Tamper Detection in RFID Tags Using Zero-Watermarks

Article Preview

Abstract:

Recently data integrity issues of applications based on radio frequency identification (RFID) have drawn great concerns worldwide and many watermarking-based schemes have been proposed. While those schemes can effectively verify if the protected tag data be modified, they also expose both the protected data and the watermark to any adversaries. In this paper, we present a zero-watermark scheme, which stores the watermark not in part of the data fields of RFID tags but in the back-end database system or that of a trusted third party without any modification of the original RFID data. The novelty of this zero-watermark scheme lies in the fact that we extend the zero-watermark technology to the RFID tags and the use of data tampering from the limited applications of copyright protection of digital works. We term this scheme ZMark-TamDetect because it is a tamper detection solution using zero-watermarks, which is so designed that it can be easily plugged into existing RFID middleware applications. This proposal is one of the first works that integrates zero-watermark and RFID technologies together and it provides a detailed theoretical foundation for the ZMark-TamDetect.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

169-172

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] A. Yamamoto, S. Suzuki, H. Hada, J. Mitsugi, F. Teraoka, and O. Nakamura. A Tamper Detection Method for RFID Tag Data[C], IEEE International Conference on RFID, 2008, 51-57.

DOI: 10.1109/rfid.2008.4519365

Google Scholar

[2] V. Potdar, C. Wu, and E. Chang. Tamper detection for ubiquitous RFID-enabled supply chain [C]. In: Computational intelligence and security(CIS 2005). LNCS, Berlin: Springer, 2005. 273–278.

DOI: 10.1007/11596981_40

Google Scholar

[3] Hitachi Ltd., Report of Rationalization of energy use in fiscal 2006-Project of RFID tag system Development Survey, (2007).

Google Scholar

[4] ISO/IEC. ISO/IEC 18000-6 Part 6: Parameters for air interface communications at 860 MHz to 960 MHz AMENDMENT 1: Extension with Type C and update of Types A and B, (2006).

Google Scholar

[5] S. Suzuki, and M. Harrison. Data Synchronization Specification[J], Auto-ID Labs AEROID-CAM-007, (2006).

Google Scholar

[6] EPCglobal Inc. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz -960 MHz Version 1. 4, (2008).

Google Scholar

[7] V. Potdar, and E. Chang. Tamper detection in RFID tags using fragile watermarking[C], 10th IEEE International Conference on Industrial Technology (ICIT2006), Mumbai, INDIA, Dec. 15–17, (2006).

DOI: 10.1109/icit.2006.372722

Google Scholar

[8] S. Han, C. Chu, and Z. Luo. Tamper Detection in the EPC Network Using Digital Watermarking[J] , IEEE Security & Privacy, 2011, 62-69.

DOI: 10.1109/msp.2011.71

Google Scholar

[9] M. Fan, and H. Wang. Tamper Discrimination in RFID Tags Using Chaotic Fragile watermark[C]. Proc. Int. Conf. on Networks Security, Wireless Communications and Trusted Computing, 2009, 147–150.

DOI: 10.1109/nswctc.2009.91

Google Scholar

[10] A. Noman, K. Curran, and T. Lunney. A Watermarking based Tamper Detection Solution for RFID Tags[C], Proc. Sixth Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, Oct. 15-17 2010, 98-101.

DOI: 10.1109/iihmsp.2010.32

Google Scholar

[11] K. Curran, T. Lunney, A. N. M. Noman. TAMPER DETECTION FOR LOW COST RFID TAGS: USING WATERMARKING WITH CHAOTIC MAPPING[J], International Journal of Engineering and Technology Volume 1 No. 1, October, 2011. 27-32.

DOI: 10.1109/iihmsp.2010.32

Google Scholar