Abstract
An EPC (Electronic Product Code) contains sensitive information such as the product code, company code, or serial number and thus protecting the contents of EPCs is necessary to avoid counterfeits. Although many protecting schemes have been proposed, no scheme can limit the number of illegal attempts for revealing EPCs or notice whether an attacker exists. In this paper, we propose an illegal interrogation detection scheme with an EPCIS (EPC Information Service) server. The idea is to make an attacker access an EPCIS server and detect him/her. Our scheme divides an EPC into two parts with XOR operation. The first part is written into genuine tags on products while the other part is placed on an EPCIS server with an access code. An access code is divided into shares with a secret sharing scheme and they are written into genuine tags. We also write bogus shares into extra off-the-shelf tags that are not attached to any products. Since an attacker who wants to know genuine EPCs may obtain a large number of access code candidates and must try each on the EPCIS server, the server can detect and limit such illegal attempts.
Original language | English |
---|---|
Title of host publication | 2015 IEEE International Conference on RFID Technology and Applications, RFID-TA 2015 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 159-164 |
Number of pages | 6 |
ISBN (Print) | 9781479979899 |
DOIs | |
Publication status | Published - 2016 Jan 12 |
Event | IEEE International Conference on RFID Technology and Applications, RFID-TA 2015 - Tokyo, Japan Duration: 2015 Sept 16 → 2015 Sept 18 |
Other
Other | IEEE International Conference on RFID Technology and Applications, RFID-TA 2015 |
---|---|
Country/Territory | Japan |
City | Tokyo |
Period | 15/9/16 → 15/9/18 |
ASJC Scopus subject areas
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Instrumentation