTEM FOR PERISHABLE FOOD SUPPLY CHAINS
    Zhu, Lijing
    Lee, Chulung
    [J]. INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING-THEORY APPLICATIONS AND PRACTICE, 2018, 25 (01): : 54 - 66