Product Authentication Service of Consumer's mobile RFID Device

We propose a product authentication service which is anti-counterfeiting technology and can be applied to both the supply chain (SCM) and forthcoming mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication serv...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Juhan Kim, Dooho Choi, Inseop Kim, Howon Kim
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Juhan Kim
Dooho Choi
Inseop Kim
Howon Kim
description We propose a product authentication service which is anti-counterfeiting technology and can be applied to both the supply chain (SCM) and forthcoming mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication service to consumers with mobile RFID devices like mobile phone which has a RFID reader. We also propose an authentication mechanism between a tag and an information server through the device. The mechanism is designed to be appropriated for EPC Class-1 Generation-2 UHF tags. The tags, one of RFID tag types, is expected that most companies are planning to use it in the SCM in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It causes security vulnerabilities, in particular cloning the tags for counterfeits. The mechanism provides secure mutual authentication between a tag and a server. It can be applied to the mobile RFID environment that any mobile RFID reader can be placed in the interface between the tag and the server. It means that the mechanism provides secure communication between them even the reader is not trusted. On basis of this tag authentication, the service makes use of location information especially from LBS (location based service) of the consumers' devices. Thanks to it, the service can make fine-grained decision about authentication of a product. At the same time the server utilize the information to extend its management area where legacy SCM could not reach thanks to consumers' mobile RFID devices
doi_str_mv 10.1109/ISCE.2006.1689423
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_RIE</sourceid><recordid>TN_cdi_ieee_primary_1689423</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1689423</ieee_id><sourcerecordid>1689423</sourcerecordid><originalsourceid>FETCH-ieee_primary_16894233</originalsourceid><addsrcrecordid>eNp9jk8LgjAchgcVZOUHiC67dcq2OdSdIvxD3iI7dBOzn7RQF5sGffsKPHd64Xmew4vQkhKHUiK2aRbGDiPEc6gXCM7cEbKFH1DOOCfsy8bIIj73N54XXKZoZsyDEOYLV1hod9Tq1pcd3vfdHdpOlkUnVYsz0C9ZAlYVDlVr-gb02uBGXWUN-JSkEY7gFyzQpCpqA_awc7RK4nN42EgAyJ9aNoV-58Mv97_9APO_Od0</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Product Authentication Service of Consumer's mobile RFID Device</title><source>IEEE Electronic Library (IEL)</source><creator>Juhan Kim ; Dooho Choi ; Inseop Kim ; Howon Kim</creator><creatorcontrib>Juhan Kim ; Dooho Choi ; Inseop Kim ; Howon Kim</creatorcontrib><description>We propose a product authentication service which is anti-counterfeiting technology and can be applied to both the supply chain (SCM) and forthcoming mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication service to consumers with mobile RFID devices like mobile phone which has a RFID reader. We also propose an authentication mechanism between a tag and an information server through the device. The mechanism is designed to be appropriated for EPC Class-1 Generation-2 UHF tags. The tags, one of RFID tag types, is expected that most companies are planning to use it in the SCM in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It causes security vulnerabilities, in particular cloning the tags for counterfeits. The mechanism provides secure mutual authentication between a tag and a server. It can be applied to the mobile RFID environment that any mobile RFID reader can be placed in the interface between the tag and the server. It means that the mechanism provides secure communication between them even the reader is not trusted. On basis of this tag authentication, the service makes use of location information especially from LBS (location based service) of the consumers' devices. Thanks to it, the service can make fine-grained decision about authentication of a product. At the same time the server utilize the information to extend its management area where legacy SCM could not reach thanks to consumers' mobile RFID devices</description><identifier>ISSN: 0747-668X</identifier><identifier>ISBN: 9781424402168</identifier><identifier>ISBN: 1424402166</identifier><identifier>DOI: 10.1109/ISCE.2006.1689423</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Cloning ; Costs ; Counterfeiting ; Mobile communication ; Mobile handsets ; Mobile RFID. Anti-counterfeiting ; Packaging ; Radiofrequency identification ; RFID tags ; Supply chains ; Tag authentication</subject><ispartof>2006 IEEE International Symposium on Consumer Electronics, 2006, p.1-6</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1689423$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,796,4049,4050,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1689423$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Juhan Kim</creatorcontrib><creatorcontrib>Dooho Choi</creatorcontrib><creatorcontrib>Inseop Kim</creatorcontrib><creatorcontrib>Howon Kim</creatorcontrib><title>Product Authentication Service of Consumer's mobile RFID Device</title><title>2006 IEEE International Symposium on Consumer Electronics</title><addtitle>ISCE</addtitle><description>We propose a product authentication service which is anti-counterfeiting technology and can be applied to both the supply chain (SCM) and forthcoming mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication service to consumers with mobile RFID devices like mobile phone which has a RFID reader. We also propose an authentication mechanism between a tag and an information server through the device. The mechanism is designed to be appropriated for EPC Class-1 