30.06.2015 Views

Security and Communications Protocols for Pervasive Technologies

Security and Communications Protocols for Pervasive Technologies

Security and Communications Protocols for Pervasive Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

POLITECNICO DI TORINO<br />

SCUOLA DI DOTTORATO<br />

Dottorato in Ingegneria In<strong>for</strong>matica e dei Sistemi – XXII ciclo<br />

Tesi di Dottorato<br />

<strong>Security</strong> <strong>and</strong> <strong>Communications</strong><br />

<strong>Protocols</strong> <strong>for</strong> <strong>Pervasive</strong><br />

<strong>Technologies</strong><br />

Filippo G<strong>and</strong>ino, 143558<br />

Tutore<br />

Coordinatore del corso di dottorato<br />

Prof. M. Rebaudengo Prof. P. Laface<br />

2010


Contents<br />

Summary<br />

V<br />

1 Introduction 1<br />

1.1 Radio Frequency Identification . . . . . . . . . . . . . . . . . . . . . . 2<br />

2 <strong>Security</strong> 6<br />

2.1 Public-Key Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . 7<br />

2.1.1 Public Key Encryption . . . . . . . . . . . . . . . . . . . . . . 8<br />

2.1.2 Digital Signature . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />

2.1.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br />

2.1.4 Relevant Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 10<br />

2.1.5 Public Key Properties . . . . . . . . . . . . . . . . . . . . . . 10<br />

2.2 RFID Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />

2.3 Tampering with RFID Tags . . . . . . . . . . . . . . . . . . . . . . . 12<br />

2.3.1 Tampering in <strong>Pervasive</strong> In<strong>for</strong>mation Systems . . . . . . . . . . 13<br />

2.3.2 Tamper-evident approaches . . . . . . . . . . . . . . . . . . . 16<br />

2.3.3 Tamper-resistant approaches . . . . . . . . . . . . . . . . . . . 21<br />

2.3.4 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25<br />

2.3.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br />

2.4 Public-key in RFIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . 31<br />

2.4.1 RSA-like Cryptography . . . . . . . . . . . . . . . . . . . . . . 31<br />

2.4.2 Elliptic Curve Cryptography . . . . . . . . . . . . . . . . . . . 34<br />

2.4.3 ElGamal Cryptography . . . . . . . . . . . . . . . . . . . . . . 37<br />

2.4.4 NTRU Cryptography . . . . . . . . . . . . . . . . . . . . . . . 43<br />

2.4.5 Approaches Discussion <strong>and</strong> Conclusions . . . . . . . . . . . . . 45<br />

2.5 RFID Tags without cryptographic capability . . . . . . . . . . . . . . 47<br />

2.5.1 An Anti-Counterfeit Mechanism <strong>for</strong> the Application Layer in<br />

Low-Cost RFID Devices . . . . . . . . . . . . . . . . . . . . . 47<br />

2.5.2 Traceability with Privacy Protection . . . . . . . . . . . . . . 53<br />

2.5.3 A <strong>Security</strong> System <strong>for</strong> Chain Applications . . . . . . . . . . . 61<br />

2.6 RFID Tags with cryptographic capability . . . . . . . . . . . . . . . . 78<br />

II


2.6.1 EPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79<br />

2.6.2 Proposed Tag Architecture . . . . . . . . . . . . . . . . . . . . 82<br />

2.6.3 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . 86<br />

2.6.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87<br />

3 RFID Reader-to-Reader Anti-collision 88<br />

3.1 Per<strong>for</strong>mance Evaluation Criteria . . . . . . . . . . . . . . . . . . . . . 90<br />

3.1.1 Adopted Metrics . . . . . . . . . . . . . . . . . . . . . . . . . 92<br />

3.1.2 Proposed Evaluation Criteria . . . . . . . . . . . . . . . . . . 92<br />

3.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93<br />

3.2.1 ETSI EN 302 208-1 V1.2.1 . . . . . . . . . . . . . . . . . . . . 93<br />

3.2.2 Distributed Color System (DCS) . . . . . . . . . . . . . . . . 93<br />

3.2.3 Colorwave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94<br />

3.2.4 <strong>Protocols</strong> with High Requirements . . . . . . . . . . . . . . . 94<br />

3.2.5 <strong>Protocols</strong> based on Power Control . . . . . . . . . . . . . . . . 95<br />

3.3 Probabilistic DCS (PDCS) Protocol . . . . . . . . . . . . . . . . . . . 95<br />

3.4 Theoretical analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97<br />

3.4.1 Second Generation Collisions . . . . . . . . . . . . . . . . . . 98<br />

3.4.2 DCS-Like Protocol Behavior . . . . . . . . . . . . . . . . . . . 106<br />

3.5 Experimental Simulations . . . . . . . . . . . . . . . . . . . . . . . . 108<br />

3.5.1 PDCS Behavior According to µ . . . . . . . . . . . . . . . . . 108<br />

3.5.2 Best PDCS Configurations . . . . . . . . . . . . . . . . . . . . 111<br />

3.5.3 Multichannel Analysis . . . . . . . . . . . . . . . . . . . . . . 113<br />

3.5.4 Matrix Vs R<strong>and</strong>om Deployment . . . . . . . . . . . . . . . . . 113<br />

3.5.5 Mobile RFID Networks . . . . . . . . . . . . . . . . . . . . . . 113<br />

3.5.6 Dense RFID Networks . . . . . . . . . . . . . . . . . . . . . . 114<br />

3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116<br />

4 RFID <strong>for</strong> Agri-food Traceability 118<br />

4.1 Agri-Food Sector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119<br />

4.2 Traceability Management . . . . . . . . . . . . . . . . . . . . . . . . . 120<br />

4.3 State-of-the-art Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 124<br />

4.3.1 Theoretical Model . . . . . . . . . . . . . . . . . . . . . . . . 124<br />

4.3.2 Business Impact Analysis . . . . . . . . . . . . . . . . . . . . 125<br />

4.3.3 System Proposals . . . . . . . . . . . . . . . . . . . . . . . . . 127<br />

4.3.4 Simulation Analysis . . . . . . . . . . . . . . . . . . . . . . . . 133<br />

4.3.5 Field Studies . . . . . . . . . . . . . . . . . . . . . . . . . . . 135<br />

4.3.6 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139<br />

4.4 Framework <strong>for</strong> Traceability Analysis . . . . . . . . . . . . . . . . . . 142<br />

4.4.1 Internal Traceability System Features . . . . . . . . . . . . . . 143<br />

4.4.2 Writing/Reading <strong>and</strong> Tagging Automation . . . . . . . . . . . 145<br />

III


4.4.3 Established Internal Traceability Systems . . . . . . . . . . . . 148<br />

4.5 Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149<br />

4.5.1 Fruit warehouse . . . . . . . . . . . . . . . . . . . . . . . . . . 150<br />

4.5.2 Implementation of the RFID Traceability System . . . . . . . 158<br />

4.5.3 RFID-Based Traceability System Per<strong>for</strong>mance . . . . . . . . . 162<br />

4.5.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165<br />

5 Conclusion 166<br />

Bibliography 167<br />

IV


Summary<br />

<strong>Pervasive</strong> technologies represent cheap <strong>and</strong> small pervasively distributed devices<br />

which communicate wireless. Nowadays, these technologies are widely employed <strong>for</strong><br />

several applications, since they can provide many benefits, such as accurate area<br />

monitoring <strong>and</strong> distributed in<strong>for</strong>mation systems, where the in<strong>for</strong>mation is directly<br />

matched to the items. However, they involve great security <strong>and</strong> efficiency problems,<br />

which are mainly due the low cost of the devices, <strong>and</strong> to the strict constraints <strong>for</strong><br />

the communication range, the computational capability, <strong>and</strong> the power consumption.<br />

The pervasive distribution of the in<strong>for</strong>mation represents a great privacy problem,<br />

since it is difficult to monitor the access to pervasive devices, <strong>and</strong> the security<br />

systems are limited by strict computational constraints. The in<strong>for</strong>mation could be<br />

easily altered or copied, <strong>and</strong> pervasive devises matched to a human being could be<br />

used to track him/her. Also the pervasive deployment of the devices involves additional<br />

interference problems, which can affect the communication efficiency. This<br />

work explores benefits <strong>and</strong> constraints of <strong>Pervasive</strong> Technology, <strong>and</strong> it is focused on<br />

Radio Frequency Identification (RFID), which represents one of the more promising<br />

<strong>and</strong> widely employed pervasive technology, <strong>and</strong> it is replacing previous automatic<br />

identification systems like barcodes. The goal of this research study is to identify<br />

<strong>and</strong> analyze the main weak spots of pervasive technologies, <strong>and</strong> to provide reliable<br />

solutions. Much ef<strong>for</strong>t is spent <strong>for</strong> security, but also communications problems are<br />

considered. Furthermore, the application of RFID in a real production sector is<br />

exploited, in order to verify benefits <strong>and</strong> drawbacks on the field.<br />

Chapter 1 introduces to the reader the technological background, describing<br />

RFID characteristics.<br />

Chapter 2 analyses in deep the security issue. First, the main security threats<br />

<strong>for</strong> RFID are described. Since state-of-the-art studies do not provide a comprehensive<br />

analysis of data-tampering with RFID tags, this problem <strong>and</strong> the available<br />

protections are fully described <strong>and</strong> analyzed. The majority of security solutions<br />

<strong>for</strong> pervasive technologies are based on symmetric encryption. However, also public<br />

key encryption often represents an effective solution, so state-of-the-art security<br />

approaches based on public key encryption are fully analyzed, <strong>and</strong> new solutions<br />

V


are presented. The proposed security protocols <strong>for</strong> RFID are divided in two categories:<br />

based on tag without cryptographic capabilities, <strong>and</strong> based on tag with<br />

cryptographic capabilities. The latter approaches are not applicable to st<strong>and</strong>ard<br />

RFID tags, <strong>and</strong> require the production of more expensive tags, but they are more<br />

efficient <strong>and</strong> provide better security features.<br />

Chapter 3 analyses the RFID reader-to-reader collision problem, which represents<br />

a communication problem due to the interference between RFID readers in the same<br />

area, <strong>and</strong> affects the communication efficiency. The state-of-the-art approaches are<br />

analyzed <strong>and</strong> a new solution is proposed.<br />

Chapter 4 analyses the application of RFID technology to a production sector.<br />

The benefits <strong>and</strong> the drawbacks of the technology are discussed, <strong>and</strong> an evaluation<br />

framework is proposed.<br />

Finally, Chapter 5 presents some conclusions.<br />

VI


Chapter 1<br />

Introduction<br />

A pervasive environment is characterized by the presence of many distributed smart<br />

devices that hold in<strong>for</strong>mation. <strong>Pervasive</strong> In<strong>for</strong>mation Systems (ISs) can be used in<br />

order to improve <strong>and</strong> automate many traditional applications. This work is focused<br />

on Radio Frequency Identification (RFID), which is a widely employed pervasive<br />

technology suitable <strong>for</strong> several applications.<br />

A key service suitable to pervasive environments is the Supply Chain Management<br />

(SCM), which covers the planning <strong>and</strong> management of all activities involved<br />

in supply chain <strong>and</strong> the connections among Chain Members (CMs) [60]. The in<strong>for</strong>mation<br />

<strong>for</strong> SCM should allow the identification of the products, their sorting in<br />

the production flow, <strong>and</strong> the monitoring of the production flow. RFID tags can<br />

be matched to products, so automatic tools can identify a product by using the<br />

unambiguous ID of the matched tag as an entry <strong>for</strong> a central database that contains<br />

all the concerning data. In order to manage the communication among the<br />

CMs, the data could be stored in a shared database. However, its implementation<br />

requires strong technical ef<strong>for</strong>t <strong>and</strong> tight cooperation among all the CMs. Nevertheless,<br />

RFID tags with a rewritable memory can directly hold the in<strong>for</strong>mation about<br />

the identified items, so the products can also be immediately identified without a<br />

permanent connection to a central database.<br />

A service close to SCM is the traceability management. The traceability is the<br />

ability to trace back <strong>and</strong> <strong>for</strong>ward the path of an object, aiming at detecting the<br />

cause of a defect in a commodity, <strong>and</strong> at finding other eventual products subject<br />

to the same problem. Furthermore, the traceability is useful to detect counterfeit<br />

products, since the presence of many data about the path along the supply chain can<br />

help to check <strong>and</strong> guarantee the authenticity of products. Several sectors, especially<br />

whenever the products may affect the security of customers, need an efficient traceability<br />

system. There<strong>for</strong>e, a Competent Authority (CA) should be able to rapidly<br />

access to traceability in<strong>for</strong>mation, in order to immediately detect possible problems.<br />

The in<strong>for</strong>mation <strong>for</strong> traceability should describe an object <strong>and</strong> its history, so the<br />

1


1 – Introduction<br />

in<strong>for</strong>mation <strong>for</strong> SCM can be considered a subset of the in<strong>for</strong>mation <strong>for</strong> traceability.<br />

Multimodality shopping allows customers to interface with a shopping assistant<br />

tool by various input/output media. In this context a mobile RFID reader can<br />

identify the products <strong>and</strong> communicate to the shopping assistant tool some useful<br />

data about the product.<br />

RFID may be also involved into after point-of-sell applications. A tool connected<br />

to an RFID reader <strong>and</strong> to web network can read the maintenance in<strong>for</strong>mation<br />

about the commodity <strong>and</strong> send them to a server that manages the request, avoiding<br />

calling the maintenance center. In a smart home environment, RFID can be also<br />

exploited <strong>for</strong> automatic application in order to increase com<strong>for</strong>t <strong>and</strong> security.<br />

1.1 Radio Frequency Identification<br />

In this section a brief introduction on RFID technology is presented, highlighting<br />

weak spots <strong>and</strong> special requirements <strong>for</strong> RFID security techniques <strong>and</strong> RFID applications.<br />

Antenna<br />

RF<br />

Modulo<br />

RFID<br />

Reader<br />

Middleware<br />

Logic<br />

Circuits<br />

Memory<br />

RFID<br />

Tags<br />

Server<br />

DB<br />

Data<br />

Base<br />

Figure 1.1.<br />

RFID System<br />

An RFID system [49], which is shown in Figure 1.1, typically includes an RFID<br />

reader <strong>and</strong> some RFID tags. The reader is able to access tags by a wireless communication,<br />

which is managed by a radio frequency interface. Furthermore, the reader<br />

communicates the collected data to a middleware, which is the software layer that<br />

allows the interconnection between the reader <strong>and</strong> the in<strong>for</strong>mation system.<br />

A tag is composed by a radio frequency interface block, a memory component<br />

<strong>and</strong> a logic element. There are two kinds of tags: passive <strong>and</strong> active. Passive<br />

tags have no battery, <strong>and</strong> they acquire the power supply from the electromagnetic<br />

field of the reader, while active tags have their own power supply. Passive tags<br />

are cheaper than active ones, but they present a shorter transmission range. The<br />

active tag life depends on the battery duration <strong>and</strong> use, while the rewritable passive<br />

2


1 – Introduction<br />

tag life is typically measured in number of read/write cycles. The passive tags are<br />

more largely employed, thanks to their low cost. Active tags present per<strong>for</strong>mance<br />

similar to other pervasive technologies, <strong>and</strong> they are able to provide more advanced<br />

security features than passive ones, since their own power can supply more hardware<br />

modules. There<strong>for</strong>e, security techniques designed <strong>for</strong> other wireless devices, such<br />

as wireless sensor networks <strong>and</strong> smart phones, can be applied to these devices.<br />

Instead, according to the strict limitations that affect passive tags, they require adhoc<br />

security techniques. The same techniques used <strong>for</strong> passive tags could be applied<br />

also to active ones, but they have stricter limitations than general purpose ones.<br />

There<strong>for</strong>e, this work is specifically focused on passive tags, <strong>and</strong> in the following, if<br />

not differently reported, the word ’tag’ is referred to passive tags.<br />

The most important st<strong>and</strong>ardization organizations <strong>for</strong> RFID are represented by<br />

International Organization <strong>for</strong> St<strong>and</strong>ardization (ISO) <strong>and</strong> EPCglobal, which define<br />

the physical <strong>and</strong> logical requirements <strong>and</strong> interfaces <strong>for</strong> tags <strong>and</strong> readers. Furthermore,<br />

EPC st<strong>and</strong>ards define the structure <strong>and</strong> content of data. Operational frequency<br />

used in RFID systems vary according to the country. The frequency b<strong>and</strong>s<br />

are:<br />

ˆ Low Frequency (LF) between 125 <strong>and</strong> 134 KHz;<br />

ˆ High Frequency (HF) at 13.56 MHz (e.g. ISO 14443 <strong>and</strong> ISO 15693, both<br />

defined <strong>for</strong> identification cards);<br />

ˆ Ultra High Frequencies (UHF) between 866 <strong>and</strong> 868 MHz in EU, between<br />

