Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu
Dec 18, 2015
Anti-counterfeiting via Federated RFID Tags’ Diversities
Lei YangTsinghua University
Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu
Fingerprinting genuineness04.
Outline
Overview02.Fingerprinting tags03.
Discussion06.Validating genuineness05.
Motivation01.
Implementation and evaluation07.
Conclusion08.
Motivation
WHO : 7~10% of the world’s pharmaceuticals are counterfeits in developed countries, 25%~50% in developing countries.
Online counterfeit sales cost about $135 billions in 2011.
Hong Kong Customs seized 55,000 fake drugs, worth around 5Millions HK$ each year.
China loses about 600 billion per year due to fake goods.
5% of world trade!
“5F8KJ3”
“949837428”
“74AB8”
Serial number based anti-counterfeiting
State-of-art
Eavesdropping
Cloning
Replaying
RFID enabled anti-counterfeiting
State-of-art
Tag
(3)
(1 ) 𝑟
(2 )h(𝑟 ,𝑘)
𝑘1 ,𝑘2 ,⋯ ,𝑘𝑁
Side-channel
Reverse engineering
Encryption based anti-counterfeiting
Cloning
RFID enabled anti-counterfeiting
RFID diversity
Double distance
❶𝑩𝒂𝒕𝒕𝒆𝒓𝒚 𝒇𝒓𝒆𝒆
Continuous wave
Phase fingerprint Antenna size, impedance matching, clock skew, gain, …..
• Validation is totally offline.
• The validation must be user-friendly.
• The price is cheap enough.
• Defending against various attacks, reverse engineering, eavesdropping, cloning, etc.
Goal
Overview
Product Manufacture
The product manufacturer utilizes the technique of RFID to protect their products from being counterfeited.
Overview
Consumer
The consumer, as a purchaser of product, desires to know whether the product is genuine.
Threat Model
The Counterfeiter can
• eavesdrop any wireless communications between the reader and tags.
• read and write any tags’ memory.• clone a tag’s memory to another one (cloned tag).• find a tag with the phase fingerprint as same as the
genuine one’s at a price.
Threat Model
• not recycle the tags from products and re-attach them on the forged product.
• His purpose is to pursue huge profits. There is no motivation for counterfeiter if the counterfeiting is unprofitable.
The Counterfeiter can not
Workflow
Consumer ❸ Validating
Genuineness
❶ Fingerprint Tags
Tag Provider
Product Manufacture
❷ Fingerprinting genuineness
Acquiring Phase Fingerprint
How to acquire the phase
fingerprint?
How to automatically, fast, reliably and accurately measure the phase fingerprint?
Randomness test
The phase fingerprint follows the uniform distribution with 0.95 significance level.
Fingerprint a product
Geometric constraint
Acquisition constraint
’s coordinate Private key
checksumchecksum
Hyperbola based Localization
If we have three tags as reference, we can build two hyperbolas and their intersection is the location of the reader.
Hyperbola based Localization
Measured phase difference
Diversity difference
In details, the measured phase difference implicitly contains the diversity difference, while we store the real diversity difference in the tag’s memory. If two values are matched, the diversity influence can be eliminated.
Hyperbola based Localization
The reader’s impact is removed by the difference
Acquisition constraint
Security analysis
The counterfeiter must purchase about tags and perform trails to find out the correct combination.
and , so the counterfeiter must purchase tags ( US$) and conduct trails at least to find the correct tags. Both the cloning cost and huge computations make it hard and unprofitable!
Cost analysis
Method Cost Security
TagPrint 50~60 cents high
Serial based 10 cents low
Encryption based 50 dollars middle
PUF based 100 dollars high
Conclusion
• We exploit a new kind of fingerprint for a pair of reader and tag from their backscatter signals.
• A large-scale experiment involving 6,000 tags is performed to demonstrate the stability and randomness of phase fingerprint.
• We jointly utilize federated tags’ fingerprints and geometric relationships for the genuineness validation.
• Our approach is a totally offline solution without any communication between consumer and product manufacturer.