An Improved Watermarking-Based Algorithm of Tamper Detection for Low-Cost EPC C1G2 RFID Tags

Article Preview

Abstract:

Data tampering as one of the primary security issues in RFID-enabled applications has been presented in recent years and proposals based on watermarking have been put forward to address different aspects of tampering in RFID tags. However, most of current researches are focused on the way of generating the watermark from the data to be protected and embedding it into the tag field (usually the field of serial number or SN) used as the cover medium, thus the innate structural coding relationship as a new clue to guess out the hidden watermark might be ignored. In this paper, this flaw has been fully considered, and a novel tamper detection method using CFB based encryption to hide the location clues is presented. Although it cant resist the attack from statistical analysis either, theoretical analysis has demonstrated that our scheme outperforms its previous counterparts in data security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1005-1008

Citation:

Online since:

February 2014

Export:

Price:

* - Corresponding Author

[1] A. Yamamoto, S. Suzuki, H. Hada, J. Mitsugi, F. Teraoka, and O. Nakamura. A Tamper Detection Method for RFID Tag Data[C], IEEE International Conference on RFID, 2008, 51-57.

DOI: 10.1109/rfid.2008.4519365

Google Scholar

[2] V. Potdar, C. Wu, and E. Chang. Tamper detection for ubiquitous RFID-enabled supply chain [C]. In: Computational intelligence and security(CIS 2005). LNCS, Berlin: Springer, 2005. 273–278.

DOI: 10.1007/11596981_40

Google Scholar

[3] Hitachi Ltd., Report of Rationalization of energy use in fiscal 2006-Project of RFID tag system Development Survey, (2007).

Google Scholar

[4] ISO/IEC. ISO/IEC 18000-6 Part 6: Parameters for air interface communications at 860 MHz to 960 MHz AMENDMENT 1: Extension with Type C and update of Types A and B, (2006).

Google Scholar

[5] S. Suzuki, and M. Harrison. Data Synchronization Specification[J], Auto-ID Labs AEROID-CAM-007, (2006).

Google Scholar

[6] EPCglobal Inc. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz -960 MHz Version 1. 4, (2008).

Google Scholar

[7] V. Potdar, and E. Chang. Tamper detection in RFID tags using fragile watermarking[C], 10th IEEE International Conference on Industrial Technology (ICIT2006), Mumbai, INDIA, Dec. 15–17, (2006).

DOI: 10.1109/icit.2006.372722

Google Scholar

[8] S. Han, C. Chu, and Z. Luo. Tamper Detection in the EPC Network Using Digital Watermarking[J] , IEEE Security & Privacy, 2011, 62-69.

DOI: 10.1109/msp.2011.71

Google Scholar

[9] M. Fan, and H. Wang. Tamper Discrimination in RFID Tags Using Chaotic Fragile watermark[C]. Proc. Int. Conf. on Networks Security, Wireless Communications and Trusted Computing, 2009, 147–150.

DOI: 10.1109/nswctc.2009.91

Google Scholar

[10] A. Noman, K. Curran, and T. Lunney. A Watermarking based Tamper Detection Solution for RFID Tags[C], Proc. Sixth Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, Oct. 15-17 2010, 98-101.

DOI: 10.1109/iihmsp.2010.32

Google Scholar

[11] K. Curran, T. Lunney, A. N. M. Noman. TAMPER DETECTION FOR LOW COST RFID TAGS: USING WATERMARKING WITH CHAOTIC MAPPING[J], International Journal of Engineering and Technology Volume 1 No. 1, October, 2011. 27-32.

DOI: 10.1109/iihmsp.2010.32

Google Scholar