Featured Research

from universities, journals, and other organizations

'Fingerprinting' RFID tags: Researchers develop anti-counterfeiting technology

Date:
November 19, 2009
Source:
University of Arkansas, Fayetteville
Summary:
Engineering researchers have developed a unique and robust method to prevent cloning of passive radio frequency identification tags. The technology, based on one or more unique physical attributes of individual tags rather than information stored on them, will prevent the production of counterfeit tags and thus greatly enhance both security and privacy for government agencies, businesses and consumers.

Engineering researchers at the University of Arkansas have developed a unique and robust method to prevent cloning of passive radio frequency identification tags. The technology, based on one or more unique physical attributes of individual tags rather than information stored on them, will prevent the production of counterfeit tags and thus greatly enhance both security and privacy for government agencies, businesses and consumers.

Related Articles


"RFID tags embedded in objects will become the standard way to identify objects and link them to the cyberworld," said Dale R. Thompson, associate professor of computer science and computer engineering. "However, it is easy to clone an RFID tag by copying the contents of its memory and applying them to a new, counterfeit tag, which can then be attached to a counterfeit product -- or person, in the case of these new e-passports. What we've developed is an electronic fingerprinting system to prevent this from happening."

Thompson and Jia Di, associate professor of computer science and computer engineering and co-principal investigator on the project, refer to the system as a fingerprint because they discovered that individual tags are unique, not because of the data or memory they contain, but because of radio-frequency and manufacturing differences.

As Thompson mentioned, RFID tags are becoming more prevalent. They have been used in a wide range of applications, including government processes, industry and manufacturing, supply-chain operations, payment and administration systems, and especially retail.

"In spite of this wide deployment, security and privacy issues have to be addressed to make it a dependable technology," Thompson said.

A passive RFID tag harvests its power from an RFID reader, which sends radio frequency signals to the tag. The tag, which consists of a microchip connected to a radio antenna, modulates the signal and communicates back to the reader. Working with an Avery Dennison M4E testcube designed for determining the best placement of RFID tags on packages, Thompson, Di and students in the Security, Network, Analysis and Privacy Lab measured tags' minimum power response at multiple frequencies.

The researchers did this using an algorithm that repeatedly sent reader-to-tag signals starting at a low power value and increasing the power until the tag responded. Radio frequencies ranged from 903 to 927 megahertz and increased by increments of 2.4 megahertz. These measurements revealed that each tag had a unique minimum power response at multiple radio frequencies. Moreover, power responses were significantly different for same-model tags.

"Repeatedly, our experiments demonstrated that the minimum power response at multiple frequencies is unique for each tag," Thompson said. "These different responses are just one of several unique physical characteristics that allowed us to create an electronic fingerprint to identify the tag with high probability and to detect counterfeit tags."

Like other electronics equipment, cost and size have driven development of RFID technology. This emphasis means that most tags have limited computational capabilities; they do not include conventional encryption algorithms and security protocols to prevent cloning and counterfeiting. The electronic fingerprinting system addresses these concerns without increasing the cost or physically modifying the tag, Thompson said. The method can be used along with other security protocols for identification and authentication because it is independent of the computational capabilities and resources of the tag.

Thompson and Di are also developing network circuits that are resistant to side-channel attacks against readers and tags.


Story Source:

The above story is based on materials provided by University of Arkansas, Fayetteville. Note: Materials may be edited for content and length.


Cite This Page:

University of Arkansas, Fayetteville. "'Fingerprinting' RFID tags: Researchers develop anti-counterfeiting technology." ScienceDaily. ScienceDaily, 19 November 2009. <www.sciencedaily.com/releases/2009/11/091118160627.htm>.
University of Arkansas, Fayetteville. (2009, November 19). 'Fingerprinting' RFID tags: Researchers develop anti-counterfeiting technology. ScienceDaily. Retrieved January 25, 2015 from www.sciencedaily.com/releases/2009/11/091118160627.htm
University of Arkansas, Fayetteville. "'Fingerprinting' RFID tags: Researchers develop anti-counterfeiting technology." ScienceDaily. www.sciencedaily.com/releases/2009/11/091118160627.htm (accessed January 25, 2015).

Share This


More From ScienceDaily



More Science & Society News

Sunday, January 25, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Florida Might Legalize Black Bear Hunting

Florida Might Legalize Black Bear Hunting

Newsy (Jan. 24, 2015) — A string of black bear attacks has Florida officials considering lifting the ban on hunting the animals to control their population. Video provided by Newsy
Powered by NewsLook.com
Disneyland Measles Outbreak Spreads To 5 States

Disneyland Measles Outbreak Spreads To 5 States

Newsy (Jan. 24, 2015) — Much of the Disneyland measles outbreak is being blamed on the anti-vaccination movement. The CDC encourages just about everyone get immunized. Video provided by Newsy
Powered by NewsLook.com
Tim Cook Made 8 Times Less Than Another Apple Exec In 2014

Tim Cook Made 8 Times Less Than Another Apple Exec In 2014

Newsy (Jan. 23, 2015) — Tim Cook&apos;s total compensation more than doubled in 2014 to $9.2 million, but his pay was still less than four other Apple executives. Video provided by Newsy
Powered by NewsLook.com
Dramatic Footage Shows Coast Guard Rescue Off Scottish Coast

Dramatic Footage Shows Coast Guard Rescue Off Scottish Coast

Reuters - News Video Online (Jan. 23, 2015) — Footage just released by the UK Coast Guard shows a dramatic helicopter rescue off the Scottish coast, where five men were plucked to safety after their fishing boat sank on Saturday. Rough Cut (no reporter narration). Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:

Strange & Offbeat Stories

 

Science & Society

Business & Industry

Education & Learning

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins