Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-2xdlg Total loading time: 0 Render date: 2024-07-06T02:34:11.554Z Has data issue: false hasContentIssue false

12 - The application of RFID as anti-counterfeiting technique: issues and opportunities

Published online by Cambridge University Press:  02 November 2009

Stephen B. Miles
Affiliation:
Massachusetts Institute of Technology
Sanjay E. Sarma
Affiliation:
MIT Auto-ID Labs
John R. Williams
Affiliation:
MIT Auto-ID Labs
Get access

Summary

In industries including aerospace, pharmaceuticals, and perishables, as covered in the preceding chapters, counterfeit trade has developed into a severe problem. While established security features such as holograms, micro printings, and chemical markers do not seem to efficiently avert trade in illicit imitation products, RFID technology, with its potential to automate product authentications, may become a powerful tool to enhance brand and product protection. The following contribution aims at structuring the requirement definition for such a system by providing a non-formal attack model, and outlines several principal approaches to RFID-based solutions.

Counterfeit trade and implications for affected enterprises

Intangible assets constitute a considerable share of many companies' equity. They are often the result of extensive investments in research and development, careful brand management, and a consistent pledge to deliver high quality and exclusiveness. However, the growth of markets in Asia, where these intangible assets are difficult to protect, the trend in favor of dismantling border controls to ease the flow of international trade, and the increasing interaction of organizations in disparate locations require new measures to protect these assets and safeguard companies from unfair competition. Especially product counterfeiting, the unauthorized manufacturing of articles that mimic certain characteristics of genuine goods and may thus pass off as products of licit companies, has developed into a threat to consumers and brand owners alike.

Counterfeit trade appears to affect a wide range of industries.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

,TAXUD European Taxation and Customs Union, Breakdown of the Number of Cases Registered and the Number of Articles Seized by Product Type (European Union, 2004) (http://ec.europa.eu/taxation_customs/resources/documents/customs/customs_controls/ counterfeit_piracy/statistics/counterf_comm_2004_en.pdf).Google Scholar
,International Chamber of Commerce (ICC), Current and Emerging Intellectual Property Issues for Business – A Roadmap for Business and Policy Makers, revision 6 (ICC, Paris, 2005), p. 2 (www.insme.info/documenti/Roadmap-2005-FINAL.pdf).Google Scholar
Juels, A., “RFID Security and Privacy: A Research Survey,” IEEE Journal on Selected Areas in Communications, 24(2):381–394 (2006).CrossRefGoogle Scholar
Walters, J. P., Liang, Z., Shi, W., and Chaudhary, V., “Wireless Sensor Network Security: A Survey,” in Security in Distributed, Grid, and Pervasive Computing, ed. Xiao, Y. (CRC Press, Boca Raton, FL, 2006).Google Scholar
Bellare, M., Desai, A., Pointcheval, D., and Rogaway, P., “Relations among Notions of Security for Public-key Encryption Schemes,” in Proceedings of the 18th Annual International Cryptology Conference (CRYPTO '98), ed. H. Krawczyk, pp. 26–45 (Springer-Verlag, Berlin, 1998).Google Scholar
Juels, A., Minimalist Cryptography for Low-cost RFID Tags (RSA Laboratories, Bedford, MA, 2004) (www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/minimalist/Minimalist.pdf).Google Scholar
Wood, A. D., and Stankovic, J. A., “Denial of Service in Sensor Networks,” Computer, 35(10):54–62 (2002).CrossRefGoogle Scholar
Traub, K., Allgair, G., Barthel, H.et al., The EPCglobal Architecture Framework (EPC-global, Princeton, NJ, 2005) (www.epcglobalinc.org/standards/Final-epcglobal-arch-20050701.pdf).Google Scholar
Feldhofer, M., Dominikus, S., and Wolkerstorfer, J., “Strong Authentication for RFID Systems Using the AES Algorithm,” in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES '04), pp. 357–370 (Springer-Verlag, Berlin, 2004).Google Scholar
Daemen, J., and Rijmen, V., The Design of Rijndael: AES – The Advanced Encryption Standard (Springer-Verlag, Berlin, Berlin, 2002).CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×