902 <strong>and</strong> 928 MHz in USA (e.g. EPC Class I Gen 2 [8], defined <strong>for</strong> item<br />

management);<br />

ˆ Microwave at 2.45 GHz in EU, between 2.4 <strong>and</strong> 2.4835 GHz <strong>and</strong> between 5.725<br />

<strong>and</strong> 5.85 GHz in USA.<br />

A limitation to the use of RFIDs is represented by the presence of metal or liquid that<br />

can create noise to the electromagnetic field, disturbing or stopping the transmission.<br />

Lowest frequencies assure a major noise tolerance, but involve a shorter transmission<br />

range. Another factor that affects the transmission is the antenna shape <strong>and</strong> size.<br />

Typically, LF requires larger antennas. A reader compliant with EPC Class I Gen 2<br />

can read RFID passive tags in a range over 4 meters. On the other h<strong>and</strong>, a small<br />

reader <strong>for</strong> Personal Digital Assistant (PDA) compliant with ISO 14443 can read<br />

RFID passive tags only in a range shorter than 10 cm. The RFID transmissions are<br />

characterized by two ranges:<br />

ˆ the reading range, corresponding to the area where the electromagnetic field<br />

of the reader induces enough voltage in the tag antenna in order to correctly<br />

receive tag data;<br />

3


1 – Introduction<br />

ˆ the transmission range, corresponding to the area where the data can be received,<br />

but the supplied voltage could be not enough <strong>for</strong> passive tags; the<br />

reader transmission range is larger than the tag transmission range, according<br />

to the higher power, <strong>and</strong> than the reading range.<br />

Commonly, computational capacities are extremely limited in a tag. The major<br />

concern of an RFID reader consists in accessing the tag memory. Memory plays an<br />

important role in the tag architecture; it contains the unique identification number<br />

<strong>and</strong> may have up to several kilobits of storage capacity. However, the presence of a<br />

larger memory increases significantly the tag cost. Tags can have read-only or read<br />

<strong>and</strong> write memory. The rewritable memories open many application opportunities,<br />

but they are exposed to malicious writing actions. The widely used EPC Class I<br />

Gen 2 tags typically have a 96-bit memory bank that contains a code <strong>for</strong> the identification<br />

of the tagged object <strong>and</strong> a 64-bit bank of reserved memory that contains<br />

passwords. On the other h<strong>and</strong>, some ISO 14443 tags is equipped with memories<br />

larger than 8 Kbits.<br />

The hardware or software computation of cryptographic operations requires too<br />

computational ef<strong>for</strong>t <strong>for</strong> RFID tags. An RFID tag compliant with EPC Class I<br />

st<strong>and</strong>ard requires between 1000 <strong>and</strong> 4000 gates, while a commercial implementation<br />

of Advanced Encryption St<strong>and</strong>ard (AES) requires between 20000 <strong>and</strong> 30000<br />

gates [108]. Since the number of gates <strong>for</strong> security is strictly limited, usually tags<br />

implement only simple security operations. For example, EPC Class I Gen 2 requires<br />

the use of password <strong>and</strong> bitwise XOR operations. However, some RFID tags<br />

with cryptographic capability have been designed, such as DEFfire from Philips [14],<br />

which owns a crypto co-processor <strong>for</strong> DES/AES operations, compliant with ISO/IEC<br />

14443A <strong>for</strong> HF.<br />

Each type of application requires an RFID system with specific technological<br />

characteristics. In the following a list of RFID applications <strong>and</strong> their specifications<br />

are presented.<br />

ˆ Supply chain management [18]. A basic application can match each item with<br />

a tag. The tags can have small read-only memory with a unique code. Their<br />

frequency is UHF, in order to have a long reading range, <strong>and</strong> they are typically<br />

compliant with EPC st<strong>and</strong>ards.<br />

ˆ Internal traceability management based on reusable containers [54]. Each tag<br />

is matched to a container <strong>and</strong> the data about the products, written in the<br />

tag memory, are repeatedly updated. These applications require tags with<br />

rewritable memory in order to update the in<strong>for</strong>mation. The frequency of the<br />

tag is HF, normally matched to a large memory, or UHF, providing a larger<br />

reading range.<br />

4


1 – Introduction<br />

ˆ RFID applications <strong>for</strong> libraries [34]. Each tag is matched to a book, <strong>and</strong> it<br />

contains in<strong>for</strong>mation about the book <strong>and</strong> its location. These systems are often<br />

based on tags with rewritable memories, so the stored data can be updated<br />

<strong>and</strong> new ones can be added. The tags are normally read by a PDA, so the<br />

short reading range provided by HF does not represent a limitation.<br />

The pervasive nature of RFID technology exposes tags to two kinds of possible<br />

accesses:<br />

ˆ physical access, when an entity gets in touch with the tag;<br />

ˆ RF communication access, by means of the tag communication protocol, potentially<br />

without knowledge of the owner of the tag.<br />

The first case seems more dangerous, since adversaries have time <strong>and</strong> means to<br />

per<strong>for</strong>m strong attacks. However, the possible damages due to tampering actions are<br />

limited, since hardly they can be per<strong>for</strong>med without knowledge of the tag owner.<br />

Instead, RF attacks can generate troubles, since adversaries could alter data on<br />

rewritable memory tags that will be reused, generating possible mistakes.<br />

As a conclusion, the main elements that affect RFID security techniques <strong>for</strong> tags<br />

are:<br />

ˆ low computational ef<strong>for</strong>t;<br />

ˆ limited memory;<br />

ˆ exposure to RF access by hidden readers.<br />

The strict limitations related to tags do not affect the reader <strong>and</strong> the middleware,<br />

which can implement normal security techniques.<br />

5


Chapter 2<br />

<strong>Security</strong><br />

This chapter analyses <strong>and</strong> provides solutions to some of the main security threats<br />

<strong>for</strong> pervasive technologies. Section 2.1 deeply describes the basic concepts of public<br />

key cryptography, which are widely employed in this chapter. Section 2.2 describes<br />

the main security threats <strong>for</strong> RFID technologies.<br />

RFID is a well-known pervasive technology, which provides promising opportunities<br />

<strong>for</strong> the implementation of new services <strong>and</strong> <strong>for</strong> the improvement of traditional<br />

ones. However, pervasive environments require strong ef<strong>for</strong>ts on all the aspects of<br />

in<strong>for</strong>mation security. Notably, RFID passive tags are exposed to attacks, since strict<br />

limitations affect the security techniques <strong>for</strong> this technology. A critical threat <strong>for</strong><br />

RFID-based in<strong>for</strong>mation systems is represented by data tampering, which corresponds<br />

to the malicious alteration of data recorded in the tag memory. The aim<br />

of section 2.3 is to describe the characteristics <strong>and</strong> the effects of data tampering<br />

in RFID-based in<strong>for</strong>mation systems, <strong>and</strong> to survey the approaches proposed by the<br />

research community to protect against it. The most important recent studies on privacy<br />

<strong>and</strong> security <strong>for</strong> RFID-based systems are examined, <strong>and</strong> the protection given<br />

against tampering is evaluated. This section provides readers with an exhaustive<br />

overview on risks <strong>and</strong> defenses against data tampering, highlighting RFID weak<br />

spots <strong>and</strong> open issues.<br />

Section 2.4 presents, on one side, the motivations <strong>for</strong> addressing security <strong>and</strong><br />

privacy in RFIDs <strong>and</strong>, on the other side, it analyzes different approaches proposed<br />

in the literature that aim at solving these issues. Such different approaches, based on<br />

asymmetric encryption, will be described <strong>and</strong> compared analyzing their properties<br />

<strong>and</strong> their applicability to RFID devices, taking into account their limitations in<br />

terms of computation per<strong>for</strong>mance <strong>and</strong> power consumption.<br />

Section 2.5 presents some security approaches <strong>for</strong> RFID tags without cryptographic<br />

capability.<br />

RFID is particularly interesting <strong>for</strong> several kinds of physical objects, either living<br />

6


2 – <strong>Security</strong><br />

beings or inanimate items. In section 2.5.1 we propose to use it to implement an anticounterfeit<br />

mechanism in selected wine production environments. Using a Personal<br />

Digital Assistant (PDA) with a public/private key mechanism involving both the<br />

passive RFID internal memory <strong>and</strong> the unique RFID identifier it is possible <strong>for</strong><br />

the reseller <strong>and</strong> the final user to verify if the bottle is original. A sample bottle<br />

is used to simplify the encoding operation even in a low technology environment<br />

like a traditional cellar, also reducing the risk of losing the private key. Finally,<br />

implementation issues are considered, in order to confirm method feasibility.<br />

In Section 2.5.2 an agri-food traceability system based on public key cryptography<br />

<strong>and</strong> Radio Frequency Identification (RFID) technology is proposed. In order to<br />

guarantee safety in food, an efficient tracking <strong>and</strong> tracing system is required. RFIDs<br />

devices allow recording all useful in<strong>for</strong>mation <strong>for</strong> traceability directly on the commodity.<br />

The security issues are discussed <strong>and</strong> two different methods based on public<br />

cryptography are proposed <strong>and</strong> evaluated. The first algorithm uses a nested RSA<br />

based structure to improve security, while the second also provides authenticity of<br />

data. An experimental analysis demonstrates that system is well suitable on PDAs<br />

too.<br />

A wide adoption of pervasive computing environments, in particular exploiting<br />

RFID technology, may increase efficiency <strong>and</strong> bring added value with new applications.<br />

Nevertheless, pervasive environments involve threats to the in<strong>for</strong>mation<br />

privacy, so pervasive RFID systems must be matched to in<strong>for</strong>mation security systems<br />

able to satisfy the requirements of both supply chain members <strong>and</strong> customers.<br />

Section 2.5.3 presents a secure pervasive RFID-based in<strong>for</strong>mation system, suitable<br />

<strong>for</strong> traceability <strong>and</strong> supply chain management, <strong>for</strong> multimodality shopping <strong>and</strong> after<br />

the point-of-sell services. The in<strong>for</strong>mation system is designed in order to work<br />

with st<strong>and</strong>ard RFID devices. Furthermore, the proposed system, based on public<br />

key cryptography, avoids industrial espionage, guarantees the authenticity of in<strong>for</strong>mation,<br />

protects the customer privacy, <strong>and</strong> detects malicious alteration of the<br />

in<strong>for</strong>mation.<br />

Section 2.6 presents a new architecture of an RFID transponder with cryptographic<br />

capabilities. Other than being compatible with the EPC Class-1 Gen-2<br />

communication protocol, our tag implements an asymmetric ciphering module that<br />

proved useful in authentication <strong>and</strong> anti-counterfeit schemes, particularly critical<br />

in many application fields. Experimental results concerning area requirements <strong>and</strong><br />

power consumption indicate its feasibility.<br />

2.1 Public-Key Fundamentals<br />

Cryptographic algorithms have been used <strong>for</strong> decades in order to guarantee communication<br />

privacy. Cryptography deals with authentication systems with the aim<br />

7


2 – <strong>Security</strong><br />

of ensuring the genuineness of a message to the receiver. We will focus on cryptographic<br />

systems based on public key cryptosystems firstly presented in [43]. Many<br />

other applicable algorithms based on public-key cryptosystems have been proposed<br />

in the literature like RSA [110], ElGamal’s scheme [45] <strong>and</strong> Knapsack scheme [39].<br />

In a public key cryptosystem, given a pair of families {E K } K∈{K} <strong>and</strong> {D K } K∈{K}<br />

of algorithms representing inverting trans<strong>for</strong>mations,<br />

<strong>and</strong><br />

E K : {M} → {M}<br />

D K : {M} → {M},<br />

on a finite message space {M}, the following statements must be true:<br />

1. <strong>for</strong> every K ∈ {K}, E K is the inverse of D K ,<br />

2. <strong>for</strong> every K ∈ {K} <strong>and</strong> M ∈ {M}, algorithms E K <strong>and</strong> D K are easy to<br />

compute,<br />

3. <strong>for</strong> almost every K ∈ {K}, each algorithm equivalent to D K is computationally<br />

infeasible to derive from E K ,<br />

4. <strong>for</strong> every K ∈ {K}, it is feasible to compute inverse pairs E K <strong>and</strong> D K from<br />

K.<br />

There<strong>for</strong>e, by making K = Ko, a pair of ciphering functions D Ko <strong>and</strong> E Ko are<br />

fixed. The third property allows making public the key E Ko without compromising<br />

the security of the secret key D Ko . There are two main branches of public key<br />

cryptography depending on the utilization of the secret <strong>and</strong> public keys: public key<br />

encryption <strong>and</strong> digital signature.<br />

2.1.1 Public Key Encryption<br />

The basic idea behind public key encryption is to ensure confidentiality in a communication<br />

channel. A message is encrypted in a way that cannot be decrypted by<br />

other person than the intended recipient. Formally, a plaintext message P ∈ {M},<br />

is ciphered by means of the public key E Ko . The result is a ciphertext message<br />

C ∈ {M} that can be deciphered using the secret key D Ko . Thus, the following<br />

relations are true:<br />

C = E Ko (P ),<br />

P ′ = D Ko (C).<br />

Where P ′ = P . The receiver’s public key is available to anyone who wants to<br />

communicate with him/her.<br />

8


2 – <strong>Security</strong><br />

2.1.2 Digital Signature<br />

When digitally signing, messages are authenticated. A message is signed by means<br />

of the sender’s private key; in that way anyone who has access to the public key is<br />

able to verify the authenticity of the message. Hence, a plaintext message P ∈ {M},<br />

is signed by means of the secret key D Ko . The result is a ciphertext, signed message<br />

S ∈ {M} that can be deciphered <strong>and</strong> verified using the public key E Ko . Accordingly,<br />

the following relations remain true:<br />

S = D Ko (P ),<br />

P ′ = E Ko (S).<br />

Where, if per<strong>for</strong>med correctly, P ′ = P . The sender uses his/her own private key<br />

to sign a message, <strong>and</strong> everyone is able to verify its authenticity by exploiting the<br />

sender’s public key.<br />

2.1.3 Example<br />

Consider a simplified version of the RSA algorithm where the ciphering functions<br />

are defined as follows:<br />

E Ko (x) = x e mod n,<br />

D Ko (x) = x d mod n.<br />

By selecting the parameters in the following way:<br />

e = 17,<br />

d = 2753,<br />

n = 3233;<br />

it is possible to have both a public key (17,3233) <strong>and</strong> a private key (2753,3233). For<br />

example, suppose that a message P = 123 is encrypted with the public key. Hence,<br />

E Ko (123) = 123 17 mod 3233 = 855.<br />

Similarly, the corresponding decryption is per<strong>for</strong>med as follows:<br />

D Ko (855) = 855 2753 mod 3233 = 123.<br />

According to RSA Laboratories [87], as of 2007, valid key dimensions <strong>for</strong> a long<br />

term security should be at least 1024-bit long. They show that 663-bit keys have<br />

been factored with an ef<strong>for</strong>t equivalent to 55 years on a single 2.2 GHz Opteron<br />

CPU; however, with a cluster of 80 2.2 GHz CPUs the key was broken in about<br />

three months.<br />

9


2 – <strong>Security</strong><br />

2.1.4 Relevant Attacks<br />

In the following a short description of some attacks on public key encryption will be<br />

presented:<br />

ˆ Chosen-plaintext attack: the adversary chooses a set of plaintexts <strong>and</strong> obtains<br />

the corresponding ciphertexts, in order to deduce in<strong>for</strong>mation to recover the<br />

plaintext of an specific ciphertext.<br />

ˆ Adaptive chosen-plaintext attack: the adversary can choose a plaintext based<br />

on the previously obtained ciphertexts.<br />

ˆ Chosen-ciphertext attack: the adversary can obtain a set of plaintexts corresponding<br />

on the chosen set of ciphertexts.<br />

ˆ Adaptive chosen-ciphertext attack: the adversary can choose a ciphertext<br />

based on the previously obtained plaintexts.<br />

Although chosen-ciphertext attacks are very dangerous <strong>for</strong> public-key cryptography,<br />

in the RFID context they are normally not possible.<br />

2.1.5 Public Key Properties<br />

In the following some properties of cryptographic schemes are presented.<br />

Homomorphism [50]<br />

Let M denote the set of the plaintexts <strong>and</strong> respectively C the set of ciphertexts. An<br />

encryption scheme is said to be homomorphic if <strong>for</strong> any given encryption key k the<br />

encryption function E satisfies:<br />

∀m 1 ,m 2 ∈ M, E(m 1 ⊙ M m 2 ) ←→ E(m 1 ) ⊙ C E(m 2 ).<br />

With the multiplication operators a scheme is multiplicatively homomorphic, so the<br />

multiplication of two encrypted values is equal to the encrypted multiplication of<br />

two values.<br />

Semantic <strong>Security</strong> [62]<br />

This property requires that no in<strong>for</strong>mation about the plaintext can be learned from<br />

the ciphertext. More strictly, an encryption scheme (G,E,D) is semantically secure<br />

if <strong>for</strong> all probabilistic polynomial time algorithms M <strong>and</strong> A, functions h, polynomials<br />

