ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Product Authentication Service of Consumer's mobile RFID Device
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Ju Han Kim, Doo Ho Choi, In Seop Kim, Ho Won Kim
Issue Date
2006-06
Citation
International Symposium on Consumer Electronics (ISCE) 2006, pp.660-665
Publisher
IEEE
Language
English
Type
Conference Paper
Abstract
We propose a product authentication service which is anti-counterfeiting technology and can be applied to both the supply chain (SCM) and forthcoming mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication service to consumers with mobile RFID devices like mobile phone which has a RFID reader. We also propose an authentication mechanism between a tag and an information server through the device. The mechanism is designed to be appropriated for EPC Class-1 Generation-2 UHF tags. The tags, one of RFID tag types, is expected that most companies are planning to use it in the SCM in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It causes security vulnerabilities, in particular cloning the tags for counterfeits. The mechanism provides secure mutual authentication between a tag and a server. It can be applied to the mobile RFID environment that any mobile RFID reader can be placed in the interface between the tag and the server. It means that the mechanism provides secure communication between them even the reader is not trusted. On basis of this tag authentication, the service makes use of location information especially from LBS(Location Based Service) of the consumers' devices. Thanks to it, the service can make fine-grained decision about authentication of a product. At the same time the server utilize the information to extend its management area where legacy SCM could not reach thanks to consumers' mobile RFID devices. 1 © 2006 IEEE.
KSP Keywords
Fine grained(FG), Location information, Location-Based Services, Product authentication, RFID TAG, RFID reader, Secure Communication, Security algorithms, Security vulnerabilities, anti-counterfeiting, mobile RFID