Telecoms, Datacoms, Wireless, IoT


NFC deployment in smartphones helps combat counterfeiting

17 April 2013 Telecoms, Datacoms, Wireless, IoT

Counterfeiting has grown tremendously over the last decade. According to government data, officials seized $188 million worth of counterfeited merchandise in the US alone in 2010.

Not only is the overall value of counterfeited goods increasing, but counterfeiting is penetrating more and more sectors. Among these, luxury goods are a target of choice, as their value heavily relies on the brand itself. Obviously, due to the cost of luxury items, the incentive for counterfeiters is high.

Counterfeiting has an impact on the brand owner, as it creates revenue loss, but even worse, it damages the image of the brand. The consumer is also a victim, especially when there is no way to check whether a luxury-branded item is genuine.

There are several anti-counterfeiting solutions. Of these, advanced printing techniques are still the most prevalent, which include holograms, unique ID numbers and tamper-proof labels.

To answer the increasing level of threats, some companies have also adopted RFID technology, where an RFID tag is attached to the item to be protected. At any moment, the tag can be checked through an appropriate reader. If the data read from the tag matches with the expected data, the item is authenticated and recognised as genuine.

Risks, drawbacks and weaknesses of a UID-based solution

Most RFID solutions deployed today are based on a unique serial number or UID. The core principle of UID-based solutions is that each tag contains a unique number. When read from the RFID tag, this number is checked by the authentication system against its records. If the number is part of the database, it is considered a valid number and the good is authenticated.

This provides a first level of protection, but the weakness of such systems is that they are sensitive to man-in-the-middle (MITM) attacks. With an off-the-shelf reader, an attacker can intercept a serial number and record it. Once the number is recorded, the attacker can easily forge a fake tag. The same serial number is programmed in a new off-the-shelf tag, and the tag is cloned for reuse.

System integrators have implemented countermeasures to mitigate these kinds of attacks. For instance, the reading infrastructure might check if a given number has already been used or if the geographic location matches the one expected.

While these countermeasures are effective, they have two drawbacks: they increase the complexity of the infrastructure, and they do not allow the end customer to check that the goods are genuine. An advanced infrastructure can be deployed in warehouses, but one can hardly imagine it installed at a final retailer.

Furthermore, it is desirable for buyers to be able to independently identify fake objects. Considering the fact that security is at least partly implemented in the infrastructure, this seems hardly achievable.

This article shows how challenge-response-based tags can allow buyers to detect counterfeited goods themselves thanks to near-field communication (NFC) technology, thus overcoming the current limitations of the UID-based tag technology.

Description of the challenge-response principle

In its simple form, the challenge-response principle, also known as challenge-response authentication, is a handshaking protocol in which one party (the NFC phone) presents a question (challenge), and another party (the NFC tag) must provide a valid answer (response) to be authenticated.

Using challenge-response to identify a friend or foe status of connecting devices has been in practice in the wired world for years. It is commonly used in printer cartridge and medical consumables, notebook computer battery packs and power adaptors.

With the NFC-based challenge-response authentication principle, anyone will be able to use an NFC-enabled cellular phone to scan luxury goods to check for authenticity. Manufacturers would only need to hide an SHA-1-based NFC tag on the luxury goods (eg, embed a tag IC in the cork of the rare wine bottle). The NFC reader will then be able to identify the item as genuine after it has been authenticated as such.

The major components of an NFC authentication scheme include the random challenge, the tag’s UID and the secret. The secret is programmed in the tag’s protected memory and is known by the cellular phone’s application software API. A strong key management is required to keep the system from being compromised.

As shown in Figure 1, when the NFC-based cellular phone comes near the vicinity of luxury goods equipped with an SHA-1-enabled tag, the following sequence of events takes place:

* A near electromagnetic field establishes between the phone and the item.

* The electromagnetic field energises and wakes up the tag.

* The handset establishes a connection with the tag via ISO 14443/15693 protocol.

* The handset reads out the tag’s UID.

* The handset’s API generates a random challenge and sends it to the tag. The tag computes an SHA-1 message authentication code (MAC) with its UID, secret and the random challenge received.

* The handset locally computes its own MAC with its locally stored secret, random challenge (the same one which was sent to the tag) and the UID read from the tag.

* The handset compares the value of its MAC against the one computed by the tag.

* If the two MACs match, the tag is authenticated. The handset might then read additional data from the tag’s memory, such as the date and place of manufacture and the lot number. This essentially means that the product is genuine. However, if the MACs do not match, the item is deemed fake, a knockoff, or counterfeit.

Figure 1 visually summarises the challenge-response authentication principle.

Figure 1. SHA-1-based challenge-response authentication principle.
Figure 1. SHA-1-based challenge-response authentication principle.

Benefits of the challenge-response

While manufacturers have been relatively successful in eliminating electronic device counterfeits (mainly because they have power and electronics circuits on board in applications where contact is made), this success has not been seen with cloned apparels, medicines/drugs, designer handbags, shoes and sunglasses, as well as with knock-off perfume and wine bottles, just to name a few.

The lack of a proper solution to the counterfeit epidemic has led to a continuously growing market for counterfeits, replicas and imitation goods, which most likely do not meet the manufacturing standard or the safety and protection provided by their genuine counterparts.