Q there is a probabilistic polynomial time B such that <strong>for</strong> sufficiently large k,<br />

P r(A(1 k ,c,e) = h(m) | (e,d) ← G(1 k ) ; m ← M(1 k ) ; c ← E(e,m))<br />

10


2 – <strong>Security</strong><br />

≤ P r(B(1 k ) = h(m) | m ← M(1 k )) + 1<br />

Q(k) .<br />

Semantic security does not consider the case of the chosen ciphertext attack.<br />

Key-privacy [24]<br />

This property requires that, from a ciphertext encrypted by a public key selected in<br />

a set of known keys, an eavesdropper is not able to identify the employed key.<br />

2.2 RFID Threats<br />

The use of RFID tags hazards the privacy. In the USA, many organizations, such<br />

as Consumer Privacy <strong>and</strong> Civil Liberties Organizations, are requesting attention<br />

to privacy threats [6]. In Canada, the Annual Report to Parliament 2005 of the<br />

Privacy Commissioner underlines the importance to ensure that RFIDs do not erode<br />

in<strong>for</strong>mational privacy rights [1]. In EU, in compliance with the Working Document<br />

adopted on 2005 by the European Data Protection Working Party [11], the national<br />

authorities, set up to protect personal in<strong>for</strong>mation, established guidelines needed <strong>for</strong><br />

a safe use of RFID technology [10].<br />

Rules about privacy change according to the country, as well. However in many<br />

countries there is a great attention on privacy risks. There are many privacy threats<br />

connected to RFID [77, 113, 135]:<br />

ˆ The serial number of a tag can be associated with the customer’s identity, so<br />

it is possible to monitor the customer or, knowing the object identified by the<br />

serial number, to get in<strong>for</strong>mation <strong>for</strong> profiling. Besides to know which object<br />

a person buys, it is possible to know how often a person uses it as well.<br />

ˆ Even without associating a tag number with a person identity, a set of tags<br />

can track an unidentified person, violating the “location privacy” [26].<br />

ˆ The transfer of a tag from a set to another set means that an object passes<br />

from a person to another, so it is possible to know that there is a relation<br />

between those persons.<br />

ˆ By reading the tag’s memory, it could be possible to know which commodities<br />

a person possesses.<br />

ˆ Companies would like to keep private their in<strong>for</strong>mation, in order to avoid<br />

industrial espionage <strong>and</strong> unauthorized monitoring of their sales.<br />

11


2 – <strong>Security</strong><br />

ˆ Privacy threats, due to recording of the tracking in<strong>for</strong>mation on an RFID<br />

tag, are mainly the risk of unauthorized readings of in<strong>for</strong>mation about the<br />

belongings of a person, <strong>and</strong> the industrial espionage. In this Chapter a solution<br />

to these problems is proposed.<br />

The privacy threads, arose from RFID, involve dangers such as man tracking,<br />

personal belongings monitoring <strong>and</strong> industrial espionage. Many solutions to the<br />

privacy problem have been analyzed, some of them are:<br />

ˆ killing the tag [8], a comm<strong>and</strong> can stop the tag at the point-of-sale.<br />

ˆ using passwords or encryption [127], which try to avoid unauthorized readings<br />

of the tag; changing tag ID [78], the use of different IDs makes difficult the<br />

recognizing of a tag;<br />

ˆ blocking the anti-collision system of the reader [80], a special tag stops the<br />

correct functioning of the reader.<br />

2.3 Tampering with RFID Tags<br />

RFID is a well-known pervasive technology, which provides promising opportunities<br />

<strong>for</strong> the implementation of new services <strong>and</strong> <strong>for</strong> the improvement of traditional ones.<br />

However, pervasive environments require strong ef<strong>for</strong>ts on all the aspects of in<strong>for</strong>mation<br />

security. Notably, RFID passive tags are exposed to attacks, since strict<br />

limitations affect the security techniques <strong>for</strong> this technology. A critical threat <strong>for</strong><br />

RFID-based in<strong>for</strong>mation systems is represented by data tampering, which corresponds<br />

to the malicious alteration of data recorded in the tag memory.<br />

The aim of this section is to describe the characteristics <strong>and</strong> the effects of data<br />

tampering in RFID-based in<strong>for</strong>mation systems, <strong>and</strong> to survey the approaches proposed<br />

by the research community to protect against it. The most important recent<br />

studies on privacy <strong>and</strong> security <strong>for</strong> RFID-based systems are examined, <strong>and</strong> the protection<br />

given against tampering is evaluated. This section provides readers with<br />

an exhaustive overview on risks <strong>and</strong> defenses against data tampering, highlighting<br />

RFID weak spots <strong>and</strong> open issues.<br />

Although RFIDs provide relevant opportunities, they involve also considerable<br />

in<strong>for</strong>mation security threats [77], such as cloning of original tags <strong>and</strong> privacy violation.<br />

A critical threat is represented by data tampering, which consists in the<br />

malicious changing of data recorded in the tag memory. The tampering has many<br />

dangerous effects, such as incoherence in the in<strong>for</strong>mation system, exposure to opponent<br />

attacks, <strong>and</strong> mistakes in the production flow. This malicious action has been<br />

studied in various fields, e.g. software source protection [40], <strong>and</strong> many approaches,<br />

addressing it, have been proposed.<br />

12


2 – <strong>Security</strong><br />

Nowadays, the application of RFID is rapidly growing <strong>and</strong>, according to the strict<br />

security requirements <strong>for</strong> RFID-based systems, several research studies on RFID security<br />

problems have been proposed (e.g. [77, 117]). According to [118] in 2007, 58<br />

papers on security <strong>and</strong> privacy in RFID systems, <strong>and</strong> 39 papers on controlling the<br />

in<strong>for</strong>mation flow between tags <strong>and</strong> readers have been proposed. Both specialized<br />

approaches [97, 106, 107, 130] <strong>and</strong> some more general ones [17, 27, 28] address the<br />

tampering problem. Several solutions to various security issues in mobile [135] <strong>and</strong><br />

pervasive technologies have been provided, but problems as tampering in RFID still<br />

represent a critical threat <strong>for</strong> data security. Although various books [16, 84] <strong>and</strong><br />

survey-based journal papers [57, 77, 114, 118] present the state-of-the-art in RFID<br />

security, these studies are mainly focused on privacy protection, authentication features,<br />

<strong>and</strong> cryptographic hardware implementations, which represent the most frequently<br />

analyzed RFID security issues. There<strong>for</strong>e, this section aims at filling the gap<br />

in RFID security study, analyzing the characteristics of data tampering in RFIDbased<br />

in<strong>for</strong>mation systems, <strong>and</strong> surveying the state-of-the-art of RFID tampering<br />

protection, in order to provide readers with an exhaustive overview on risks <strong>and</strong> on<br />

proposed defenses against tampering. The characteristics of RFID technology are<br />

described, highlighting security weak spots. This survey is specially focused on tampering<br />

with data in tag memories, since this threat represents a critical open issue.<br />

Furthermore, the most recent <strong>and</strong> effective general purpose security approaches <strong>for</strong><br />

RFID tags are analyzed, evaluating their ability to effectively protect against tampering.<br />

2.3.1 Tampering in <strong>Pervasive</strong> In<strong>for</strong>mation Systems<br />

The definition of tampering changes according to the context. It can be defined<br />

as a malicious action that alters something (e.g. objects or data). Several fields<br />

in In<strong>for</strong>mation Technology are subject to the tampering problem, so many effective<br />

defenses have been proposed [38, 67, 95, 99, 105, 132, 133]. There are two kinds of<br />

protections against tampering.<br />

ˆ Tamper-evidence. The feature of a process, device, or software, to detect the<br />

existence of tampering.<br />

ˆ Tamper-resistance. The ability to resist to tampering.<br />

The effects of tampering can be divided in two main groups:<br />

ˆ damage, when tampering makes something unusable;<br />

ˆ alteration, when the target seems correct, but according to the malicious alteration,<br />

it is faulty <strong>and</strong> it will generate possible mistakes.<br />

13


2 – <strong>Security</strong><br />

Although tamper-resistance solutions aim at preventing all tampering effects,<br />

tamper-evidence aims at preventing only mistakes due to an alteration, reduced<br />

to a damage. In the following the main tampering effects <strong>and</strong> tamper-protection<br />

schemes from several fields are introduced, describing their relation with RFID.<br />

One field in in<strong>for</strong>mation technology, where the tampering problem has been<br />

widely studied, is the software protection. A tamper attack could alter a program in<br />

some ways. An adopted solution is adding tamper-evident features, by inserting into<br />

the program tamper-proofing code, which can detect if the program was tampered<br />

with, stopping the program when tampering effects are detected [40]. This kind of<br />

attack could be very dangerous <strong>for</strong> pervasive devices, since they are often deployed<br />

into hostile areas. However, low cost RFID tags are very simple devices <strong>and</strong> most<br />

of them do not present a microprocessor, so software tampering does not represent<br />

a relevant threat.<br />

A considerable tampering subject is the hardware tampering. Tampering actions<br />

may aim at damaging the device or at altering the system accessing to the code<br />

in order to reprogram it with a malicious one able to execute insider attacks. The<br />

tamper-resistant hardware may avoid unauthorized access to the running code <strong>and</strong><br />

it may resist to malicious actions such as physical penetration, <strong>and</strong> temperature manipulation.<br />

Various applications employ tamper-resistant hardware, among which<br />

several approaches <strong>for</strong> authentication <strong>and</strong> integrity checking in mobile systems [132].<br />

However, the use of tamper-resistant hardware requires high costs, which are often<br />

too expensive <strong>for</strong> pervasive environments. In wireless sensor networks a tampered<br />

node with a malicious running program is a critical threat. Hardware tampering<br />

attacks to RFID tags have not been reported, <strong>and</strong> it is not yet directly h<strong>and</strong>led by<br />

RFID security approaches <strong>for</strong> low cost RFID tags. The main motivation is that tags<br />

are often vulnerable to simpler <strong>and</strong> faster RF attacks, which can be applied also<br />

without physical access.<br />

In wireless communications, tamper attacks could modify in-transit packets, so<br />

received data are altered <strong>and</strong> differ from the transmitted ones. This malicious action<br />

is recognized as really dangerous especially in mobile fields, such as Vehicular [67],<br />

<strong>and</strong> Mobile [99] Ad-Hoc Networks.<br />

The greatest threat <strong>for</strong> RFID In<strong>for</strong>mation System is represented by data tampering.<br />

The most well-known data tampering attacks control data, <strong>and</strong> the main<br />

defense against it is the control flow monitoring <strong>for</strong> reaching tamper-evidence. However,<br />

tampering with other kinds of data such as user identity data, configuration<br />

data, user input data, <strong>and</strong> decision-making data, is also dangerous [38]. Some solutions<br />

were proposed, such as a tamper-evident compiler <strong>and</strong> micro-architecture<br />

collaboration framework to detect memory tampering [133]. A further threat is the<br />

tampering with application data, involving mistakes in the production flow, denial<br />

of service, incoherence in the in<strong>for</strong>mation system, <strong>and</strong> exposure to opponent attacks.<br />

This kind of attack is especially dangerous <strong>for</strong> RFID systems, since one of the main<br />

14


2 – <strong>Security</strong><br />

RFID applications is the automatic identification <strong>for</strong> database real-time updating.<br />

The main data tampering actions are:<br />

ˆ data impairing, some bits of digital in<strong>for</strong>mation are changed, in order to damage<br />

it making data unreadable or to alterate its value;<br />

ˆ wrong data insertion, data are altered replacing them with new data with erroneous<br />

values; this action requires the ability to compose new data consistent<br />

with the original data encoding;<br />

ˆ data copying, original data are altered deleting <strong>and</strong> replacing them with other<br />

data copied from a different location; this action does not require an encoding<br />

process.<br />

In a RFID-based system, data tampering is very dangerous, since it could generate<br />

serious mistakes, e.g. in a company with AIDC the production flow could<br />

be stopped, <strong>and</strong> in pharmaceutical industry [105], drugs with wrong data may be<br />

delivered to a wrong destination, causing troubles <strong>for</strong> patients.<br />

Data tampering can be per<strong>for</strong>med on RFID tags with a rewritable memory, by<br />

means of a RF communication. According to the pervasive deployment of tags,<br />

an attack can be per<strong>for</strong>med moving the adversary RFID reader <strong>for</strong> few seconds<br />

inside the reading range of the tag, or viceversa waiting until the tag is moved in<br />

the reading range of the hidden adversary RFID reader. For tags with a read-only<br />

memory, tampering attacks cannot be per<strong>for</strong>med by means of a RF communication,<br />

so the physical access to the tag is required in order to per<strong>for</strong>m the more costly<br />

hardware tampering.<br />

An evaluation of threats on RFID systems compliant with EPC st<strong>and</strong>ards has<br />

been presented in [55]. This study, partially based on an evaluation framework<br />

proposed by ETSI [12], determines the likelihood of a threat, which represents the<br />

probability that an attack is per<strong>for</strong>med, according to the motivation, which is evaluated<br />

according to the provided benefits, <strong>and</strong> the required difficulty <strong>for</strong> attackers.<br />

Finally the evaluation method ranks the risk of a threat as “critical”, “major” or<br />

“possible”, according to the computed likelihood <strong>and</strong> the impact, which represents<br />

the relevance of the attack effects. This study has been extended in [56], where the<br />

threats contained in the STRIDE model [71], which is used to define threat types<br />

<strong>for</strong> the design of secure software systems, are evaluated according to the proposed<br />

method. However, only a limited part of the study is focused on tampering, <strong>and</strong><br />

the analysis deals only with systems compliant with EPC st<strong>and</strong>ards, which are designed<br />

<strong>for</strong> item management. The motivation <strong>for</strong> tampering with RFID data has<br />

been ranked medium, since adversaries do not reach clear benefits. The difficulty<br />

has been ranked high, since adversaries have to bypass 32-bit passwords, according<br />

to EPC Class I Gen 2 [8]. The impact has been ranked low, since the tampering<br />

15


2 – <strong>Security</strong><br />

effects are evaluated temporary. The resulting likelihood <strong>and</strong> risk have been evaluated<br />

low. However, according to our analysis, when the motivation is to damage a<br />

competitor it can be ranked high. Moreover, tampering actions can be per<strong>for</strong>med<br />

<strong>for</strong> economic purposes, e.g. changing the price of a good in a shop. Many RFID<br />

tags are not protected by passwords, <strong>and</strong> often eavesdropping the passwords could<br />

be simple, as detailed in Section 2.3.3, so the difficulty is medium. When the effect<br />

is an alteration the impact could be medium or high. The likelihood in our analysis<br />

is considered medium <strong>and</strong> the risk is evaluated medium/high.<br />

2.3.2 Tamper-evident approaches<br />

In this section the approaches that aim at detecting tampering are detailed. These<br />

schemes aim at reducing the alteration effects of tampering to a damage. According<br />

to the evaluation method presented in [55], the result is the reduction of the impact<br />

<strong>and</strong> of the risk from medium/high to low. Even if data tampering can be per<strong>for</strong>med<br />

not only on the data stored in the tag memory, it represents the weak spot of<br />

RFID systems, so this section is focused on tampering with data on tags. Other<br />

attacks conducted beyond the RFID reader, such as tampering with database or<br />

messages between the RFID reader <strong>and</strong> servers, can be managed by well-known<br />

security techniques (e.g. Tamper-Evident Database [95] <strong>and</strong> Message Authentication<br />

Code (MAC) [25]). The described approaches are shown in Figure 2.1.<br />

Tamper-Evident<br />

Approaches<br />

Anti-Tampering<br />

Approaches<br />

General Purpose<br />

<strong>Security</strong><br />

Approaches<br />

Fragile<br />

Watermarking<br />

Write Activity<br />

Record<br />

Authentication<br />

Privacy<br />

Symmetric<br />

Cryptography<br />

Public Key<br />

Cryptography<br />

Figure 2.1.<br />

Tamper-evident approaches<br />

16


2 – <strong>Security</strong><br />

Fragile watermarking <strong>for</strong> RFID data tamper detection<br />

The watermarking consists in embedding in<strong>for</strong>mation into original data. It is defined<br />

fragile when a minimal change of the original data generates incoherence between<br />

the data <strong>and</strong> the embedded in<strong>for</strong>mation.<br />

A tamper detection system based on fragile watermarking was proposed in [107].<br />

This system aims at detecting tampering on RFID tag with a writable memory<br />

compliant with EPC96 st<strong>and</strong>ard, as shown in Fig 2.2. The tag memory is composed<br />

by the following fields:<br />

ˆ the Header that defines the EPC version,<br />

ˆ the EPC Manager that identifies the manufacturer,<br />

ˆ the Object Class that identifies the kind of object,<br />

ˆ the Serial Number that is used by the manufacturer to unambiguously identify<br />

the tagged item.<br />

Since the <strong>for</strong>mat of the first three data fields is set by the st<strong>and</strong>ard but the serial<br />

number is directly managed by the companies, the authors propose to embed the<br />

watermark into the serial number. The fragile watermark is reached by per<strong>for</strong>ming<br />

