Anti-counterfeiting ISO 15693 RFID Solutions
Transcription
Anti-counterfeiting ISO 15693 RFID Solutions
11th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS, Suceava, Romania, May 17-19, 2012 Anti-counterfeiting ISO 15693 RFID Solutions Involving Authentication and Traceability Using Symmetric and Asymmetric Cryptography Marius CERLINCĂ, Cristina TURCU, Tudor CERLINCĂ, Remus PRODAN, Valentin POPA Stefan cel Mare University of Suceava, 720229, Romania [email protected] Abstract — When dealing with subjects as anticounterfeiting of goods using authentication and traceability it seems that RFID technology has all the advantages over traditional barcode technology. While in shops and supermarkets it seems that the barcode technology is still a winner and hard to replace due to it’s current spread and low cost advantages, the RFID solutions seems to be more adequate for supply-chain management specific issues. Current RFID solutions for supply-chain management are using the new EPC Gen2 RFID standard that uses UHF and is not available to ISO15693 or any other RFID standard. In this paper we will describe how an anti-counterfeiting solution can be implemented using the ISO15693 standard and symmetric/asymmetric cryptography. Index Terms — RFID, anti-counterfeiting, authentication, traceability, cryptography. I. INTRODUCTION “Current batch recall practice is expensive and difficult, since many supply chain partners need to combine the data from their ERP systems. Radio Frequency Identification (RFID) can be used to efficiently implement batch recalls, e.g. by storing batch numbers from the parts/ingredients used in all manufacturing steps. But this raises concerns on industrial privacy, since competitors could use this information to gain insight into the whole supply chain.“ [1] The anti-counterfeiting solution we will describe was a result of our attempt to meet the specifications of a research project called ATPROD. Ensuring the authenticity and determining the route followed by a product can be done by implementing a production management system using RFID technology and extending its use to the place of trading. There are currently many flow management systems in manufacturing and transport of goods, but the chain is not complete because usually the points of sale and service are missing from the logical chain and from the databases attached. This paper presents a reliable and low cost anticounterfeiting solution based on RFID technology both for goods authentication and traceability while ensuring a database for distribution control (Fig. 1). Moreover, to eliminate doubts regarding the transport or storage of products in poor conditions, the system is providing solutions for monitoring ambient parameters like temperature, information obtained throughout the transport or storage of goods, and storing them in memory of active RFID tags. Adequate traceability of product information will be read and write at each distribution point or retail store. Thus, the final consumer will get a product with an RFID tag attached that contains all essential information regarding the product as well as all traceability information including the final retail store and service points. Customers can check all this information using a portable RFID reader or a smartphone. The system allows clients to register as the owner of the labeled products. Thus, a product can be authenticated by three means quickly accessible to every user: authentication at the level of product label (using a hologram or other traditional authentication elements); authentication at the level of electronic RFID chip accompanying the product, which contains information on traceability and source of the product; authentication using the web site the system provides, based on unique product ID code, in order to compare the information from the producer database with the one inside the electronic RFID chip. Fig. 1. General architecture of a supply chain This way the system ensures maximum safety, drastic reduction of opportunities for products piracying, increasing the client safety regarding the origins of purchased goods and providing a modern management and tracking system of goods. II. BIDIRECTIONAL INFORMATION FLOW SCENARIO Bidirectional information flow between manufacturer, distributor and retailers is (shown in Fig. 2) contains the following steps to ensure traceability: 1. Product labeling at the manufacturer level and writing the RFID label with initial data. Introducing products in RFID labeled packages, writing the initial data related to current package. Package ID is associated with the product codes in the package. The updating of producer’s database will be made using the package unique ID until the retail sale of products inside. The product information is stored in 175 11th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS, Suceava, Romania, May 17-19, 2012 the transponder memory and also in the goods database of the manufacturer. 2. Upon delivery from the manufacturer’s warehouse of finished products, current date and warehouse’s ID will be written into RFID tag memory. Information is transmitted via the Internet to the manufacturer’s database server. 3. When entering the warehouse, information from package’s label will be read and will be sent to the manufacturer’s server. Data about entering current warehouse will be written into the RFID tags of the package and products inside it. When exiting from the warehouse, information regarding the package will be read from attached tag and will be sent to the manufacturer database server. Information about exiting the current warehouse will be written into package and products RFID tags. 4. If there are more distributors in the chain, all steps presented previously will be repeated for each storehouse. 