Generation-2 UHF tags. The tags, one of RFID tag types, is expected that most companies are planning to use it in the SCM in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It causes security vulnerabilities, in particular cloning the tags for counterfeits. The mechanism provides secure mutual authentication between a tag and a server. It can be applied to the mobile RFID environment that any mobile RFID reader can be placed in the interface between the tag and the server. It means that the mechanism provides secure communication between them even the reader is not trusted. On basis of this tag authentication, the service makes use of location information especially from LBS (location based service) of the consumers' devices. Thanks to it, the service can make fine-grained decision about authentication of a product. At the same time the server utilize the information to extend its management area where legacy SCM could not reach thanks to consumers' mobile RFID devices</description><subject>Authentication</subject><subject>Cloning</subject><subject>Costs</subject><subject>Counterfeiting</subject><subject>Mobile communication</subject><subject>Mobile handsets</subject><subject>Mobile RFID. Anti-counterfeiting</subject><subject>Packaging</subject><subject>Radiofrequency identification</subject><subject>RFID tags</subject><subject>Supply chains</subject><subject>Tag authentication</subject><issn>0747-668X</issn><isbn>9781424402168</isbn><isbn>1424402166</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNp9jk8LgjAchgcVZOUHiC67dcq2OdSdIvxD3iI7dBOzn7RQF5sGffsKPHd64Xmew4vQkhKHUiK2aRbGDiPEc6gXCM7cEbKFH1DOOCfsy8bIIj73N54XXKZoZsyDEOYLV1hod9Tq1pcd3vfdHdpOlkUnVYsz0C9ZAlYVDlVr-gb02uBGXWUN-JSkEY7gFyzQpCpqA_awc7RK4nN42EgAyJ9aNoV-58Mv97_9APO_Od0</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Juhan Kim</creator><creator>Dooho Choi</creator><creator>Inseop Kim</creator><creator>Howon Kim</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2006</creationdate><title>Product Authentication Service of Consumer's mobile RFID Device</title><author>Juhan Kim ; Dooho Choi ; Inseop Kim ; Howon Kim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_16894233</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Authentication</topic><topic>Cloning</topic><topic>Costs</topic><topic>Counterfeiting</topic><topic>Mobile communication</topic><topic>Mobile handsets</topic><topic>Mobile RFID. Anti-counterfeiting</topic><topic>Packaging</topic><topic>Radiofrequency identification</topic><topic>RFID tags</topic><topic>Supply chains</topic><topic>Tag authentication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Juhan Kim</creatorcontrib><creatorcontrib>Dooho Choi</creatorcontrib><creatorcontrib>Inseop Kim</creatorcontrib><creatorcontrib>Howon Kim</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Juhan Kim</au><au>Dooho Choi</au><au>Inseop Kim</au><au>Howon Kim</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Product Authentication Service of Consumer's mobile RFID Device</atitle><btitle>2006 IEEE International Symposium on Consumer Electronics</btitle><stitle>ISCE</stitle><date>2006</date><risdate>2006</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>0747-668X</issn><isbn>9781424402168</isbn><isbn>1424402166</isbn><abstract>We propose a product authentication service which is anti-counterfeiting technology and can be applied to both the supply chain (SCM) and forthcoming mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication service to consumers with mobile RFID devices like mobile phone which has a RFID reader. We also propose an authentication mechanism between a tag and an information server through the device. The mechanism is designed to be appropriated for EPC Class-1 Generation-2 UHF tags. The tags, one of RFID tag types, is expected that most companies are planning to use it in the SCM in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It causes security vulnerabilities, in particular cloning the tags for counterfeits. The mechanism provides secure mutual authentication between a tag and a server. It can be applied to the mobile RFID environment that any mobile RFID reader can be placed in the interface between the tag and the server. It means that the mechanism provides secure communication between them even the reader is not trusted. On basis of this tag authentication, the service makes use of location information especially from LBS (location based service) of the consumers' devices. Thanks to it, the service can make fine-grained decision about authentication of a product. At the same time the server utilize the information to extend its management area where legacy SCM could not reach thanks to consumers' mobile RFID devices</abstract><pub>IEEE</pub><doi>10.1109/ISCE.2006.1689423</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0747-668X
ispartof 2006 IEEE International Symposium on Consumer Electronics, 2006, p.1-6
issn 0747-668X
language eng
recordid cdi_ieee_primary_1689423
source IEEE Electronic Library (IEL)
subjects Authentication
Cloning
Costs
Counterfeiting
Mobile communication
Mobile handsets
Mobile RFID. Anti-counterfeiting
Packaging
Radiofrequency identification
RFID tags
Supply chains
Tag authentication
title Product Authentication Service of Consumer's mobile RFID Device
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T23%3A01%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Product%20Authentication%20Service%20of%20Consumer's%20mobile%20RFID%20Device&rft.btitle=2006%20IEEE%20International%20Symposium%20on%20Consumer%20Electronics&rft.au=Juhan%20Kim&rft.date=2006&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=0747-668X&rft.isbn=9781424402168&rft.isbn_list=1424402166&rft_id=info:doi/10.1109/ISCE.2006.1689423&rft_dat=%3Cieee_RIE%3E1689423%3C/ieee_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1689423&rfr_iscdi=true