3 one-way functions respectively on the EPC Manager, the Object Class, <strong>and</strong> the<br />

original Serial Number. The check of the watermark requires the knowledge of its<br />

location inside the EPC, <strong>and</strong> the adopted one-way functions, so these data shall be<br />

shared by the partners that aim to guarantee the authenticity of the in<strong>for</strong>mation by<br />

adopting the described approach. This system allows detecting tampering on the<br />

EPC Manager, the Object Class, <strong>and</strong> the original Serial Number. When tampering<br />

actions are detected, the system detects the tampered area with a discrimination of<br />

one among the three data, <strong>and</strong> the watermark.<br />

Header EPC Manager Object Class Serial Number<br />

8-bit 28-bit 24-bit 36-bit<br />

Figure 2.2.<br />

St<strong>and</strong>ard EPC96: Tag Memory Organization<br />

In [106], an implementation of the system described in [107] is proposed. The<br />

watermark requires 8 bits out of the 32 bits of the Serial Number, <strong>and</strong> it is generated<br />

as a hash number by the EPC Manager, <strong>and</strong> the Object Class, through a pseudo<br />

r<strong>and</strong>om number generator. The function is not applied on the Serial Number, since<br />

tampering actions on it are not considered dangerous by the authors. One additional<br />

bit from the Serial Number is required as parity bit of the watermark.<br />

17


2 – <strong>Security</strong><br />

The authors conclude that the short length of the watermark could affect the<br />

robustness of the tamper detection system, but this problem could be avoided by<br />

adding an additional memory area <strong>for</strong> the watermark.<br />

A drawback of this implementation is that the watermarking is based on a secret<br />

function. There<strong>for</strong>e, when an opponent obtains the function a huge modification of<br />

the system is required.<br />

This system can be applied only to RFID tags that hold data compliant with<br />

EPC96. However, it could be easily extended to other st<strong>and</strong>ards. The RFID tags<br />

do not require special features. The communication protocols between the reader<br />

<strong>and</strong> tags have no special requirements. When the reader receives a writing request,<br />

it shall be able to generate the watermark <strong>and</strong> to embed it into the original data.<br />

The middleware is in charge of managing the checking protocol. The time required<br />

by the tamper check corresponds to the reading of 96 bits, <strong>and</strong> to the computation<br />

of the watermarking function.<br />

The robustness of the system is based on the secrecy of the adopted function,<br />

<strong>and</strong> of the location of the watermark. However, this in<strong>for</strong>mation shall be shared by<br />

all the entities involved in the trade of the tagged products, so the application of<br />

this system requires strong trust among participants. The system does not involve<br />

participants with limited permissions, e.g. the only tamper checking ability, so the<br />

method is vulnerable to insider attack, since a malicious participant can sabotage<br />

the whole system. Furthermore, external companies or customers that want to buy<br />

the products cannot directly use the system in order to detect tampering.<br />

According to the implementation proposed in [106], data impairing per<strong>for</strong>med<br />

by an opponent that does not know the secret function <strong>and</strong> the location of the<br />

watermark is undetected only if per<strong>for</strong>med on the bits of the original Serial Number.<br />

When the opponent knows the location of the watermark, it can impair all the bits<br />

of the original Serial Number. This action, else if limited to the Serial Number,<br />

can seriously damage some services, such as traceability management. As data<br />

impairing, also wrong data insertion can be per<strong>for</strong>med only on the bits of the original<br />

Serial Number. However, the knowledge of the Serial Number <strong>for</strong>mat adopted by a<br />

company makes easier to find the location of the watermark. This malicious action<br />

can more effectively damage services, since its consequences are deterministic. The<br />

data copying can be per<strong>for</strong>med on the whole tag memory also without knowledge<br />

on the functions <strong>and</strong> on the location of the watermark, since by copying both the<br />

original data <strong>and</strong> the watermark no incoherence is generated. This action triggers<br />

critical troubles, since all the data can be altered, <strong>and</strong> when per<strong>for</strong>med on RFID<br />

tags <strong>for</strong> item management, it can generate various mistakes.<br />

This scheme can be used both to detect tampering with tag memories that do not<br />

present any other protections (e.g. password), <strong>and</strong> as additional protection. The<br />

application of the system, according to the restriction to EPC compliant tags, is<br />

almost limited to item management systems. The extension to other tag types <strong>and</strong><br />

18


2 – <strong>Security</strong><br />

RFID systems is also possible. The strength of this scheme is that it is compliant<br />

with RFID tag limitations, because no additional computation ef<strong>for</strong>t is charged<br />

on tags, <strong>and</strong> no additional memory is required. However, the provided protection<br />

against tampering is limited. The introduction of watermarking can defend against<br />

r<strong>and</strong>om tampering attacks per<strong>for</strong>med to the purpose of impair generic tags, but it<br />

is weak against an adversary with proper means.<br />

Write activity record <strong>for</strong> RFID data tamper detection<br />

Yamamoto et al. have proposed a method <strong>for</strong> tamper detection based on write<br />

activity record [130]. In this approach the RFID tag has a special memory area<br />

that RFID readers can only read, <strong>and</strong> that the tag itself can read <strong>and</strong> write. When<br />

a writing operation is per<strong>for</strong>med on the tag memory by a reader, the tag writes a<br />

record that describes the operation in the special memory area. A writing operation<br />

is described by the offset of the written memory area, <strong>and</strong> by the length of the written<br />

data. The first in<strong>for</strong>mation in the special memory area represents the pointer to the<br />

area <strong>for</strong> the next insertion, <strong>and</strong> the number of recorded writing operations.<br />

The tamper detection method requires the check of the records in the special<br />

memory area, in order to check if some data have been overwritten on previous<br />

data. If there is no overlap, then the memory has not been tampered. Otherwise if<br />

some memory areas have been overwritten, then data could be tampered.<br />

The authors have proposed <strong>and</strong> tested an implementation that requires 2 bytes<br />

<strong>for</strong> each record of the special memory area. There<strong>for</strong>e, the special memory area<br />

shall be very large, in order to hold more than one record <strong>for</strong> each memory bank.<br />

Furthermore, the protocol should be able to manage effectively a number of writing<br />

operations greater than the number of records in the special memory area, in order<br />

to avoid that several writing operations on the same bank could hide tampering on<br />

other banks.<br />

The tamper detection can be per<strong>for</strong>med without special permissions, so every<br />

company or customer can check if tags have been tampered.<br />

This system can be applied to RFID tags, regardless of their data organization<br />

<strong>and</strong> <strong>for</strong>mat. The RFID tags require an additional special memory area, <strong>and</strong> a special<br />

writing protocol. The middleware shall manage the checking protocol; while, the<br />

communication protocol <strong>and</strong> the RFID reader do not present special requirements.<br />

The time required by the tamper check corresponds mainly to the reading of memory<br />

slots of 2 bytes <strong>for</strong> each per<strong>for</strong>med writing. This overhead corresponds to a drawback<br />

in many critical <strong>and</strong> real-time applications.<br />

This approach allows detecting all the tampering actions, but it detects as possible<br />

tampering also each rewriting operation. There<strong>for</strong>e, it is not suitable <strong>for</strong> an<br />

In<strong>for</strong>mation System that uses the same memory area more than once, e.g. internal<br />

traceability systems based on reusable containers [53]. Furthermore, applications<br />

19


2 – <strong>Security</strong><br />

that allow operators to correct writing operations of wrong data, by writing the<br />

correct in<strong>for</strong>mation on the same memory bank, will generate several false tamper<br />

detections, according to the error rate of human operators. The suitability of the<br />

system requires that the number of false detections should be very small. Another<br />

drawback of the system is that only tampering with written memory banks can be<br />

detected, but wrong data insertion <strong>and</strong> data copying on unused banks cannot be<br />

detected.<br />

This approach requires the design of new tags, currently not available, which<br />

would be compliant with existing st<strong>and</strong>ards. The main drawbacks of this approach<br />

are the large memory requirement, the long transmission time <strong>for</strong> tamper checking,<br />

<strong>and</strong> the limited applicability. However <strong>for</strong> some applications where a high cost per<br />

tag is acceptable, it can provide a good security against data tampering attacks<br />

per<strong>for</strong>med by RF channel.<br />

Public key cryptography <strong>for</strong> authentication<br />

Various protocols <strong>for</strong> authentication employ cryptography <strong>and</strong> RFID tags without<br />

cryptographic capability. In these approaches the cryptographic operations are not<br />

per<strong>for</strong>med by the tag, which only contains the encrypted data. Typically, a critical<br />

code is encrypted using a secret key <strong>and</strong> a public key cryptosystem in order to<br />

get a signature. The public key is given to all the entities that have to check the<br />

authenticity of the product matched with the tag. The authenticity checking requires<br />

the decryption of the signature, <strong>and</strong> the comparison with the original code.<br />

Authentication protocols can provide tamper-evidence, but they require tags<br />

with a large memory <strong>and</strong> long data transmissions. Furthermore, it is not possible to<br />

distinguish if a tag is not original or it has been tampered, <strong>and</strong> the tamper-evidence is<br />

not extended to other in<strong>for</strong>mation contained by the tag. There<strong>for</strong>e, authentication<br />

schemes based on public key cryptography <strong>for</strong> RFID tags without cryptographic<br />

capability are not effective tamper-evident approaches. The damaging effects due<br />

to false positives generates a medium/high impact according to the importance of<br />

the authentication, so tags with additional tamper-resistant features are required in<br />

order to reach a high difficulty <strong>for</strong> attackers <strong>and</strong> to reduce the risk from medium/high<br />

to low.<br />

Cryptography <strong>for</strong> privacy protection<br />

Many applications uses secret or private in<strong>for</strong>mation, employing RFID tags without<br />

cryptographic capability that contain secret or private in<strong>for</strong>mation. A possible<br />

solution to avoid unauthorized readings of the recorded data is represented by the<br />

encryption.<br />

In a symmetric cryptosystem, all the participants own the key, so they can<br />

20


2 – <strong>Security</strong><br />

per<strong>for</strong>m both encryption <strong>and</strong> decryption. However, this system requires a strong<br />

trust among the participants, since the robustness of the system is based on the<br />

secrecy of the key.<br />

Another interesting protocol is Insubvertible Encryption [17], which aims at protecting<br />

privacy, <strong>and</strong> employs a public-key cryptosystem based on ElGamal encryption<br />

[45] <strong>for</strong> privacy protection. In this scheme the data written in the tag memory<br />

are encrypted <strong>and</strong> can be re-encrypted by an authorized user without knowledge on<br />

the keys previously used. The scope of the re-encryption is to change the context of<br />

the tag in order to avoid tracking. This scheme is tamper-evident, since the entity<br />

that per<strong>for</strong>ms the re-encryption can identify if the ciphertext has been tampered.<br />

In cryptosystems that manage also the authenticity, as described in Section 2.3.2,<br />

the tamper detection can be per<strong>for</strong>med only by the authenticity check, but this<br />

operation cannot normally distinguish between a not authentic tag <strong>and</strong> a tampered<br />

one. Instead, in cryptosystems that encrypt in<strong>for</strong>mation only <strong>for</strong> privacy, data<br />

impairing is detected by decryption, so only authorized entities can check it. Wrong<br />

data insertion is possible only <strong>for</strong> opponents with the secret key. The data copying<br />

of the whole memory can be per<strong>for</strong>med avoiding detection only when the protocol<br />

does not encrypt a reference in<strong>for</strong>mation, that unambiguously identifies the item or<br />

the tag. However, only systems where tags are not suspected to be not authentic<br />

are effectively tamper-evident.<br />

2.3.3 Tamper-resistant approaches<br />

In this section one approach specifically designed <strong>for</strong> tamper-resistant RFID tag is<br />

detailed. Furthermore, some security tamper-resistant general purpose approaches<br />

are described. A classification of tamper-resistant approaches is shown in Figure 2.3.<br />

According to the evaluation method presented in [55], these schemes aim at increasing<br />

the difficulty <strong>for</strong> adversaries to tamper with data in tag memories.<br />

Steganography <strong>for</strong> RFID tag data recovery<br />

The steganography is the ability to hide in<strong>for</strong>mation. In [97] an approach based<br />

on steganography that aims at recovering tampered data on RFID tag memories<br />

compliant with EPC96 is presented.<br />

According to the approaches described in Sec. 2.3.2, the approach proposed in<br />

[97] is based on the statement that opponents could get benefits only by tampering<br />

with the EPC Manager <strong>and</strong> Object Class, <strong>and</strong> that the Serial Number is the best<br />

area to embed security bits.<br />

Authors propose to select a group of products of the same consignment that<br />

are characterized by the same EPC Manager <strong>and</strong> Object Class, to split in groups<br />

of bits the secret pattern generated from the EPC Manager <strong>and</strong> the Object Class<br />

21


2 – <strong>Security</strong><br />

Tamper-Resistant<br />

Approaches<br />

Anti-Tampering<br />

Approaches<br />

General Purpose<br />

<strong>Security</strong><br />

Approaches<br />

Steganography<br />

Unwritable<br />

Memory<br />

Password<br />

Challenge-Response<br />

<strong>Protocols</strong><br />

Read Only<br />

Memory<br />

Lockable<br />

Memory<br />

Hard<br />

Cryptography<br />

Figure 2.3.<br />

Tamper-resistant approaches<br />

of the tags, <strong>and</strong> to embed each group of bits in the Serial Number of a tag. The<br />

secret pattern is computed using error correction codes, <strong>and</strong> its length is equal to the<br />

sum of the lengths of the EPC Manager, the Object Class, <strong>and</strong> some bits required<br />

by the <strong>for</strong>mula. Error correction codes help to recover data, when also the Serial<br />

Number has been tampered. Authors propose an implementation where the length<br />

of the pattern is 66 bits. There<strong>for</strong>e, these 66 bits are devised in groups, <strong>and</strong> each<br />

group is embedded in a tag memory. Then <strong>for</strong> each group it calculates the parity<br />

bit, which is embedded in the Serial Number of the subsequent tag. The tamper<br />

detection <strong>and</strong> recover procedure consists in checking the parity bit, <strong>and</strong> per<strong>for</strong>ming<br />

the error correction coding. The parity bit aims at detecting tamper with the Serial<br />

Number, <strong>and</strong> the secret pattern is used to generate the original EPC Manager <strong>and</strong><br />

Object Class. Also when few bits of the secret pattern have been tampered, the<br />

error correction coding can calculate the right original data.<br />

This system can be applied only to RFID tags that hold data compliant with<br />

EPC96. The RFID tags do not require special features. The protocols of communication<br />

between the reader <strong>and</strong> tags are compliant with st<strong>and</strong>ards. Writing operation<br />

shall be managed according to the group division of the tags, in order to embed correctly<br />

the security bits. The middleware is in charge of the checking protocol. The<br />

time required by the tamper checking <strong>and</strong> recovery, which may be per<strong>for</strong>med on a<br />

whole group of tags, corresponds to the reading of 96 bits <strong>for</strong> each tag, <strong>and</strong> to the<br />

computation of the error correction coding.<br />

The system can be applied only to indivisible set of products, since the lack of<br />

some tags makes the recovery system unusable, <strong>and</strong> the tamper detection possible<br />

22


2 – <strong>Security</strong><br />

only when both a tag <strong>and</strong> the subsequent one are available. The robustness of the<br />

system is based on the secrecy of the location of the secret in<strong>for</strong>mation <strong>and</strong> on<br />

the error correction coding. However, this in<strong>for</strong>mation shall be shared by all the<br />

entities that are involved in the trade of the tagged products; so the application of<br />

this system requires strong trust among participants. The system does not involve<br />

participants with limited permissions, so a malicious participant can sabotage the<br />

whole system. Furthermore, external companies <strong>and</strong> customers that want to buy<br />

the products cannot directly use the system in order to detect tampering.<br />

As <strong>for</strong> tamper detection approaches described in Sec. 2.3.2, data impairing per<strong>for</strong>med<br />

by an opponent that does not know the secret function <strong>and</strong> the location of<br />

the secret pattern is undetectable only if per<strong>for</strong>med on the bits of the original Serial<br />

Number. When the opponent knows the location of the secret pattern, he/she can<br />

impair all the bits of the original Serial Number. When the data impairing alters<br />

too many bits of the secret pattern, the recovery cannot be per<strong>for</strong>med. As data impairing,<br />

also wrong data insertion can be per<strong>for</strong>med avoiding detection only when<br />

per<strong>for</strong>med on the bits of the original Serial Number. However, opponents that know<br />

the meaning of data in the Serial Number can easily find the secret pattern. Since<br />

the system shall be applied to groups of products of the same set, the data copying<br />

of the whole tag memory can be easily detected. However, the copy of all the data<br />

of a group of tags, on a different group cannot be detected by this approach.<br />