5. When entering the retailer’s warehouse information from the package’s RFID tag will be read and sent to the manufacturer’s database server. Data about entering the retailer’s warehouse will be written in package and products tags. Products will be unpacked and the package label will be destroyed and the database server of the manufacturer will be informed. 6. When selling the products authentication will be performed using an application that can run both on PC’s and PDA’s that have attached an RFID reader. After selling the product the database server of the manufacturer will be informed again. Trying to sell a product with the same ID or cloned RFID tag will trigger a message at the manufacturer level. Moreover, the failed authentication process will inform the manufacturer that a counterfeit product was introduced in the chain. 7. For certain products such as foods and drugs, an active temperature RFID tag can be used for packages. Data about ambient conditions will be sent also to the manufacturer’s database server. Temperature RFID tags can be reused. Fig. 2. Bidirectional information flow between manufacturer, distributor and retailers III. THE PROBLEM(S) While trying to research and develop a safe anticounterfeiting solution that involves both authentication and traceability we encountered a multitude of problems such as: low memory space available on RFID labels; authenticating the RFID tags; privacy issues while trying to keep some information public and some private; tag cloning as a threat to uniqueness; encryption and hash functions algorithms inappropriate for RFID technology (with respect to point 1 above); reading all tags within a package. 176 P1. Low memory space available on RFID labels: current affordable RFID tags have maximum memory size around 8 kbit. Taking into consideration the proposed solution (see section V) we had to minimize the amount of data written on labels. P2. Authenticating the RFID tags (see also [2] and [3]): in order to be sure that a product is genuine we had to identify a solution for authenticate the RFID tags. Using just the unique ID of the RFID tag isn’t enough due to cloning issues (see point 4). Using of current modern hash functions is not a solution due to large size of the result (see points 1 and 5). P3. Privacy issues while trying to keep some information public and some private: while traceability requires some information to be made public this will always raises concerns on industrial privacy, since 11th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS, Suceava, Romania, May 17-19, 2012 competitors could use this information to gain insight into the whole supply chain. [1] P4. Tag cloning: “Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. [4]” Our proposed solution (see section V) is taking into consideration both prevention and detection by means of asymmetric cryptography and not only. P5. Encryption and hash functions algorithms inappropriate for RFID technology (Table 1): current standard symmetric encryption algorithms are using 64 (DES) or 128 (AES) bits while current ISO 15693 block data is 32 bits; current standard asymmetric encryption algorithm (RSA) has 512 bits as minimum size of RSA key, also not acceptable from our point of view. (see [5]) ; current hash algorithms are using 128 (MD5) or at least 160 (SHA series) bits outputs. 2. 3. 4. written. When exiting the manufacturer site, some information about the date (and not only) should be written. Each time a package with products inside enters a warehouse the tag should be authenticated and some new information about entering into the facility and the current date should be written. When entering the retail store the package and all its products should be authenticated and some information should be written. The package’s RFID tag should be destroyed. Taking into consideration the process described above we proposed a tag structure like the one below (Fig. 3): TABLE I. CRYPTOGRAPHIC ALGORITHMS FACTS Algorithm Min. key size Output Type (bits) (bits) DES 64 (56) 64 Symmetric AES 128 128 Symmetric RSA (.NET) 512 512 Asymmetric MD5 128 Hash function SHA-1 160 Hash function SHA-2 224 Hash function P6. Reading all tags within a package: due to current technological limitations of RFID technology there are some problems in being sure whether or not all tags inside a cardboard package were read. We proposed a simple solution that should solve the problem (see section V). IV. OTHER SOLUTIONS One solution that already uses advanced encryption algorithms is RFID tags that are using EPC Gen2 protocol [6]. Due to high costs of such an implementation and the RFID protocol imposed (ISO 15693), EPC Gen 2 UHF cannot be used a solution for problems listed on section IV. Some authors proposed some alternative solutions that may be used in RFID cryptography. One very good solution seems to be described by Leonardo Weiss Ferreira Chaves and Florian Kerschbaum in “Industrial Privacy in RFIDbased Batch Recalls”[1], but there is not much about authentication and/or traceability in their solution, but much about the encryption itself. Another solution that is based on Florian Hess algorithm is described in “Implementation of ID-Based Signature in RFID System” [7] but their solution is inappropriate for our