Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

Research Article

Securing a Web-Based Anti-counterfeit RFID System

Download
535 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-04283-1_21,
        author={Belal Chowdhury and Morshed Chowdhury and Jemal Abawajy},
        title={Securing a Web-Based Anti-counterfeit RFID System},
        proceedings={Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2014},
        month={6},
        keywords={Asymmetric Cryptography ECC RFID WARS and Counterfeit},
        doi={10.1007/978-3-319-04283-1_21}
    }
    
  • Belal Chowdhury
    Morshed Chowdhury
    Jemal Abawajy
    Year: 2014
    Securing a Web-Based Anti-counterfeit RFID System
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-04283-1_21
Belal Chowdhury1,*, Morshed Chowdhury2,*, Jemal Abawajy2,*
  • 1: Melbourne Institute of Technology
  • 2: Deakin University
*Contact email: bchowdhury@mit.edu.au, muc@deakin.edu.au, Jemal@deakin.edu.au

Abstract

The use of RFID (Radio Frequency Identification) technology can be employed for automating and streamlining safe and accurate brand identification (ID) uniquely in real-time to protect consumers from counterfeited products. By placing brand tags (RFID tags) on brands at the point of manufacture, vendors and retailers can trace products throughout the supply chain. We outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. Despite these potential benefits, security, and privacy issues are the key factors in the deployment of a web-based RFID-enabled system in anti-counterfeiting schemes. This paper proposes an asymmetric cryptosystem to secure RFID transmission in retail supply chain using Elliptic Curve Cryptographic (ECC) techniques. The uses of ECC techniques provide greater strength than other current cryptosystems (such as RSA, and DSA) for any given key length, enables the use of smaller key size, resulting in significantly lower memory requirements, and faster computations, thus, making it suitable for wireless and mobile applications, including handheld devices.