This scheme can be used to recover tampered data on tag memories that have no<br />

other protections (e.g. access password), or as additional protection. The application<br />

of the system, according to the restriction to EPC compliant tags, is generally<br />

limited to item management systems. The application restriction to indivisible<br />

groups of items <strong>and</strong> the low protection level strictly limits the applicability of this<br />

scheme.<br />

Unwritable Memory<br />

RFID tags with unwritable memory are tamper-resistant. They can be divided in<br />

two groups according to the memory characteristics:<br />

ˆ read-only memory, as the memories that hold only the ID;<br />

ˆ permanently lockable memory, such as in the EPC Class I Gen 2 St<strong>and</strong>ard [8],<br />

where after being locked with a password the memory becomes unlockable.<br />

A great benefit of systems that employ these kinds of tags is the strong tamperresistance.<br />

Although these RFID tags cannot be used <strong>for</strong> applications which require<br />

the ability to record in<strong>for</strong>mation on the tags (e.g. internal tracking with reusable<br />

containers [54,121]), when they are applicable (e.g. supply chain management [96])<br />

they represent the strongest solution. Also <strong>for</strong> authentication systems, unwritable<br />

23


2 – <strong>Security</strong><br />

memory are an effective solution, especially when the tag memory contains a signature.<br />

Tags with a permanently lockable memory are more versatile than tags with<br />

a read only memory, <strong>and</strong> if the locking is correctly managed, they provide the same<br />

tamper-resistant level.<br />

Passwords<br />

A basic protocol that authenticates readers can employ passwords. In this case a<br />

reader needs the correct password in order to access to the tag memory. However, an<br />

eavesdropper can listen the password <strong>and</strong> use it <strong>for</strong> unauthorized accesses to the tag.<br />

The optional use of 32-bit passwords is required by EPC Class I Gen 2 [8]. When<br />

a password is used to write into memory area, the tag sends a r<strong>and</strong>om number to<br />

the reader, which per<strong>for</strong>ms a bitwise XOR operation between the password <strong>and</strong> the<br />

r<strong>and</strong>om number, <strong>and</strong> then it sends the result to the tag. An adversary that can only<br />

eavesdrop reader to tag communication, but not the other direction, is not able to<br />

find the password. However, an adversary that can eavesdrop both the directions of<br />

the communication can easily find it.<br />

The strength of passwords is that they are easy to implement, <strong>and</strong> they are<br />

also managed by low cost tags. However, the simple use of password increases<br />

the difficulty <strong>for</strong> adversaries to tamper with RFID data, since this action requires<br />

eavesdropping, but does not stop it. Furthermore, the use of password cannot be<br />

applied to systems where generic users have the writing privilege.<br />

Challenge-Response <strong>Protocols</strong><br />

In a challenge-response authentication protocol an entity presents a question, <strong>and</strong><br />

a second entity properly answers. When the answer is incorrect the second entity<br />

is considered not valid. The authentication can be unilateral or mutual. Several<br />

methods that implement challenge-response authentication can be applied to RFID<br />

technology.<br />

Advanced protocols employ cryptography [94]. An example that employs symmetric<br />

key encryption, unilateral authentication, <strong>and</strong> r<strong>and</strong>om number, can be based<br />

on ISO/ IEC 9798-2 [73]. Both the tag <strong>and</strong> the reader own the secret key. The tag<br />

sends a r<strong>and</strong>om number to the reader, which encrypts it using the secret key <strong>and</strong><br />

which sends back the ciphertext. The described protocol requires tags with enough<br />

computation capacity to per<strong>for</strong>m symmetric-key encryption <strong>and</strong> to generate r<strong>and</strong>om<br />

or suitable pseudo-r<strong>and</strong>om numbers. The robustness of the protocol is related to the<br />

difficulty to predict the pseudo-r<strong>and</strong>om number <strong>and</strong> to the length <strong>and</strong> the security<br />

of the employed keys. An example of RFID tags with cryptographic capability is<br />

DEFfire from Philips [14], which can per<strong>for</strong>m AES/DES operations.<br />

The only ways to tamper with data on a tag that employs a challenge-response<br />

24


2 – <strong>Security</strong><br />

authentication protocol based on symmetric key encryption are breaking the encryption<br />

scheme, finding the secret keys or predicting/altering the pseudo-r<strong>and</strong>om<br />

number generation. When the employed cryptosystem is strong enough, challengeresponse<br />

protocols represent a strong solution. Moreover, they can be employed <strong>for</strong><br />

applications that require rewritable memories, provided that only authorized users<br />

have to write on the tags. However, the main drawback is the additional cryptographic<br />

modulo required by tags, which increases the cost per tag, <strong>and</strong> can reduce<br />

the reading range, according to the higher power supply required by the tag.<br />

2.3.4 Discussion<br />

During the last years, many approaches have been proposed <strong>for</strong> security problems<br />

aiming at protecting from tampering, <strong>and</strong> in particular various tamper-evident <strong>and</strong><br />

tamper-resistant approaches have been proposed <strong>for</strong> RFID tags. These approaches<br />

are characterized by different properties, requirements, <strong>and</strong> applications. Furthermore,<br />

each approach has specific benefits <strong>and</strong> drawbacks.<br />

Table 2.1. Requirements Comparison of Anti-Tampering Approaches respect to<br />

EPC Class I Gen 2 St<strong>and</strong>ard<br />

Approach<br />

Requirements<br />

tags<br />

readers/ communication<br />

middleware<br />

Watermarking [106] st<strong>and</strong>ard (EPC96) watermark st<strong>and</strong>ard<br />

generation<br />

Write activity [130] special memory area st<strong>and</strong>ard st<strong>and</strong>ard<br />

special writing protocol<br />

Authentication [28] st<strong>and</strong>ard (large user st<strong>and</strong>ard/ st<strong>and</strong>ard<br />

memory)<br />

encryption<br />

Privacy protection<br />

st<strong>and</strong>ard (large user st<strong>and</strong>ard/ st<strong>and</strong>ard<br />

[27]<br />

memory)<br />

encryption<br />

Steganography [97] st<strong>and</strong>ard (EPC96) st<strong>and</strong>ard st<strong>and</strong>ard<br />

Permanently lockable<br />

st<strong>and</strong>ard (lockable) st<strong>and</strong>ard st<strong>and</strong>ard<br />

memory [8]<br />

Password [8] st<strong>and</strong>ard (password) st<strong>and</strong>ard st<strong>and</strong>ard<br />

Challenge-Response<br />

Authentication [14]<br />

encryption<br />

st<strong>and</strong>ard/<br />

encryption<br />

Challenge-<br />

Response<br />

In order to analyze the feasibility of anti-tampering approaches, their requirements<br />

have to be considered. Table 2.1 shows the main characteristics of RFID<br />

25


2 – <strong>Security</strong><br />

tags, readers <strong>and</strong> communications protocols that are required by anti-tampering<br />

approaches. The compared authentication <strong>and</strong> privacy protection approaches are<br />

based on messages encrypted with public key cryptography <strong>and</strong> embedded in the<br />

tag memory. The requirements <strong>for</strong> the readers <strong>and</strong> the middleware are the easiest<br />

to satisfy, adding additional software modules to the middleware, or implementing<br />

their functionalities directly on the reader, also when these modules require relevant<br />

computational ef<strong>for</strong>t. Requirements that modify the communication st<strong>and</strong>ards often<br />

involve longer communication sessions <strong>and</strong> generate incompatibility with st<strong>and</strong>ard<br />

devices. However, the only approach that has special requirements <strong>for</strong> communication<br />

is the Challenge-Response Authentication, which is naturally limited to<br />

authorized tags <strong>and</strong> readers. Each approach presents some requirements <strong>for</strong> RFID<br />

tags, which are the most difficult to satisfy. The Challenge-Response Authentication<br />

<strong>and</strong> the Write activity scheme present requirements not addressed by the st<strong>and</strong>ards,<br />

which involve high cost tags with additional hardware modules. Authentication <strong>and</strong><br />

privacy protection approaches require large user memories, increasing the cost. The<br />

tag requirements of the other schemes can be accomplished without excessive ef<strong>for</strong>t.<br />

Table 2.2.<br />

Protection Comparison of Anti-Tampering Approaches<br />

Approach<br />

Tampering Threats<br />

data impairing wrong data insertion data copying<br />

Watermarking [106] tamper-evident 1 tamper-evident 1 possible<br />

Write activity [130] tamper-evident 2 tamper-evident 2 tamper-evident 2<br />

Authentication [28] possible possible possible<br />

Privacy protection tamper-evident tamper-evident possible<br />

[27]<br />

Steganography [97] tamper-evident 1 tamper-evident 1 possible<br />

light resistance light resistance light resistance<br />

Permanently lockable<br />

tamper-resistant tamper-resistant tamper-resistant<br />

memory [8]<br />

Password [8] tamper-resistant tamper-resistant tamper-resistant<br />

Challenge- tamper-resistant tamper-resistant tamper-resistant<br />

Response Authentication<br />

[14]<br />

1 According to the analyzed implementation tampering with the original Serial<br />

Number cannot be detected.<br />

2 Tampering with blank memory banks cannot be detected.<br />

Table 2.2 compares the protection against data-tampering threats of both approaches<br />

designed <strong>for</strong> tampering, <strong>and</strong> general security approaches. One implementation<br />

<strong>for</strong> each approach is used as reference in the table. A tamper threat is defined<br />

26


2 – <strong>Security</strong><br />

as “possible” when the requirements of the approach are satisfied <strong>and</strong> it can still<br />

be per<strong>for</strong>med. The definition “light resistance” is used when tampering can be per<strong>for</strong>med,<br />

<strong>and</strong> the data recovery could be possible. Observing Table 2.2, we can find<br />

that only one method is tamper-evident against data copying, but only <strong>for</strong> tampering<br />

with written memory banks, so the protection from this attack represents a relevant<br />

open issue <strong>for</strong> RFID tamper-evident research studies. Examining the general purpose<br />

security techniques, we can find that although tag authentication protocols do<br />

not provide any effective protection against tampering, privacy protection systems<br />

present effective tamper-evident features.<br />

Table 2.3. Robustness Comparison of Anti-Tampering Approaches<br />

Approach Robustness Factors RFID Drawbacks<br />

length of the watermark area in the EPC code<br />

Watermarking [106] function secrecy difficult updating<br />

watermark location secrecy<br />

participant trust insider vulnerable<br />

Write activity [130] no rewritings tampering <strong>and</strong> rewriting<br />

unnoticeable<br />

special memory length memory area<br />

Privacy protection<br />

length of the keys memory area <strong>and</strong> trans-<br />

[27]<br />

mission time<br />

key secrecy<br />

length of the code area in the EPC code<br />

Steganography [97] error correction coding multiple tags<br />

watermark location secrecy<br />

participant trust insider vulnerable<br />

Permanently lockable<br />

hardware<br />

memory [8]<br />

password secrecy eavesdropper vulnerable<br />

Password [8] password length memory area<br />

password number memory area<br />

Challenge-Response length of the keys tag computation<br />

Authentication [14]<br />

key secrecy<br />

A critical characteristic <strong>for</strong> the evaluation of an approach is represented by its<br />

robustness, since a protocol that protects against all tamper threats but can be<br />

easily broken is not acceptable. Table 2.3 shows the main factors that affect the<br />

robustness of a method, <strong>and</strong> the related drawbacks due to RFID technology, such<br />

as additional memory area, which increases the cost, <strong>and</strong> additional computation,<br />

27


2 – <strong>Security</strong><br />

which increases the time <strong>and</strong> consumption. The most robust tamper-evident approach<br />

is represented by the Write activity scheme. However, it requires a large<br />

memory to store the writing activities. The tamper-evidence provided by the privacy<br />

protection approach is quite high, but it does not address data copying, <strong>and</strong><br />

it requires a large memory. The robustness of the Watermarking scheme is lower,<br />

mainly because it is based on several factors, such as the length of the watermark <strong>and</strong><br />

the trust among participants, which are not easy to fully satisfy. The most robust<br />

tamper-evident approach is the Permanently lockable memory, since it is protected<br />

against RF attacks. Also the Challenge-Response Authentication is robust, but it<br />

requires relevant tag computation capability. The Password approach is exposed<br />

to brute <strong>for</strong>ce attacks, which are addressed by long passwords, <strong>and</strong> to eavesdropping<br />

attacks, which represents the weak spot of this approach. The Steganography<br />

approach does not provide high robustness, since tampering with the watermark<br />

location prevents data recovery.<br />

Table 2.4. Tamper Checking Comparison of Tamper-evident Approaches<br />

Approach Detection Ability Owner Checking Time<br />

Watermarking [106] participants 96-bit reading<br />

watermarking function<br />

Write activity [130] public reading of 2 bytes <strong>for</strong> per<strong>for</strong>med<br />

writing<br />

Privacy protection [27] authority whole ciphertext reading<br />

decryption<br />

Table 2.4 shows the characteristics of tamper checking. The number of entities<br />

that can check the tamper presence affects the usefulness of the system, since a<br />

restricted number of possible users lead to difficulties to detect tampering. Also the<br />

number <strong>and</strong> the kind of operations is important, since they affect the per<strong>for</strong>mance<br />

of the system. However, as shown in Table 2.4, the RFID-specific tamper-evident<br />

approaches do not require too long operations, so they are quite fast; instead, the<br />

general privacy protection approach, which involves cryptography, requires more<br />

computation time.<br />

Table 2.5 shows the tamper-evident approaches sorted according to their robustness,<br />

<strong>and</strong> the restrictions to their applicability. According to the decrease of the<br />

robustness, the schemes can be more widely applied. The Write activity scheme can<br />

be used only <strong>for</strong> applications that do not require more than one writing operation<br />

per memory bank (e.g. supply chain management). Privacy protection can be used<br />

<strong>for</strong> every type of application, but it requires that all the participants own the keys.<br />

28


2 – <strong>Security</strong><br />

The Watermarking scheme can be used <strong>for</strong> applications that employ tags compliant<br />

with EPC96 st<strong>and</strong>ard, which is normally used <strong>for</strong> item management.<br />

For applications that do not require rewriting the Write activity approach is<br />

the best solution. However, it requires expensive tags. For applications that require<br />

rewriting, <strong>and</strong> only authorized users have to access tags, a good tamper-evident solution<br />

is represented by the Privacy protection approach. However, also this approach<br />

requires quite expensive tags. For the other applications where data are compliant<br />

with EPC96, or when the tag cost is a critical parameter, the Watermarking approach<br />

can represent a good solution. However, the provided tamper-evidence is<br />

limited.<br />

Table 2.5. Applicability Comparison of Tamper-evident Approaches<br />

# Approach Applicability Restrictions<br />

1 Write activity [130] No corrections or updates<br />

2 Privacy protection [27] Participants with keys<br />

3 Watermarking [106] EPC96 data <strong>for</strong>mat<br />

Although tamper-evident approaches reduce the alteration effects of tampering<br />

to damage, according to Section 2.3.1, tamper-resistant approaches can provide<br />

better protection against both alteration <strong>and</strong> damage. Table 2.6 shows the tamperresistant<br />

approaches sorted according to their robustness, <strong>and</strong> the restrictions to<br />

their applicability. As <strong>for</strong> tamper-evident schemes, according to the decrease of the<br />

robustness, they can be more widely applied. The Permanently lockable memory<br />

approach can be used only <strong>for</strong> applications that do not require rewriting, similarly<br />

to the Write activity approach. The Challenge-Response Authentication <strong>and</strong> the<br />

Password schemes can be used <strong>for</strong> every type of application, but they require that<br />

the participants with writing privilege own the keys or passwords. The Steganography<br />

approach can be used <strong>for</strong> applications that employ tags compliant with EPC96<br />

st<strong>and</strong>ard, as the Watermarking approach.<br />

For applications that do not require rewriting the Permanently lockable memory<br />

approach is the best solution. Moreover, it can be implemented with low cost<br />

tags. There<strong>for</strong>e, <strong>for</strong> these application the Permanently lockable memory approach is<br />

better than the Write activity scheme. For applications that require rewriting, <strong>and</strong><br />

where only authorized users have to write tags, the Challenge-Response Authentication<br />

can be a good solution. However, this approach requires very expensive tags.<br />

When low cost tags are required, the same kind of applications managed with the<br />

Challenge-Response Authentication can employ the Password approach, but they<br />

provide less security, being exposed to eavesdropping. In order to reach a higher<br />

security the Password approach can be used together with Privacy protection. For<br />

