Paper 2016/608

LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses

Hoda Maleki, Reza Rahaeimehr, and Marten van Dijk

Abstract

Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentication, current RFID monitoring schemes need to either have a persistent online connection between supply chain partners and the back-end database or have a local database on each partner site. A persistent online connection is not guaranteed and local databases on each partner site impose extra cost and security issues. We introduce a new method in which we use 2-3kb Non-Volatile Memory (NVM) in RFID tags themselves to function as a very small “encoded local database”. Our method allows us to get rid of local databases and there is no need to have any connection between supply chain partners and the back-end database except when they want to verify products. We formally define black-box software unclonability and prove our scheme to satisfy this property. To this purpose, we introduce a simple “XOR-ADD” function and prove it is hard to predict its challenge-response behavior if given only one challenge response pair. The XOR-ADD function with control logic can be implemented using at most 170 gates. This implies that our scheme is compatible with the strict power consumption constraints of cheap EPC Class 1 Gen 2 RFIDs.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
RFID based supply chainclone detectionauthenticationsoftware unclonable responses
Contact author(s)
hoda maleki @ uconn edu
History
2016-06-14: received
Short URL
https://ia.cr/2016/608
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/608,
      author = {Hoda Maleki and Reza Rahaeimehr and Marten van Dijk},
      title = {LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses},
      howpublished = {Cryptology ePrint Archive, Paper 2016/608},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/608}},
      url = {https://eprint.iacr.org/2016/608}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.