Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva
2012 Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks - WISEC '12  
Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for counterfeit detection in RFID-based supply chains through on-site checking. While RFID-equipped products travel through the supply chain, RFID readers can verify product genuineness by checking the validity of the product's path. CHECKER uses a polynomialbased encoding to represent paths in the supply
more » ... hain. Each tag T in CHECKER stores an IND-CCA encryption of T 's identifier ID and a signature of ID using the polynomial encoding of T 's path as secret key. CHECKER is provably secure and privacy preserving. An adversary can neither inject fake products into the supply chain nor trace products. Moreover, RFID tags in CHECKER can be cheap read/write only tags that do not perform any computation. Per tag, only 120 Bytes storage are required.
doi:10.1145/2185448.2185471 dblp:conf/wisec/ElkhiyaouiBM12 fatcat:zpr6tc2evrfonlvmbeqptxxd3q