29


2 – <strong>Security</strong><br />

the other applications where data are compliant with EPC96, or when the tag cost<br />

is a critical parameter, the Steganography scheme can represent a solution, but only<br />

if inseparable set of tags are used. This approach provides low tamper-resistance,<br />

but it provides also limited tamper-evidence.<br />

Table 2.6. Applicability Comparison of Tamper-resistant Approaches<br />

# Approach Applicability Restrictions<br />

1 Permanently lockable memory [8] No corrections or updates<br />

2 Challenge-Response Authentication [14] Participants with keys<br />

3 Password [8] Participants with password<br />

4 Steganography [97] EPC96 <strong>for</strong>mat, Inseparble tags<br />

The main open issues <strong>for</strong> tamper-resistant solutions are represented by the lack<br />

of cheap <strong>and</strong> robust schemes applicable to tags with rewritable memory. Tamperevident<br />

approaches lack of robust schemes based on low cost tags, <strong>and</strong> the lack<br />

of schemes usable <strong>for</strong> a generic application. Especially data copying requires to<br />

be carefully managed by future tamper-evident approaches. Watermarking-based<br />

schemes seem a quite effective low cost solution, but it should be extended to tags<br />

with different memory organizations.<br />

2.3.5 Conclusion<br />

Tampering is one of the most dangerous threats <strong>for</strong> RFID systems, especially datatampering,<br />

which cannot easily be addressed with st<strong>and</strong>ard methods. In this section<br />

the characteristics <strong>and</strong> the effects of tampering have been described. The peculiarities<br />

of tampering with RFIDs <strong>and</strong> in general with pervasive technologies have been<br />

detailed. Tamper-evident <strong>and</strong> tamper-resistant approaches <strong>for</strong> RFID have been surveyed<br />

<strong>and</strong> classified. Furthermore, other general purpose RFID security techniques<br />

have been described, analyzing their protection against tampering attacks.<br />

The comparison of the described approaches highlighted their benefits <strong>and</strong> drawbacks.<br />

Among the various approaches the main protection is given by the tamperresistant<br />

general purpose ones, but these methods involve either strict limitations<br />

to RFID applications, or RFID tag computational capacity. The RFID-specific<br />

tamper-evident approaches do not require relevant computational capacity, but either<br />

their robustness is limited or their applicability is narrow. The main open issue<br />

is represented by the lack of tamper-evident approaches that are able to effectively<br />

manage data copying.<br />

30


2 – <strong>Security</strong><br />

2.4 Public-key in RFIDs<br />

Symmetric encryption <strong>and</strong> challenge-response techniques have been successfully implemented<br />

in RFID systems, <strong>and</strong> satisfactory results in terms of security have been<br />

obtained <strong>for</strong> specific applications. Asymmetric encryption provides advantages that<br />

symmetric encryption does not; e.g., since it does not require key distribution, benefits<br />

such as off-line authentication might be obtained. Nevertheless, asymmetric<br />

encryption is less diffused in RFIDs mainly because its hardware requirements are<br />

larger than in other security schemes.<br />

Different asymmetric encryption approaches have been studied <strong>and</strong> proposed.<br />

Each proposal differs from others in the kind of encryption algorithm adopted. Relevant<br />

approaches are based on the Rivest, Shamir <strong>and</strong> Adleman (RSA) algorithm [29],<br />

Elliptic Curves Cryptography (ECC) [22], ElGamal scheme [45] or NTRU scheme [5].<br />

RSA-like encryption engines are based on the complexity of computing logarithms<br />

in finite fields. Good <strong>and</strong> proven security is obtained by using it; however,<br />

its key length is the main drawback that affects its smooth implementation in RFID<br />

systems. An encryption core based on this kind of algorithm requires key lengths of,<br />

at least, several hundreds of bits which combined with the kind of operations that<br />

must be per<strong>for</strong>med provides an unhealthy environment <strong>for</strong> RFID deployment. Finally,<br />

RSA-like algorithms require a huge quantity of memory in the RFID transponder.<br />

ECC-based algorithms are based on the same mathematical principles as RSA<br />

except by the fact that operations are carried out within an elliptic curve in the<br />

finite field. As a result, key lengths are reduced in a significant way maintaining<br />

many of the security advantages of RSA.<br />

ElGamal scheme is based on the intractability of the discrete logarithm problem<br />

<strong>and</strong> the Diffie-Hellman problem. Since two modular exponential operations are<br />

required, the efficiency is lower than in RSA, <strong>and</strong> the size of the keys is larger. However<br />

this approach retains several interesting properties, such as semantic security<br />

<strong>and</strong> homomorphism.<br />

NTRU is an encryption algorithm based on the complexity of finding a very short<br />

vector in a high dimension lattice which has been proposed recently. This approach<br />

allows reducing execution time because keys may be managed in short chunks, thus<br />

taking advantage of general purpose processors.<br />

2.4.1 RSA-like Cryptography<br />

RSA cryptosystem was invented by Rivest, Shamir <strong>and</strong> Adleman [110] <strong>and</strong> is the<br />

best known of the integer factorization family of cryptosystems where its strength<br />

lies in the mathematical complexity of factoring large integers. In this scheme, large<br />

enough integers are selected in order to make brute-<strong>for</strong>ce factorization infeasible.<br />

31


2 – <strong>Security</strong><br />

RSA is, probably, the most widely used public key cryptosystem. Since multiplication<br />

of integers modulo n is a relatively cumbersome procedure to implement, <strong>and</strong><br />

since an exponentiation operation requires repeated multiplication, the RSA system<br />

cannot achieve the speed of private systems. This is, of course, true <strong>for</strong> other public<br />

keys cryptosystems as well. RSA encryption <strong>and</strong> signature verification can be<br />

speeded up significantly by selecting a small exponent (typical values are either 3 or<br />

2 16 + 1).<br />

Mathematical Description<br />

Based on the integer factorization problem, RSA cryptosystems are created from<br />

two large prime numbers p <strong>and</strong> q. In RSA, the product n = pq generates the group<br />

G = Z ∗ n, which is a multiplicative group of units in the integers module n. The<br />

order of G is φ(n) = (p − 1)(q − 1), where φ denotes the Euler Phi function. Since<br />

no efficient algorithms are known <strong>for</strong> taking b-th roots in Z ∗ n without the knowledge<br />

of p <strong>and</strong> q, hence, breaking the RSA cryptosystem is believed to be equivalent to<br />

factoring n.<br />

Keys Generation<br />

steps:<br />

Public <strong>and</strong> Private generation is per<strong>for</strong>med in the following<br />

1. Select two large prime numbers p <strong>and</strong> q.<br />

2. Compute n = pq.<br />

3. Compute φ(n) = (p − 1)(q − 1).<br />

4. Find two numbers a <strong>and</strong> b that satisfy ab ≡ 1 (mod (φ(n))).<br />

5. The public key is the pair (n,b) <strong>and</strong> the secret key is (p,q,a).<br />

Encryption In an RSA cryptosystem, message x is translated into a ciphertext<br />

c(x), i.e. encrypted, as follows:<br />

c(x) = x b mod n<br />

Decryption On the other h<strong>and</strong>, decryption in a RSA cryptosystem is per<strong>for</strong>med<br />

in the following way:<br />

p(y) = y a mod n<br />

32


2 – <strong>Security</strong><br />

High-level Approach<br />

Some approaches utilize RSA-like encryption <strong>for</strong> dealing with security in RFID<br />

transponders. Most of them are part of a broader protocol with a specific aim<br />

that takes advantage of RSA encryption in an indirect way, avoiding encryption<br />

requirements within the RFID tag.<br />

A common use of encryption in RFID systems is to reduce counterfeit. In [28],<br />

authors come up with a solution <strong>for</strong> providing a level of security against counterfeit<br />

tags based on RSA-like encryption. The basic idea behind their approach is to<br />

use a key-couple K P <strong>and</strong> K S , the public <strong>and</strong> secret key respectively, to encode the<br />

identifier of the tag I T . In particular, they encrypt I T with K S that gives as a result<br />

C T , a ciphered version of the identifier. C T is then memorized in the tag’s memory<br />

allowing final users to verify the authenticity of the tag by decrypting it with K P<br />

<strong>and</strong> comparing the result with I T ; after the memorization, the writing action <strong>for</strong> the<br />

involved area of memory is disabled.<br />

This approach is a simple authentication protocol that bypasses the need of<br />

encryption capabilities inside RFID transponders.<br />

The cloning action is possible, but it clearly requires the production of new<br />

tags. The <strong>for</strong>gery action needs to break the RSA cryptosystem system. A spying<br />

action can only get the identifier. The ciphertext is unchangeable, so the system<br />

is tamper resistant. The system does not provide protection against tracking or<br />

personal belongings spying.<br />

Hardware Approach<br />

An authentication protocol <strong>for</strong> RFIDs that has been implemented in hardware <strong>and</strong><br />

adopts RSA-like cryptography is introduced in [29]. In that approach, authors<br />

present an RFID tag with encryption capabilities. The tag encrypts the identifier<br />

of the tag I T , providing a ciphertext C T . C T can be decrypted <strong>and</strong> compared to I T .<br />

According to authors choosing the public key K P or the secret key K S <strong>for</strong> encryption<br />

depends on the kind of application that is intended. For instance, if encryption is<br />

per<strong>for</strong>med with K S then decryption must be per<strong>for</strong>med with K P , <strong>and</strong> thus the<br />

application should be an authentication or anti-counterfeit protocol. Authors claim<br />

that, when using a technology of 90 nm <strong>and</strong> 1.9 MHz as operational frequency,<br />

they reach about 1600 µW of power consumption <strong>and</strong> an encryption average time<br />

of 540 ms <strong>for</strong> a 1024-bit key. Even though timing <strong>and</strong> power results are not fully<br />

satisfactory, this approach provides a good starting point <strong>for</strong> on-line encryption in<br />

RFID transponders.<br />

33


2 – <strong>Security</strong><br />

2.4.2 Elliptic Curve Cryptography<br />

Elliptic Curve Cryptography (ECC) is a term used to mean a multitude of different<br />

cryptographic key exchange <strong>and</strong> agreement protocols. The building block of all<br />

these protocols is the scalar point multiplication which also represents the computationally<br />

most expensive operation. The construction of elliptic curve groups may be<br />

per<strong>for</strong>med by exploiting different types of finite fields, being the most common one<br />

the Galois Field with prime characteristics or binary extension fields, e.g., GF(p)<br />

<strong>and</strong> GF(2 k ). Low power implementations of ECC in hardware may be achieved<br />

by means of efficient arithmetic that can lead to feasible approaches <strong>for</strong> public-key<br />

cryptography within the RFID domain.<br />

Several elliptic curve cryptographic schemes are related to schemes based on<br />

the discrete logarithm problem. In order to show theoretical constructs of ECC <strong>and</strong><br />

provide a possible implementation architecture, the particular approach of Menezes-<br />

Vanstone [119] is considered throughout this section. For the description of other<br />

schemes quoted in this section, we will refer the readers to the original papers.<br />

Mathematical Description<br />

ECC relies on a group structure induced on an elliptic curve. The set of points on<br />

an elliptic curve (with one special point added, known as the point at infinity O)<br />

together with point addition as a binary operation has the structure of an abelian<br />

group, i.e., a group where the point addition is commutative. A finite field of<br />

characteristic 2 is considered, i.e., GF(2 n ). A non-supersingular elliptic curve E<br />

over GF(2 n ) is defined as the set of solutions (x,y) ∈ GF(2 n )× GF(2 n ) of the generic<br />

equation<br />

y 2 + xy = x 3 + ax 2 + b,<br />

where a,b ∈ GF(2 n ), b /= 0, together with O.<br />

Keys Generation<br />

Public <strong>and</strong> private keys are generated as follows:<br />

1. Choose a specific elliptic curve, <strong>for</strong> instance: E : y 2 ≡ x 3 + α · x + b mod p.<br />

2. Choose a primitive element α = (x α ,y α ) ∈ E.<br />

3. Pick a r<strong>and</strong>om integer a ∈ {2,3, . . . ,#E − 1}.<br />

4. Compute a · α = β = (x β ,y β ).<br />

5. The public key is then (E,p,α,β), <strong>and</strong> the private key is (a).<br />

34


2 – <strong>Security</strong><br />

Encryption<br />

The encryption algorithm executes the following steps:<br />

1. Pick a r<strong>and</strong>om k ∈ {2,3, . . . ,#E − 1}.<br />

2. Compute k · β = (c 1 ,c 2 ).<br />

3. Encrypt e E,p,α,β (x,k) = (Y 0 ,Y 1 ,Y 2 ) where Y 0 = k · α, Y 1 = (c 1 · x 1 ) mod p, <strong>and</strong><br />

Y 2 = (c 2 · x 2 ) mod p.<br />

Decryption<br />

In order to decrypt, the following steps must be per<strong>for</strong>med:<br />

1. Compute a · Y 0 = (c 1 ,c 2 ).<br />

2. Decrypt as follows: d a (Y 0 ,Y 1 ,Y 2 ) = (Y 1 · c −1<br />

1 mod p, Y 2 · c −1<br />

2 mod p) = (x 1 ,x 2 ).<br />

High-level Approach<br />

Work proposed in literature related to this kind of encryption rely on the different<br />

mathematical operations within the elliptic curve to introduce the required levels of<br />

difficulties <strong>for</strong> public-key algorithms. Several approaches utilize this encryption <strong>for</strong><br />

off-line authentication of RFID tags.<br />

One of them is presented in [124], where authors construct an elaborated algorithm<br />

to be used <strong>for</strong> authentication based on ECC. Their approach exploits, other<br />

than the ECC-based public key algorithm, a Physical Unclonable Function (PUF)<br />

that is embedded within the transponder.<br />

A PUF, as defined by the authors, is a function that has the property of being<br />

easy to evaluate but hard to characterize. That is, the amount of knowledge that an<br />

attacker can obtain from studying the responses to r<strong>and</strong>omly distributed challenges<br />

(i.e., queries) to the PUF is negligible. In addition, PUFs should be unique, i.e.<br />

responses measured on different PUFs should be, with high probability, far apart.<br />

Besides, the PUF should be inseparably linked to the chip, meaning that any attempt<br />

to remove the PUF from the chip leads to the destruction of the chip <strong>and</strong> the PUF.<br />

As a valid implementation <strong>for</strong> the PUF, authors propose the silicon PUF (SPUF)<br />

[58]. SPUFs have advantages compared to other PUF techniques because they can<br />

be constructed in silicon base materials, <strong>and</strong> thus common CMOS manufacturing<br />

processes can be exploited. SPUFs are circuits designed to be sensitive to time<br />

delays which vary across integrated circuits due to process variations in transistors<br />

<strong>and</strong> wires. There<strong>for</strong>e, even a person who has the detailed in<strong>for</strong>mation of the SPUF<br />

circuit cannot physically clone it because circuit delays depend on process variations<br />

that are, even, beyond the manufacturer’s control.<br />

The main elements in the off-line identification approach are:<br />

1. A reader <strong>and</strong> a transponder with identification I D <strong>and</strong> a PUF.<br />

35


2 – <strong>Security</strong><br />

2. A st<strong>and</strong>ard identification scheme composed by K g which is a generation key<br />

algorithm; P , an interactive protocol used by the prover (the transponder);<br />

<strong>and</strong> V , which is an interactive protocol used by the verifier (the reader).<br />

3. A secure signature mechanism (which is typically ECC-based) constituted by<br />

SK g , a generation key algorithm; S e which is the signature algorithm; <strong>and</strong> V f<br />

which is the verification algorithm.<br />

The overall identification scheme is generated in two stages, namely enrollment <strong>and</strong><br />

authentication.<br />

In the enrollment stage, SK g is conceived as master key generation algorithm<br />

MK g in order to generate a secret key msk <strong>and</strong> a public key mpk, used to sign <strong>and</strong><br />

verify respectively. K g is used as a UK g which is an algorithm that creates a public<br />

key pair (pk,sk) <strong>for</strong> each tag. A certificate, that functions as a signature, is then<br />

stored in the transponder based on pk <strong>and</strong> the signature mechanism, i.e. msk. In<br />

the authentication stage, the tag sends the certificate to the reader. If it is valid,<br />

the reader <strong>and</strong> the tag start the st<strong>and</strong>ard identification protocol. If the tag finishes<br />

the protocol the reader validates the tag correctly.<br />

This anti-counterfeiting algorithm protects effectively against cloning <strong>and</strong> <strong>for</strong>gery<br />

actions.<br />

Hardware Approaches<br />

In the following, several approaches implemented in hardware are presented.<br />

Gaubatz et al. In [59], authors offer an ECC hardware implementation addressed<br />

to highly constrained devices that may be utilized in RFIDs. Their core operates at<br />

a frequency of 500 KHz. Their architecture occupies a chip area equivalent to 18720<br />

gates using a 0.13 µm CMOS technology. They state that consumption is under<br />

400 µW in signing <strong>and</strong> encrypting messages. Furthermore, authors claim that, with<br />

their scheme, a message of less than 200 bits is encrypted in approximately 817 ms.<br />

Batina et al. Batina et al. [23] improved the implementation proposed by Gaubatz<br />

et al. in [59]. Their processor included a modular arithmetic logic unit capable of<br />

computing additions <strong>and</strong> multiplications using the same cells without having a fulllength<br />

array of multiplexers. Results are better compared to other implementations.<br />