problems due to large number of bits needed to be written on the RFID tags each time: about 170 bits long. V. OUR SOLUTION Before presenting the solution we propose, let’s take a look at the RFID tag writing and reading process: 1. First, when the logical tag is created at manufacturer level, some authentication information should be Fig. 3. Simplified view of RFID tag structure Our practical solutions that are covering all problems described in section III involves: S1. Use of a simplified digital signature computed from unique ID of RFID tag and unique ID of the manufacturer (4/8 bits) described also in [2] and [3]. This will cover the authentication issue (P2), low 177 11th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS, Suceava, Romania, May 17-19, 2012 memory issue (P1), 4 byte writing/reading issue(P5) and tag cloning issues (P4); S2. All information related to manufacturer and warehouses will be encrypted only using a symmetric encryption algorithm like SKIP32 or Blowfish-32. This way at least some concerns related to industrial privacy should be covered (P3) and also low space and ISO 15693 reading/writing issue (P5); S3. All information related to current / entering / exiting date and time will be encrypted using RSA 32 asymmetric encryption algorithm. We had to develop so called RSA 32 in order to cover the reading/writing issue (P5). The key management algorithm for the symmetric and asymmetric algorithms is like follows: all public keys of warehouses and final retail store will be known by the manufacturer; each warehouse will know only the public key of the next warehouse in the chain; each manufacturer / warehouse / retail store will keep secret his private symmetric key and his private asymmetric key. Using the encryption algorithms and keys as described above will solve the problems related to privacy issues (P3) and tag cloning issues (P4). S4. In order to solve the RFID reading issue (P6) we are proposing the use of a simple linked circular list (see Fig. 4) that involves additional data to be written on RFID tag’s memory (no more than 1 byte). If the RFID reader does not read all tags at first, then the package that contains the product should be rotated / moved until all tags had be read and the logical circular list has been completed. somebody wants to insert a fake package / product in the chain. There are only two possibilities to do it: at warehouses level: this will be detected immediately when exiting the warehouse’s gates because all information here are sent to the manufacturer database; at transportation level: this will be detected immediately as a package / product enters next warehouse / retail store; moreover, the detection will take place at the manufacturer’s database level also. Our solution is covering the most important issues related to RFID technology when dealing with industrial chains (see section III): low memory space available on RFID labels: covered by using 32 bit digital signature mechanism and encryption algorithms: RSA 32 for asymmetric encryption and SKIP32 / Blowfish-32 for symmetric encryption; authenticating the RFID tags: use of the simplified digital signature; privacy issues: use of symmetric encryption when desired; tag cloning: see anti-counterfeiting coverage; encryption and hash functions algorithms inappropriate for RFID technology and reading all tags within a package issues: use of 32 bit authentication / encryption algorithms. ACKNOWLEDGMENTS This work was supported in part by the Romanian Ministry of Education and Research under Grant named “ATPROD – Integrated System for Authenticity Control and Verification of Products” 12-082/ 01.10.2008. REFERENCES [1] [2] [3] Fig. 4. Simple linked circular list using RFID tags. [4] [5] VI. CONCLUSIONS As a result of our researches we are proposing some simple and practical solutions for the issues related to authentication, anti-counterfeiting and traceability issues when dealing with an industrial / commercial chain. Authentication is covered using a simplified digital signature (S1). Traceability is provided by the manufacturer database and the entering / exiting tag writing system. Anti-counterfeiting is covered both by authentication and traceability means and not only. Let’s suppose that [6] [7] 178 Industrial Privacy in RFID-based Batch Recalls, Leonardo Weiss Ferreira Chaves, SAP Research, Karlsruhe, Germany, [email protected], Florian Kerschbaum, SAP Research, Karlsruhe, Germany, [email protected]. HL7 Messaging Engine with Customizable Translation System, Advances in Electrical and Computer Engineering, Volume 10, Issue 2, Year 2010, On page(s): 98 - 101, ISSN: 1582-7445, e-ISSN: 18447600 Marius CERLINCA, Cristina TURCU, Tudor CERLINCA, Remus PRODAN. The Real Potential of an RFID_B2B Integrated Application, Development and Application Systems, 22-24 May, 2008, SUCEAVA, Romania, Pages: 253-260, Marius CERLINCA, Cornel TURCU, Tudor CERLINCA, Remus PRODAN, Felicia GIZA, Alexandru GOLOCA. Securing RFID systems by detecting tag cloning, Mikko Lehtonen, Daniel Ostojic, Alexander Ilic and Florian Michahelles. Current State of Cryptography and Design of an Online Storage System, December 14, 2009, Master’s Thesis in Computing Science, Tommy Jonsson The security of EPC Gen2 compliant RFID protocols, Mike Burmester (Department of Computer Science, Florida State University, Tallahassee) and Breno de Medeiros (Information Security Consultant, Santa Clara) Implementation of ID-Based Signature in RFID System, Piseth Ith, Yoshihito Oyama, Atsuo Inomata and Eiji Okamoto