A strong crypto hash technology like SHA-1, combined with NFC technology, makes a strong anti-counterfeiting/cloning tool. It is non-reversible (as it is computationally infeasible to determine the input corresponding to a MAC), collision-resistant (since it is impractical to find more than one input message that produces a given MAC), and has a high avalanche effect (as any change in input produces significant change in MAC result).

Buying luxury goods with peace of mind can become an easy endeavour. Just a slight scan over the items and the user knows within a few seconds whether the object is genuine. Another key benefit of this technology is the elimination of counterfeit drugs and perfumes/fragrances, which can be very hazardous to public health.

These types of counterfeits have an additional negative impact on manufacturers in terms of sales revenue and a customer loyalty decline, due to imitations that do not produce the authentic products’ claimed effects.

In addition to enabling product authentication by end customers, challenge-response authentication also dramatically simplifies the RFID infrastructure for both the manufacturer and the supply chain.

This is especially a relief for the latter; because of UID RFID weaknesses, the supply chain has had to implement countermeasures in its infrastructure. This included combining the UID with a geographical location, checking that a number is not used twice, and so on.

As opposed to UID-based solutions, in challenge-response-based implementations, security is self-contained in the tag-enabling product’s authenticity verification. This is accomplished with a simple, lightweight reader that does not need to be sustained by a sophisticated infrastructure.

Maxim’s MAX66140/MAX66040 solution combines 1024 bits of user EEPROM, 128 bits of user and control registers, a 64-bit UID, one 64-bit secret, a 512-bit SHA-1 engine and a 13,56 MHz ISO 14443B/15693 RF interface. These ICs come in a variety of packaging, including key fob, inlays, ISO cards, wound coil, bare die and custom packaging.

The strength of the MAX66140/MAX66040 tag in combating counterfeiting resides in the size of the SHA-1 engine (512 bits), the cost and the SHA-1 engine’s fast computation time. Maxim also provides the means to achieve an effective key management.

The secure 1-Wire SHA-1-based products have been used in both the printer and medical consumables markets for many years. To date, over 300 million units of Maxim’s proven solutions have been sold. These devices have been designed to prevent against both physical and side-channel attacks. The MAX66140/MAX66040 come from that line of products.

Conclusion

With the ubiquity of NFC-enabled cellular phones and the boost that this has added to the NFC ecosystem, an imminent anti-cloning solution has just been created. By hiding a SHA-1-enabled tag on their products, and by making APIs and software applications available to all cellular phone users, manufacturers can get end users to help protect their brands against counterfeits.

Essentially, someone who buys a counterfeit item can be discovered quickly. The potential opportunity for embarrassment in purchasing a knock-off item may also help impede the growth of the counterfeiting market.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Wi-Fi 6/BLE module enables rapid development
Altron Arrow Telecoms, Datacoms, Wireless, IoT
Telit Cinterion has announced the WE310K6, a fully integrated, low-power module featuring dual-band, dual-stream Wi-Fi 6, and dual-mode Bluetooth/BLE.

Read more...
Low phase noise amplifier
RFiber Solutions Telecoms, Datacoms, Wireless, IoT
The MAAL-011158 from Macom is an easy-to-use low-phase noise amplifier that provides 12 dB of gain in a 32-lead QFN plastic package.

Read more...
Webinar: Enabling the digital transformation of IIoT with Bluetooth
Telecoms, Datacoms, Wireless, IoT
Key industrial use cases for Bluetooth will be reviewed, including the main performance requirements for Bluetooth in industrial applications, and the technical features available.

Read more...
Full sensor to cloud solution
CST Electronics Telecoms, Datacoms, Wireless, IoT
NeoCortec has demonstrated the seamless and rapid development of full sensor-to-cloud solutions using NeoMesh Click boards from MikroE and the IoTConnect cloud solution from Avnet.

Read more...
Long-range Wi-Fi HaLow module
TRX Electronics Telecoms, Datacoms, Wireless, IoT
One of Mouser’s newest products is the Morse Micro MM6108-MF08651-US Wi-Fi HaLow Module, which adheres to the IEEE 802.11ah standard.

Read more...
Quectel launches 3GPP NTN comms module
Quectel Wireless Solutions Telecoms, Datacoms, Wireless, IoT
Quectel Wireless Solutions has announced the Quectel BG95-S5 3GPP non-terrestrial network (NTN) satellite communication module.

Read more...
SIMCom’s A7673x series
Otto Wireless Solutions Telecoms, Datacoms, Wireless, IoT
SIMCom recently released the A7673X series, a Cat.1 bis module based on the ASR1606 chipset, that supports wireless communication modes of LTE-FDD, with a maximum downlink rate of 10 Mbps and a maximum uplink rate of 5 Mbps.

Read more...
Accelerating the commercialisation of the 5G IoT markets
Altron Arrow Editor's Choice Telecoms, Datacoms, Wireless, IoT
Fibocom unveils Non-Terrestrial Networks (NTN) module MA510-GL, enabling satellite and cellular connectivity to IoT applications.

Read more...
Banana Pi with NPU
CST Electronics AI & ML
The latest Banana Pi SBC, the BPI-M7, is powered by Rockchip’s latest flagship RK3588 octa-core 64-bit processor, with a maximum frequency of 2,4 GHz.

Read more...
Long-range connectivity module
Avnet Silica Telecoms, Datacoms, Wireless, IoT
Digi XBee XR 868 RF Modules support the deployment of long-range connectivity applications, and support point-to-point and mesh networking protocols.

Read more...