The total amount of gates required is around 12000 in a 0.13 µm CMOS technology;<br />

consumption is less than 30 µW <strong>and</strong> message encryption is per<strong>for</strong>med in 115 ms<br />

operating at 500 KHz.<br />

36


2 – <strong>Security</strong><br />

Wolkerstorfer Wolkerstorfer developed an integrated chip that can provide good<br />

per<strong>for</strong>mance <strong>for</strong> signing messages [128]. The chip has an equivalent area of 23000<br />

gates implemented in 0.35 µm CMOS technology. It reaches the operating frequency<br />

of 68.5 MHz.<br />

Kumar - Paar The hardware implementation presented in [86] is a valid approach<br />

of an ECC processor. It is able to operate at 13.56 MHz, which is a st<strong>and</strong>ard<br />

frequency in RFIDs. The area of the chip is about 12000 gates according to the<br />

authors. They state that operating at that frequency, with a technology of 0.35 µm,<br />

their processor has a timing per<strong>for</strong>mance of about 18 ms.<br />

2.4.3 ElGamal Cryptography<br />

In [45] ElGamal presented the ElGamal encryption system <strong>and</strong> the ElGamal signature<br />

scheme. The ElGamal encryption is based on the intractability of the discrete<br />

logarithm problem <strong>and</strong> the Diffie-Hellman problem.<br />

The generalized version of this encryption scheme can work in any finite cyclic<br />

group G, but the group determines the security <strong>and</strong> efficiency of the scheme. Two<br />

right groups are:<br />

ˆ the multiplicative group Z ∗ p of integers modulo p;<br />

ˆ the group of points on an elliptic curve over finite field.<br />

The efficiency of ElGamal encryption is lower than RSA, since it requires two<br />

modular exponential operations, <strong>and</strong> since the resulting ciphertext size of an encryption<br />

is twice as the plaintext one.<br />

ElGamal scheme employs r<strong>and</strong>omization. This is a reason of the large size utilized,<br />

but it is a protection against statistical <strong>and</strong> chosen-plaintext attacks.<br />

Mathematical Description<br />

In this section the generalized version of ElGamal will be described. The problem<br />

to solve in order to break ElGamal encryption is the Diffie-Hellman problem, which<br />

is strictly related to the widely studied discrete logarithm problem, so the security<br />

of ElGamal encryption is often considered based on the second one.<br />

The generalized discrete logarithm problem is: given a finite cyclic group G of<br />

order n, a generator α of G, <strong>and</strong> an element β ∈ G, find the integer x, 0 ≤ x ≤ n−1,<br />

such α x = β.<br />

The generalized Diffie-Hellman problem is: given a finite cyclic group G, a generator<br />

α of G, <strong>and</strong> group elements α a <strong>and</strong> α b , find α ab .<br />

37


2 – <strong>Security</strong><br />

The group G satisfies the computational Diffie-Hellman assumption if no efficient<br />

algorithm can compute α ab . A stronger assumption, useful <strong>for</strong> the demonstration of<br />

security properties, is the decisional Diffie-Hellman assumption [33], that is based<br />

on the decisional Diffie-Hellman problem.<br />

The generalized decisional Diffie-Hellman problem is: given a finite cyclic group<br />

G, a generator α of G, <strong>and</strong> group elements α a <strong>and</strong> α b , distinguish α ab from α z .<br />

The group G satisfies the decisional Diffie-Hellman assumption if no efficient<br />

algorithm can distinguish α ab from α z .<br />

Keys Generation<br />

steps:<br />

Public <strong>and</strong> Private generation is per<strong>for</strong>med in the following<br />

1. Select an appropriate cyclic group G of order n, with generator α.<br />

2. Choose a r<strong>and</strong>om integer a, 1 ≤ a ≤ n − 1.<br />

3. Compute the group element α a .<br />

4. The public key is (α,α a ), together with a description of how multiply elements<br />

in G.<br />

5. The private key is a.<br />

Encryption In ElGamal encryption, message m is translated into a ciphertext c,<br />

i.e. encrypted, as follows:<br />

1. Represent m as an element of the group G.<br />

2. Select a r<strong>and</strong>om integer k, 1 ≤ k ≤ n − 1.<br />

3. Calculate γ = α k <strong>and</strong> δ = m · (α a ) k .<br />

4. The ciphertext is c =(γ,δ).<br />

Decryption<br />

Decryption in ElGamal encryption is per<strong>for</strong>med in the following way:<br />

1. Calculate m = γ −a · δ.<br />

38


2 – <strong>Security</strong><br />

Properties<br />

Some properties of ElGamal are:<br />

ˆ Semantic security: Tsiounis <strong>and</strong> Yung [122] demonstrated that the semantic<br />

security of the ElGamal encryption <strong>and</strong> the decision Diffie-Hellman assumption<br />

are equivalent, so if the decision Diffie-Hellman problem is hard over G,<br />

ElGamal encryption possesses the property of semantic security.<br />

ˆ Homomorphism: ElGamal is a homomorphism cryptosystem, since the encryption<br />

of a message is<br />

ε(m) = (α k ,m · (α a ) k ),<br />

then,<br />

ε(m 1 ) · ε(m 2 ) = (α k 1<br />

,m 1 · (α a ) k 1<br />

)(α k 2<br />

,m 2 · (α a ) k 2<br />

)<br />

= (α k 1+k 2<br />

,(m 1 · m 2 )(α a ) k 1+k 2<br />

) = ε(m 1 · m 2 mod n).<br />

ˆ Key-privacy: Bellare et al. [24] proved that the ElGamal scheme provides<br />

anonymity under chosen-plaintext attack.<br />

About the key length, In 1996 Menezes et al. [94] recommended 1024-bit or larger<br />

moduli <strong>for</strong> long-term security.<br />

High-level <strong>Protocols</strong> <strong>and</strong> Approaches<br />

Works proposed in literature related to this kind of encryption relies on the different<br />

mathematical operations within the ElGamal approach.<br />

Re-encryption In 2001, European Central Bank proposed to embed RFID tags<br />

in Euro banknotes; RFID tags in banknotes can be used like a money flow tracking<br />

mechanism <strong>and</strong> an anti-counterfeiting systems. In [79], authors consider the special<br />

problem of consumer privacy protection <strong>for</strong> RFID-powered banknotes, but their<br />

approach is potentially applicable to a generic RFID-based authentication system.<br />

Their broader protocol can employ: a generic public-key cryptosystem, that may<br />

be based on ElGamal cryptosystem [45], thanks to its readiness to encoding over<br />

elliptic curves; <strong>and</strong> a digital signature of any type, that may be based on elliptic<br />

curves, thanks to its relative good security with compact size. In this particular<br />

case, a public key P K L <strong>and</strong> a secret key SK L are generated by an appropriate law<br />

entity or agency. That pair is used to manage the privacy protection. An RFID<br />

tag, within this system, possesses a unique identification S i which is the same as the<br />

serial number assigned to the banknote. A Central Bank generates a signing key pair<br />

P K B <strong>and</strong> SK B , which are used to guarantee the authenticity of the in<strong>for</strong>mation.<br />

The Central Bank generates the signature Σ i on S i by using SK B , then the bank<br />

39


2 – <strong>Security</strong><br />

encrypts Σ i <strong>and</strong> S i by means of P K L <strong>and</strong> a r<strong>and</strong>omly value called the encryption<br />

factor r i , <strong>and</strong> thus obtaining a ciphertext C Si . Now the bank generates an access<br />

key D i by using the public hash function h. Finally the bank writes S i <strong>and</strong> Σ i on<br />

the banknote, it inserts C Si in a cell of the tag memory that is protected from the<br />

writing by the access key D i , <strong>and</strong> it inserts r i in a cell that is protected from both<br />

writing <strong>and</strong> reading by D i . Everyone can read <strong>and</strong> write the in<strong>for</strong>mation in the<br />

memory by using the data written on the banknote <strong>and</strong> h.<br />

Every merchant with an optic access to a banknote can verify its authenticity<br />

by: encrypting Σ i <strong>and</strong> S i by P K L <strong>and</strong> r i , <strong>and</strong> then checking the resulting C Si ;<br />

decrypting the signature Σ i by using P K B <strong>and</strong> checking the resulting S i .<br />

By using this system, the agency in charge of inspecting banknotes transactions<br />

can decrypt C Si , which is readable without an optic access to the banknote, because<br />

it has SK L , <strong>and</strong> compute back the original serial number C Si .<br />

In order to avoid privacy risks, authors proposed a re-encryption mechanism to<br />

be per<strong>for</strong>med periodically; hence, by using again P K L , selected users re-encrypt Σ i<br />

<strong>and</strong> S i by P K L <strong>and</strong> a new r i, ′ creating a new C Si ′ . There<strong>for</strong>e after every re-encryption<br />

the tag will emit different data, which cannot be linked to the previous ones.<br />

Authors presents a numerical sample that uses the signature scheme of Boneh,<br />

Shacham <strong>and</strong> Lynn [42] <strong>and</strong> the Fujisaki-Okamoto [51] variant on ElGamal. With<br />

a serial number size of 40 bits, the relative signature size is 154 bits, the plaintext<br />

size is 194; considering an elliptic-curve-based group of 195-bit order, the ciphertext<br />

size is 585 bits, so the required memory is 780 bits.<br />

The described scheme is based on mixnets [37]; the main difference is that in<br />

mixnet the entities per<strong>for</strong>ming re-encryption do not know the plaintext, instead<br />

in [37] plaintext, which is the serial number, is known.<br />

The described scheme allows the money tracking, <strong>and</strong> it provides a partial defense<br />

against counterfeiting <strong>and</strong> privacy violation.<br />

The cloning action is possible on every banknote in the optic <strong>and</strong> radio contact.<br />

The <strong>for</strong>gery action needs to break the signature system. A problem is that, also if<br />

it is secure, there is no possibility to change the key couple, so <strong>for</strong>gers have many<br />

years to break it. The signature is written on banknotes so, after the secret key has<br />

been unveiled, it is unchangeable <strong>and</strong> there is no more proof of the authenticity of<br />

the in<strong>for</strong>mation on all the printed banknotes.<br />

The only in<strong>for</strong>mation to hide is the serial number; all the in<strong>for</strong>mation in the tag<br />

memory, if maliciously changed, can invalid the money tracking system. The spying<br />

<strong>and</strong> tapering actions are possible only by using an optic reading, or by breaking the<br />

cryptosystem. Moreover, if the secret key has been unveiled, the couple of keys can<br />

be easily changed.<br />

In order to avoid people tracking, the ciphertext emitted by the tag is changed<br />

by the re-encryption. However it is possible to suppose that the re-encryption is executed<br />

only when there is a banknote transfer between a customer <strong>and</strong> an authorized<br />

40


2 – <strong>Security</strong><br />

entity, so the banknotes emit the same numbers <strong>for</strong> the whole time they are hold by<br />

the same person. Furthermore a person can bring a set of banknotes, so he/she is<br />

identifiable by a set of ciphertexts with periodical input <strong>and</strong> output of elements.<br />

The exchange of money between persons does not involve the re-encryption, so<br />

it could be easy detecting relation between private persons. The presence of the tag<br />

could show the presence <strong>and</strong> the approximate quantity of money. This in<strong>for</strong>mation<br />

can be very useful <strong>for</strong> merchants <strong>and</strong> thieves. Authors suggest that some additional<br />

RFID privacy systems can reduce the exposition to these threats.<br />

Universal re-encryption In [63], a modified version of the re-encryption approach<br />

exploited in mixnet [37] is presented. The main difference from re-encryption<br />

is that universal re-encryption does not need the knowledge of the public key under<br />

which a ciphertext was computed. The properties of universal re-encryption are<br />

demonstrated exploiting ElGamal cryptosystem [45], due to its security properties<br />

<strong>and</strong> its homomorphism. The required storage <strong>and</strong> computation resources are twice<br />

as st<strong>and</strong>ard ElGamal ones.<br />

The authors propose also a possible application of universal re-encryption to<br />

generic RFID tags. Like <strong>for</strong> the scheme described in the re-encryption section, some<br />

entities per<strong>for</strong>m re-encryption of the public in<strong>for</strong>mation of tags in order to avoid<br />

people tracking. Differently than the previous scheme, here various kind of entities<br />

with their couple of keys, which do not have in<strong>for</strong>mation about the other entities<br />

<strong>and</strong> about the key previously used on a tag, can re-encrypt the output of the tag by<br />

using their own public key.<br />

The universal re-encryption offers the opportunity to extend the RFID re-encryption<br />

protection privacy system to all RFID tags, but authors do not go in deep about<br />

practical implementation problems.<br />

Saito et al. [112] examine the special problem of the malicious modification of<br />

the in<strong>for</strong>mation in the tag memory; they found two dangerous attacks <strong>and</strong> they<br />

propose two protection schemes. Both the attacks exploit an encryption with special<br />

parameters, that avoid a correct privacy re-encryption, in order to make the tag<br />

traceable.<br />

The first proposed scheme is “the re-encryption protocol with check”. In this<br />

protocol, when a reader writes a ciphertext on a tag, the tag must check if the ciphertext<br />

is correctly re-encryptable, <strong>and</strong> so it can avoid malicious ciphertext. The<br />

second proposed scheme is the “re-encryption protocol using a one-time pad”. In<br />

this protocol the tag re-encrypts the ciphertext by using a one-time pad, which is<br />

written <strong>and</strong> updated by an authorized reader <strong>and</strong> is stored in the tag memory. The<br />

re-encryption computational work is devised between the generation <strong>and</strong> the application<br />

of the one-time pad. Authorized readers need a key, stored in a database, in<br />

order to update the one-time pad, <strong>and</strong> so to determine the next emitted ciphertexts.<br />

41


2 – <strong>Security</strong><br />

The first protocol protects only against two specific attacks, instead the second<br />

brings a higher protection, by allowing only authorized access, but it limits<br />

strictly the universality of the updating operation, that is the core of the universal<br />

re-encryption. Both the protocols require tags with computation capacity <strong>and</strong><br />

storage memory, but they are not quantified. In absence of an efficient physical<br />

implementation, these protocols look too expensive <strong>for</strong> low cost RFID tags.<br />

The universal re-encryption owns some good properties, but it presents also some<br />

gaps that must be still managed. The scheme does not provide protection against<br />

cloning, <strong>for</strong>gery <strong>and</strong> tampering actions. It provides protection only against spying<br />

<strong>and</strong> tracking actions, but a malicious re-encryption can make the tracking possible.<br />

Insubvertible Encryption The scope of the insubvertible encryption [17] is to<br />

solve the security problems of the universal re-encryption, which is based on ElGamal<br />

encryption.<br />

Like explained be<strong>for</strong>e in this section, with universal re-encryption a malicious reencryption<br />

can make the RFID tag traceable. The insubvertible encryption consists<br />

of a certificate attached to an ElGamal encryption. A valid encryption requires the<br />

use of the correct certificate. The ciphertext can be r<strong>and</strong>omized by everyone, but the<br />

entity that per<strong>for</strong>ms the re-encryption can identify if the ciphertext is safe. A cypher<br />

text can not became back untraceable, but the re-encryption entity can delete the<br />

ciphertext <strong>and</strong> write a new untraceable ciphertext that is without meaning.<br />

The privacy protection of the presented cryptographic primitive is based on three<br />

properties:<br />

ˆ This scheme inherits semantic security from ElGamal.<br />

ˆ The certificate is an extension of the signature proposed by Camenisch an<br />

Lysyanskaya [35], which depends on LRSW assumption [92], so the certificates<br />

are un<strong>for</strong>geable.<br />

ˆ The scheme provides key privacy.<br />

The described scheme is a good evolution of universal re-encryption, in fact some<br />

security problems are solved.<br />

The cloning action is possible, in order to avoid it additional protection systems<br />

are required. The <strong>for</strong>gery action needs to break the certificate system.<br />

The spying is not possible, since to get the encrypted in<strong>for</strong>mation needs to break<br />

the cryptosystem, which is based on ElGamal. The scheme is tamper-evident, but<br />

not tamper-resistant; at the first re-encryption the tampering will be detected, but<br />

the previous data are lost. However the tamper-evidence is limited, since the insertion<br />

of safe data, e.g. copied from another tag, is not detectable.<br />

42


2 – <strong>Security</strong><br />

The re-encryption, which can be per<strong>for</strong>med by everyone, can potentially limit the<br />

tracking to short path, but it requires the presence of several re-encryption entities.<br />

Perhaps the evaluation of mobile re-encryption tools could be interesting.<br />

The extension of the system to many kind of commodities, <strong>and</strong> the spying resistance,<br />

protect people against the malicious identification of their personal belongings.<br />

