The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2011 vol.9)
pp: 62-69
ShuiHua Han , Xiamen University
Chao-Hsien Chu , Pennsylvania State University
Zongwei Luo , University of Hong Kong
One of the most relevant problems in radio frequency identification (RFID) technology is the lack of security measures in its wireless communication channel between the reader and tag. This article analyzes potential data tampering threats in the electronic product code (EPC) network and proposes solutions using fragile watermarking technologies.
RFID, EPC, data tampering, watermarking
ShuiHua Han, Chao-Hsien Chu, Zongwei Luo, "Tamper Detection in the EPC Network Using Digital Watermarking", IEEE Security & Privacy, vol.9, no. 5, pp. 62-69, September/October 2011, doi:10.1109/MSP.2011.71
1. A. Jules, "RFID Security and Privacy: A Research Survey," IEEE J. Selected Areas Comm., vol. 24, no. 2, 2006, pp. 381–394.
2. L. Mirowski et al., "An RFID Attacker Behavior Taxonomy," IEEE Pervasive Computing, vol. 8, no. 4, 2009, pp. 79–84.
3. C. Collberg et al., "Watermarking, Tamper-Proofing, and Obfuscation Tool for Software Protection," IEEE Trans. Software Eng., vol. 28, no. 8, 2002, pp. 735–746.
4. V. Potdar et al., "Tamper Detection in RFID Tags Using Fragile Watermarking," Proc. 10th IEEE Int'l Conf. Industrial Technology, IEEE Press, 2006, pp. 2846–2852.
5. A.N.M. Noman, K. Curran, and T. Lunney, "A Watermarking Based Tamper Detection Solution for RFID Tags," 6th Int'l Conf. Intelligent Information Hiding and Multimedia Signal Processing, IEEE CS Press, 2010, pp. 98–101.
6. S. Han and C.-H. Chu, "Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking," Proc. 2008 IEEE Int'l Conf. RFID, IEEE Press, 2008, pp. 109–115
7. F. Gandino et al., "Tampering in RFID: A Survey on Risks and Defenses," Mobile Networks and Applications, vol. 15, no. 4, 2009, pp. 1–15.
8. L. Grunwald, "RFDump Can Hack RFID Tags,"29 July 2004; .
9. A. Juels, R. Rivest, and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy," Proc. 10th ACM Conf. Computer and Comm. Security, ACM Press, 2003, pp. 103–111.
10. S. Spiekermann, "Critical RFID Privacy Enhancing Technologies," IEEE Security & Privacy, vol. 7, no. 2, 2009, pp. 56–62.
11. H. Guo et al., "A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations," Information Sciences, vol. 176, no. 10, 2006, pp. 1350–1378.
12. W.Y. Chen, "Multiple-Watermarking Scheme of the European Article Number Barcode Using Similar Code Division Multiple Access Technique," Applied Mathematics and Computation, vol. 197, no. 1, 2008, pp. 243–261.
13. H. Guo et al., "Chaining Watermarks for Detecting Malicious Modifications to Streaming Data," Information Sciences, vol. 177, no. 1, 2007, pp. 281–298.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool