Illegal interrogation detectable EPC distribution scheme in RFID-enabled supply chains

Kentaro Toyoda, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

An EPC (Electronic Product Code) contains sensitive information such as the product code, company code, or serial number and thus protecting the contents of EPCs is necessary to avoid counterfeits. Although many protecting schemes have been proposed, no scheme can limit the number of illegal attempts for revealing EPCs or notice whether an attacker exists. In this paper, we propose an illegal interrogation detection scheme with an EPCIS (EPC Information Service) server. The idea is to make an attacker access an EPCIS server and detect him/her. Our scheme divides an EPC into two parts with XOR operation. The first part is written into genuine tags on products while the other part is placed on an EPCIS server with an access code. An access code is divided into shares with a secret sharing scheme and they are written into genuine tags. We also write bogus shares into extra off-the-shelf tags that are not attached to any products. Since an attacker who wants to know genuine EPCs may obtain a large number of access code candidates and must try each on the EPCIS server, the server can detect and limit such illegal attempts.

Original languageEnglish
Title of host publication2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages159-164
Number of pages6
ISBN (Print)9781479979899
DOIs
Publication statusPublished - 2016 Jan 12
EventIEEE International Conference on RFID Technology and Applications, RFID-TA 2015 - Tokyo, Japan
Duration: 2015 Sep 162015 Sep 18

Other

OtherIEEE International Conference on RFID Technology and Applications, RFID-TA 2015
CountryJapan
CityTokyo
Period15/9/1615/9/18

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Instrumentation

Fingerprint Dive into the research topics of 'Illegal interrogation detectable EPC distribution scheme in RFID-enabled supply chains'. Together they form a unique fingerprint.

  • Cite this

    Toyoda, K., & Sasase, I. (2016). Illegal interrogation detectable EPC distribution scheme in RFID-enabled supply chains. In 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015 (pp. 159-164). [7379811] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/RFID-TA.2015.7379811