Top Banner
Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu
54

Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Dec 18, 2015

Download

Documents

Charles Gordon
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Anti-counterfeiting via Federated RFID Tags’ Diversities

Lei YangTsinghua University

Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu

Page 2: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Diversity

Page 3: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Fingerprinting genuineness04.

Outline

Overview02.Fingerprinting tags03.

Discussion06.Validating genuineness05.

Motivation01.

Implementation and evaluation07.

Conclusion08.

Page 4: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Motivation1

Page 5: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Motivation

WHO : 7~10% of the world’s pharmaceuticals are counterfeits in developed countries, 25%~50% in developing countries.

Online counterfeit sales cost about $135 billions in 2011.

Hong Kong Customs seized 55,000 fake drugs, worth around 5Millions HK$ each year.

China loses about 600 billion per year due to fake goods.

5% of world trade!

Page 6: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

State-of-art

Page 7: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

How to deal with counterfeiting using RFID technology?

Page 8: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

“5F8KJ3”

“949837428”

“74AB8”

Serial number based anti-counterfeiting

State-of-art

Eavesdropping

Cloning

Replaying

RFID enabled anti-counterfeiting

Page 9: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

State-of-art

Tag

(3)

(1 ) 𝑟

(2 )h(𝑟 ,𝑘)

𝑘1 ,𝑘2 ,⋯ ,𝑘𝑁

Side-channel

Reverse engineering

Encryption based anti-counterfeiting

Cloning

RFID enabled anti-counterfeiting

Page 10: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Our approach

Tagrint

RFID diversity based anti-counterfeiting

TagPrint

Page 11: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

How TagPrint works?2Overview the basic idea

Page 12: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

RFID Diversity

Double distance

❶𝑩𝒂𝒕𝒕𝒆𝒓𝒚 𝒇𝒓𝒆𝒆

Continuous wave

Device diversity

Page 13: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

RFID diversity

Double distance

❶𝑩𝒂𝒕𝒕𝒆𝒓𝒚 𝒇𝒓𝒆𝒆

Continuous wave

Phase fingerprint Antenna size, impedance matching, clock skew, gain, …..

Page 14: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

• Validation is totally offline.

• The validation must be user-friendly.

• The price is cheap enough.

• Defending against various attacks, reverse engineering, eavesdropping, cloning, etc.

Goal

Page 15: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

System Entities (Roles)

Tag Provider

Product Manufacture

Consumer

Page 16: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Overview

Page 17: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Overview

Tag Provider

The tag provider manufactures the RFID tags, like Alien or ImpinJ Corp.

Page 18: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Overview

Product Manufacture

The product manufacturer utilizes the technique of RFID to protect their products from being counterfeited.

Page 19: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Overview

Consumer

The consumer, as a purchaser of product, desires to know whether the product is genuine.

Page 20: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Threat Model

The Counterfeiter can

• eavesdrop any wireless communications between the reader and tags.

• read and write any tags’ memory.• clone a tag’s memory to another one (cloned tag).• find a tag with the phase fingerprint as same as the

genuine one’s at a price.

Page 21: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Threat Model

• not recycle the tags from products and re-attach them on the forged product.

• His purpose is to pursue huge profits. There is no motivation for counterfeiter if the counterfeiting is unprofitable.

The Counterfeiter can not

Page 22: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Workflow

Consumer ❸ Validating

Genuineness

❶ Fingerprint Tags

Tag Provider

Product Manufacture

❷ Fingerprinting genuineness

Page 23: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

How to fingerprint tags?3

Over the domain of tag provider

Page 24: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Acquiring Phase Fingerprint

How to acquire the phase

fingerprint?

How to automatically, fast, reliably and accurately measure the phase fingerprint?

Page 25: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Acquiring Phase Fingerprint

Conveyor-style method

Page 26: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Acquiring Phase Fingerprint

Nonlinear least square

Page 27: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Acquiring Phase Fingerprint

Page 28: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Acquiring Phase Fingerprint

Page 29: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Randomness test

The phase fingerprint follows the uniform distribution with 0.95 significance level.

Page 30: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Randomness test

The reader takes impact on the phase fingerprint.

Page 31: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

How to fingerprint genuineness?4

Over the domain of product manufacture

Page 32: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Challenges

Joint influence

Limited resolution Not User-friendly

Page 33: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Fingerprint a product

Geometric constraint

Acquisition constraint

’s coordinate Private key

checksumchecksum

Page 34: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

How to validate genuineness?5

Over the domain of consumers

Page 35: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Hyperbola based Localization

𝜟𝒅𝒊 , 𝒋=𝝀𝟒𝝅

𝜟~𝜽 𝒊 , 𝒋

Geometric constraint

Page 36: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Hyperbola based Localization

If we have three tags as reference, we can build two hyperbolas and their intersection is the location of the reader.

Page 37: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Unfortunately The measured phase difference contains the impact from the diversity!

Page 38: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Hyperbola based Localization

Measured phase difference

Diversity difference

In details, the measured phase difference implicitly contains the diversity difference, while we store the real diversity difference in the tag’s memory. If two values are matched, the diversity influence can be eliminated.

Page 39: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Hyperbola based Localization

The reader’s impact is removed by the difference

Acquisition constraint

Page 40: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Validation Procedure

Page 41: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Discussion6

Page 42: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

How about the security?

Page 43: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Security analysis

The counterfeiter must purchase about tags and perform trails to find out the correct combination.

and , so the counterfeiter must purchase tags ( US$) and conduct trails at least to find the correct tags. Both the cloning cost and huge computations make it hard and unprofitable!

Page 44: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

How about the cost?

Page 45: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Cost analysis

Method Cost Security

TagPrint 50~60 cents high

Serial based 10 cents low

Encryption based 50 dollars middle

PUF based 100 dollars high

Page 46: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Implementation & Evaluation7

Page 47: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Evaluation

Page 48: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Classification rate

Page 49: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Evaluation

Validation result

0.09%0.12%

Page 50: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Impact of frequency

Page 51: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Impact of distance

Page 52: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Impact of antenna

Page 53: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Conclusion

• We exploit a new kind of fingerprint for a pair of reader and tag from their backscatter signals.

• A large-scale experiment involving 6,000 tags is performed to demonstrate the stability and randomness of phase fingerprint.

• We jointly utilize federated tags’ fingerprints and geometric relationships for the genuineness validation.

• Our approach is a totally offline solution without any communication between consumer and product manufacturer.

Page 54: Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.

Questions?

hank you T