This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Tamper Detection in the EPC Network Using Digital Watermarking
September/October 2011 (vol. 9 no. 5)
pp. 62-69
ShuiHua Han, Xiamen University
Chao-Hsien Chu, Pennsylvania State University
Zongwei Luo, University of Hong Kong
One of the most relevant problems in radio frequency identification (RFID) technology is the lack of security measures in its wireless communication channel between the reader and tag. This article analyzes potential data tampering threats in the electronic product code (EPC) network and proposes solutions using fragile watermarking technologies.

1. A. Jules, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas Comm., vol. 24, no. 2, 2006, pp. 381–394.
2. L. Mirowski et al., "An RFID Attacker Behavior Taxonomy," IEEE Pervasive Computing, vol. 8, no. 4, 2009, pp. 79–84.
3. C. Collberg et al., "Watermarking, Tamper-Proofing, and Obfuscation Tool for Software Protection," IEEE Trans. Software Eng., vol. 28, no. 8, 2002, pp. 735–746.
4. V. Potdar et al., "Tamper Detection in RFID Tags Using Fragile Watermarking," Proc. 10th IEEE Int'l Conf. Industrial Technology, IEEE Press, 2006, pp. 2846–2852.
5. A.N.M. Noman, K. Curran, and T. Lunney, "A Watermarking Based Tamper Detection Solution for RFID Tags," 6th Int'l Conf. Intelligent Information Hiding and Multimedia Signal Processing, IEEE CS Press, 2010, pp. 98–101.
6. S. Han and C.-H. Chu, "Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking," Proc. 2008 IEEE Int'l Conf. RFID, IEEE Press, 2008, pp. 109–115
7. F. Gandino et al., "Tampering in RFID: A Survey on Risks and Defenses," Mobile Networks and Applications, vol. 15, no. 4, 2009, pp. 1–15.
8. L. Grunwald, "RFDump Can Hack RFID Tags,"29 July 2004; www.rfidgazette.org/2004/07lukas_grunwalds.html .
9. A. Juels, R. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," Proc. 10th ACM Conf. Computer and Comm. Security, ACM Press, 2003, pp. 103–111.
10. S. Spiekermann, "Critical RFID Privacy Enhancing Technologies," IEEE Security & Privacy, vol. 7, no. 2, 2009, pp. 56–62.
11. H. Guo et al., "A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations," Information Sciences, vol. 176, no. 10, 2006, pp. 1350–1378.
12. W.Y. Chen, "Multiple-Watermarking Scheme of the European Article Number Barcode Using Similar Code Division Multiple Access Technique," Applied Mathematics and Computation, vol. 197, no. 1, 2008, pp. 243–261.
13. H. Guo et al., "Chaining Watermarks for Detecting Malicious Modifications to Streaming Data," Information Sciences, vol. 177, no. 1, 2007, pp. 281–298.
1. A.N.M. Noman, K. Curran, and T. Lunney, "A Watermarking Based Tamper Detection Solution for RFID Tags," Proc. 6th Int'l Conf. Intelligent Information Hiding and Multimedia Signal Processing, IEEE CS Press, 2010, pp. 98–101.
2. F. Gandino et al., "Tampering in RFID: A Survey on Risks and Defenses," Mobile Networks and Applications, vol. 15, no. 4, 2009, pp. 1–15.
1. V. Potdar et al., "Tamper Detection in RFID Tags Using Fragile Watermarking," Proc. 10th IEEE Int'l Conf. Industrial Technology, IEEE Press, 2006, pp. 2846–2852.
2. H. Guo et al., "A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations," Information Sciences, vol. 176, no. 10, 2006, pp. 1350–1378.
3. F. Gandino et al., "Tampering in RFID: A Survey on Risks and Defenses," Mobile Networks and Applications, vol. 15, no. 4, 2009, pp. 1–15.
4. S. Spiekermann, "Critical RFID Privacy Enhancing Technologies," IEEE Security & Privacy, vol. 7, no. 2, 2009, pp. 56–62.
5. P. Bernardi et al., "An Anti-Counterfeit Mechanism for the Application Layer in Low Cost RFID Devices," Proc. 4th European Conf. Circuits and Systems for Communications, IEEE CS Press, 2008, pp. 227–231.
6. A. Yamamoto et al., "A Tamper Detection Method for RFID Tag Data," Proc. 2008 IEEE Int'l Conf. RFID, IEEE Press, 2008, pp. 51–57.

Index Terms:
RFID, EPC, data tampering, watermarking
Citation:
ShuiHua Han, Chao-Hsien Chu, Zongwei Luo, "Tamper Detection in the EPC Network Using Digital Watermarking," IEEE Security & Privacy, vol. 9, no. 5, pp. 62-69, Sept.-Oct. 2011, doi:10.1109/MSP.2011.71
Usage of this product signifies your acceptance of the Terms of Use.