RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity

Ali Dada, Carsten Magerkurth

Abstract

This paper discusses a novel RFID-based approach to determine probabilities of items in a supply chain as being counterfeits based on their proximity to already identified counterfeits. The central idea is that items moving close to fakes are more likely to be fakes than items traveling with genuine items. The required proximity information can be deduced from events in EPCIS repositories for RFID-tagged items. The paper discusses two mathematical algorithms for calculating the probabilities and presents the results of a comparative simulation study. The results are discussed in terms of conclusions for a future implementation with RFID-tracked supply chains.

References

  1. http://www.iacc.org/media/statistics.php
  2. T. Van Le, M. Burmester, M., B. de Medeiros: Universally composable and forward-secure RFID authentication and authenticated key exchange. In Proceedings of the 2nd ACM Symposium on information, Computer and Communications Security (Singapore, March 20 - 22, 2007).
  3. J. Dittmann, L. Croce Ferri, C. Vielhauer: Hologram Watermarks for Document Authentications, International Conference on Information Technology: Coding and Computing (ITCC 7801), 2001
  4. D.L. Brock. The electronic product code (EPC): A naming scheme for objects. Technical Report MIT-AUTOID-WH-002, MIT Auto ID Center, 2001. Available from http://www.autoidcenter.org.
  5. G. Schnurer. Schreiblähmung : Gefälschte SD-Karten auf dem Markt. c't 6/07, page 62
  6. F. Lin, S. Huang, S. Lin: Effects of information sharing on supply chain performance in electronic commerce", IEEE Transactions on Engineering Management, Vol. 49 No.3, pp.258-68, 2002
  7. G. Xingxin, A. Xiang, H. Wang, J. Shen, J. Huang, S. Song: An Approach to Security and Privacy of RFID System for Supply Chain," cec-east, pp. 164-168, IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04), 2004
  8. T. Staake, F. Thiesse, E. Fleisch: Extending the EPC Network - The Potential of RFID in Anti-Counterfeiting. In Proceedings of the 2005 ACM symposium on Applied computing. 2005.
  9. M. Lehtonen, F. Michahelles, E. Fleisch: Probabilistic Approach for Location-Based Authentication. In The First International Workshop on Security for Spontaneous Interaction, UbiComp. 2007
Download


Paper Citation


in Harvard Style

Dada A. and Magerkurth C. (2008). RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity . In Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2008) ISBN 978-989-8111-46-3, pages 101-114. DOI: 10.5220/0001742601010114


in Bibtex Style

@conference{iwrt08,
author={Ali Dada and Carsten Magerkurth},
title={RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity},
booktitle={Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2008)},
year={2008},
pages={101-114},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001742601010114},
isbn={978-989-8111-46-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges - Volume 1: IWRT, (ICEIS 2008)
TI - RFID based Anti-Counterfeiting Utilizing Supply Chain Proximity
SN - 978-989-8111-46-3
AU - Dada A.
AU - Magerkurth C.
PY - 2008
SP - 101
EP - 114
DO - 10.5220/0001742601010114