2.4.4 NTRU Cryptography<br />

NTRU is a cryptosystem that is, apparently, highly efficient <strong>and</strong> appropriate <strong>for</strong><br />

embedded applications such as smart cards or RFID tags. While it has not been<br />

profoundly tested in order to establish its resistance to cryptographic attacks, there<br />

is theoretical evidence of its efficiency that claims that its provided level of security<br />

is comparable to RSA scheme’s [69] [70].<br />

Mathematical Description<br />

NTRU is based on arithmetic in a polynomial ring<br />

R = Z(x)/((x N − 1),q)<br />

defined by the parameters set (N,p,q) that presents the following properties:<br />

ˆ All elements of the ring are polynomials of degree at most N - 1, where N is<br />

prime.<br />

ˆ Polynomial coefficients are reduced either mod p or mod q, where p <strong>and</strong> q are<br />

relatively prime integers or polynomials.<br />

ˆ p is considerably smaller than q, which lies between N/2 <strong>and</strong> N.<br />

ˆ All polynomials are univariable over the variable x.<br />

The main operation inside the ring is the multiplication which is commonly<br />

represented with the asterisk ⊛. It can be best described as the discrete convolution<br />

product of two vectors, where the coefficients of the polynomials <strong>for</strong>m vectors as<br />

follows.<br />

a(x) = a 0 + a 1 x + a 2 x 2 + · · · + a N−1 x N−1 = (a 0 ,a 1 , . . . ,a N−1 )<br />

b(x) = (b 0 ,b 1 ,b 2 , . . . ,b N−1 )<br />

c(x) = (c 0 ,c 1 ,c 2 , . . . ,c N−1 )<br />

43


2 – <strong>Security</strong><br />

Then the coefficients c k of c(x) = a(x) ⊛ b(x) mod q,p are each computed as<br />

c k =<br />

∑<br />

i+j=k mod N<br />

a i b j .<br />

The modulus of reduction of each coefficient c k of the resulting polynomial is<br />

either q <strong>for</strong> Key Generation <strong>and</strong> Encryption, or p <strong>for</strong> Decryption.<br />

Keys Generation<br />

should be executed:<br />

In order to generate the private key f(x) the following steps<br />

1. Choose a r<strong>and</strong>om polynomial F (x) from the ring R. F (x) should have binary<br />

or ternary coefficients.<br />

2. Construct f(x) = 1 + pF (x)<br />

On the other h<strong>and</strong>, the public key h(x) should be derived from f(x) in the following<br />

way:<br />

1. Choose a r<strong>and</strong>om polynomial g(x) from the ring R.<br />

2. Calculate the inverse f −1 (x) mod q.<br />

3. Calculate h(x) = g(x) ⊛ f −1 mod q.<br />

Encryption<br />

In a NTRU cryptosystem, encryption is per<strong>for</strong>med as follows:<br />

1. Encode plaintext message into a polynomial m(x) with coefficients from either<br />

0,1 (binary) or -1,0,1 (ternary).<br />

2. Choose a r<strong>and</strong>om polynomial φ(x) from ring R.<br />

3. Compute ciphertext polynomial c(x) = pφ(x) ⊛ h(x) + m(x) mod q.<br />

Decryption<br />

following way:<br />

In opposition to the encryption, the decryption is per<strong>for</strong>med in the<br />

1. Use the private key f(x) to compute the message polynomial m ′ (x) = c(x) ⊛<br />

f(x) mod q.<br />

2. Map the coefficients of the message polynomial to plaintext bits.<br />

44


2 – <strong>Security</strong><br />

Hardware Approach<br />

A good hardware implementation of NTRU cryptosystem is found in [59]. Authors<br />

employed a small number of gates that may be suitable <strong>for</strong> RFID constrained<br />

schemes. Their approach is contained in just 3000 gates with a consumption of<br />

about 20 µW. The operating frequency is 500 KHz, which is enough <strong>for</strong> most of<br />

RFID applications. According to the authors, operations such as encryption or verification<br />

are per<strong>for</strong>med in about 58 ms, while decryption is calculated to be executed<br />

in about 117 ms <strong>and</strong> messages are signed in 234 ms.<br />

2.4.5 Approaches Discussion <strong>and</strong> Conclusions<br />

Most of the algorithms covered so far have been implemented in hardware <strong>for</strong> RFIDs<br />

or other constrained devices. In this section, these solutions are summarized <strong>and</strong><br />

compared according to their per<strong>for</strong>mance <strong>and</strong> feasibility.<br />

Tables 2.7 <strong>and</strong> 2.8 summarize all hardware approaches reviewed in this section.<br />

While it is not easy to have concrete conclusions by analyzing these hardware approaches,<br />

they provide a good underst<strong>and</strong>ing of state-of-the-art solutions to public<br />

key problems in RFIDs.<br />

Table 2.7.<br />

ECC hardware approaches<br />

ECC<br />

Gaubatz Batina Wolkerstorfer Kumar-Paar<br />

et al. [59] et al. [23] [128] [86]<br />

Gates 18720 12000 23000 12000<br />

CMOS Tech. 0.13 µm 0.13 µm 0.35 µm 0.35 µm<br />

Frequency 500 kHz 500 kHz 68.5 MHz 13.5 MHz<br />

Power(Avg.) ∼394 µW ∼30 µW not available not available<br />

Time Per<strong>for</strong>mance ∼817 ms 115 ms not available ∼18 ms<br />

As stated be<strong>for</strong>e, asymmetric encryption may provide the advantages to RFID<br />

security that symmetric encryption lacks. However, as in classical asymmetric approaches,<br />

those advantages have costs which are commonly related to higher computational<br />

requirements. This seems evident by observing, <strong>for</strong> instance, the expected<br />

dimension or the power consumption of the presented approaches.<br />

45


2 – <strong>Security</strong><br />

Table 2.8.<br />

RSA <strong>and</strong> NTRU hardware approaches<br />

RSA<br />

NTRU<br />

Bernardi et al. [29] Gaubatz et al. [59]<br />

Gates not available 3000<br />

CMOS Tech. 90 nm not available<br />

Frequency 1.9 MHz 500 kHz<br />

Power(Avg.) ∼1600 µW ∼20 µW<br />

Time Per<strong>for</strong>mance ∼540 ms ∼234 ms<br />

Nevertheless, according to the estimates of the algorithms <strong>and</strong> hardware approaches<br />

shown, it is feasible to conceive public key encryption as a real possibility<br />

in RFID systems because they have acceptable limitations <strong>and</strong> are sufficiently fast.<br />

In Tables 2.9 <strong>and</strong> 2.10 a comparison of high level protocols is shown.<br />

Table 2.9. High-level <strong>Protocols</strong> (1)<br />

Anti-counterfeiting encryption [28] Re-encryption [79]<br />

Cloning Possible Possible<br />

Forgery Not Possible Not Possible<br />

Spying Possible Only with optic reading<br />

Tampering Tamper-resistant Only with optic reading<br />

Tracking Possible Limited<br />

Set tracking Possible Possible<br />

Set relation Possible Possible<br />

Belongings monitoring Possible Only money presence<br />

Anti-counterfeiting with Off-line Encryption [28] <strong>and</strong> Universal re-encryption [63]<br />

seem to be weak protocols, because they have no protection against many threats.<br />

They are specific protocols that try to solve only some problems <strong>and</strong> that need to<br />

work together with other schemes. From the privacy point of view the best analyzed<br />

scheme is the Insubvertible Encryption [17], that provides protection against all the<br />

privacy threats.<br />

46


2 – <strong>Security</strong><br />

Table 2.10. High-level <strong>Protocols</strong> (2)<br />

Universal re-encryption [63] Insubvertible encryption [17]<br />

Cloning Possible Possible<br />

Forgery Possible Not Possible<br />

Spying Not Possible Not Possible<br />

Tampering Possible Partly tamper-evident<br />

Tracking Possible through tampering Short paths<br />

Set tracking Possible through tampering Short paths<br />

Set relation Possible through tampering Not possible<br />

Belongings monitoring Not Possible Not Possible<br />

Public key cryptography represents a great opportunity of security improvement,<br />

both through hardware implementations <strong>and</strong> high-level protocols. In this section<br />

relevant novelties about the application of public key cryptography to RFID context<br />

were described; the strength <strong>and</strong> weakness points of the described approaches were<br />

highlighted.<br />

2.5 RFID Tags without cryptographic capability<br />

This section presents security approaches based on RFID tags without cryptographic<br />

capability.<br />

2.5.1 An Anti-Counterfeit Mechanism <strong>for</strong> the Application<br />

Layer in Low-Cost RFID Devices<br />

An always increasing number of RFID tags <strong>and</strong> readers are available in commerce<br />

nowadays. RFID trends indicate that this technology will become ubiquitous in<br />

the near future allowing a large number of applications to seize its advantages. At<br />

the present time, automatic payment <strong>and</strong> access control applications are exploiting<br />

RFID benefits. Another extended area of application <strong>for</strong> RFID tags is the supervision<br />

of stock <strong>and</strong> inventories in shops <strong>and</strong> warehouses. This technology has also<br />

shown to be useful in goods tracing <strong>and</strong> tracking, <strong>and</strong> there<strong>for</strong>e, it is suitable <strong>for</strong><br />

supply chain management. As a matter of fact, RFID technology seems appropriate<br />

<strong>for</strong> complying with EC regulation No. 178/2002, which establishes the policy <strong>for</strong><br />

food supply chain st<strong>and</strong>ardization in Europe, in particular <strong>for</strong> the traceability requirements<br />

[4]. Recently, in the United States, the Food <strong>and</strong> Drug Administration<br />

(FDA) called <strong>for</strong> the pharmaceutical industry to apply RFID tags to pallets <strong>and</strong><br />

47


2 – <strong>Security</strong><br />

cases, with the aim of combating counterfeit pharmaceuticals [2]<br />

Broadly, RFID tag recognition is made by simply reading its unique identification<br />

number. RFID tags response to reader interrogations without alerting its<br />

bearer, thus causing potential privacy risks. On the other h<strong>and</strong>, counterfeit hazards<br />

take place when RFID-tagged items validation lacks of a proper authentication<br />

mechanism. In general, a large number of security threats may arise within an RFID<br />

system [57, 77].<br />

Customer privacy issues have overshadowed authentication concerns in RFID<br />

research. However, proper tag authentication is an essential keystone <strong>for</strong> guaranteeing<br />

genuine identification. Loosely speaking, RFID authentication diminishes the<br />

problem of readers harvesting in<strong>for</strong>mation from counterfeit tags. Some proposals<br />

that addressed this topic [44,48], require the tag to have cryptographic capabilities.<br />

This section analyses <strong>and</strong> proposes an authentication algorithm that has no need<br />

of complex computational resources in the RFID tag, i.e. it can be implemented with<br />

low-cost tags. The proposed algorithm requires the tag to have user memory, which<br />

is a requirement that can be followed using existing technology. Our algorithm,<br />

based on a public/private key scheme, can be used to check original bottles in a<br />

high-priced wine production environment. The basic idea is to use the private key<br />

to encode the RFID unique identifier in the RFID memory, in order to allow the<br />

final user to verify the bottle by means of the public key. The anti-counterfeit<br />

mechanism may be constructed exploiting such an authentication procedure, thus,<br />

a worthy application can be developed.<br />

Adopted Approach<br />

Our tag authentication algorithm, an anti-counterfeit approach is described in the<br />

following. It targets basic tags with memory, which enhances its chances of being<br />

applicable at the present time. It is supported exclusively on the application<br />

layer of the RFID communication model, hence it avoids modifying the tag architecture.<br />

It exploits one-way asymmetric authentication theory based on public key<br />

cryptographic, <strong>and</strong>, as a result, database access is not m<strong>and</strong>atory.<br />

General Architecture The system under consideration is a typical high quality<br />

agricultural product, like a high quality wine with a limited production, which may<br />

be counterfeited by a fraudulent organization. The technological system available<br />

<strong>for</strong> the wine producer is normally based on a low cost computer system. We can<br />

assume that one or few Personal Digital Assistant (PDA) equipments are available<br />

at the producer side. The RFID technology is adopted <strong>for</strong> a twofold goal: its<br />

memory can be exploited to store a cipher code, but also it may allow increasing<br />

the in<strong>for</strong>mation given to the customers. The general architecture is described in<br />

Fig. 2.4. The system can be described considering the two separated entities: the<br />

48


2 – <strong>Security</strong><br />

Figure 2.4.<br />

General anti-counterfeit architecture<br />

49


2 – <strong>Security</strong><br />

producer <strong>and</strong> the user. The producer (in our application we consider a farm winery<br />

with a limited high quality grape <strong>and</strong> wine production) during the bottling phase<br />

put an authentication code according to the cryptographic algorithm described in<br />

the following subsection. The whole security is hold within the device that computes<br />

the encrypted code. There is a potential risk that a PDA containing the secret key<br />

is temporarily stolen. An additional layer of protection is then required. The secret<br />

key is maintained reserved in a golden sample bottle. The authentication phase can<br />

be divided in two steps, as shown in Fig. 2.4:<br />

ˆ in the first, the system manager reads the secret key from the golden sample<br />

bottle; this key can be used to produce the code <strong>for</strong> a limited <strong>and</strong> defined<br />

number of bottles according to the kind of wine;<br />

ˆ then, each bottle is encoded by means of the same PDA. The bottling phase<br />

requires that the encoding step does not introduce a negligible time overhead.<br />

Whenever the set of bottles is processed, the secret primary key, temporarily<br />

stored into the PDA internal memory, is automatically deleted.<br />

The user, that may be a wine cellar or a wine library or a restaurant, needs<br />

to check if the considered bottle is an original or a counterfeited one. The system<br />

requires a low cost interface in order to be widely distributed to all the possible<br />

consumers that sell the product. So, the computing system could be a simple PDA<br />

reader that applies the cryptographic algorithm described below. The check procedure<br />

has to guarantee a fast authentication step.<br />

Figure 2.5.<br />

Signature generation <strong>and</strong> authentication algorithms<br />

50


2 – <strong>Security</strong><br />

Cryptographic Algorithm<br />

The adopted cryptographic algorithm is introduced in Fig. 2.5. The algorithm is<br />

divided in a generation <strong>and</strong> in an authentication part. Both sections are meant to be<br />

executed by an RFID reader, on the producer <strong>and</strong> on the user side. The generation<br />

branch considers the signature construction <strong>and</strong> subsequent saving into the tag. The<br />

authentication section examines the algorithm that has to be per<strong>for</strong>med by the user<br />

in order to verify tag’s authenticity.<br />

Tag signature generation is done by means of ciphering the unique identification<br />

number ID of the tag. First, ID is read from the tag. Subsequently, using the ciphering<br />

function related to the secret key D K0 , the identification number is ciphered<br />

into a ciphered identification number CID which is saved into the tag’s free user<br />

memory. Memory occupied by CID is locked.<br />

Any user in possession of the public function EKo, is able to per<strong>for</strong>m tag authentication.<br />

Initially, ID <strong>and</strong> CID are read from the tag’s memory. Afterwards, the<br />

deciphering public function is applied to CID to compute PID. By comparing PID<br />

<strong>and</strong> ID, it is possible to authenticate the tag.<br />

Secret <strong>and</strong> public keys are generated by means of the RSA algorithm [110] as<br />

follows. Two large prime numbers n <strong>and</strong> p are chosen. The number of elements<br />

q in GF(q) is computed by multiplying n <strong>and</strong> p. A r<strong>and</strong>om value E, relatively<br />

prime to (n − 1)(p − 1), is picked. Subsequently, the number D is calculated D =<br />

[k(n−1)(p−1)+1]/E, with k chosen in order to make D an integer number. Private<br />

algorithm is defined as<br />

<strong>and</strong> the public algorithm as<br />

D K0 (P ) = P D mod q = C, (2.1)<br />

E K0 (C) = C E mod q = P. (2.2)<br />

The security level of our system depends on the size of q. If q is a number<br />

slightly less than 2 b , all quantities involved in the system may be represented as b<br />

bit numbers. Exponentiation operations, used <strong>for</strong> ciphering or deciphering, takes at<br />

most 2 b multiplications, while logarithmic operations, used <strong>for</strong> attacking attempts,<br />

require 2 b /2. There<strong>for</strong>e, the number of operations required to discover the secret<br />

key grows exponentially with b.<br />

While enlarging q improves system security, it also places constraints within computational<br />

time. The time required to calculate ciphering <strong>and</strong> deciphering functions<br />

is augmented mainly because the size of the numeric values involved in the computation.<br />

A reasonable value <strong>for</strong> q should be on the order of 2 1 024, i.e. b equals to<br />

1024. Considering that regular bit length <strong>for</strong> numerical values is, at most, 64 bits<br />

51


2 – <strong>Security</strong><br />

in a computing system, appropriate algorithms should be used to manage 1024 bits<br />

or bigger values.<br />

Case Study<br />

Our algorithm has been implemented as an anti-counterfeit mechanism in a prototypical<br />

application developed in cooperation with a wine farm, in order to evaluate<br />

its feasibility <strong>and</strong> per<strong>for</strong>mance.<br />

With our application an explicit anti-counterfeit solution was required to offer to<br />

the final consumer as a proof of originality. The final product (i.e. a valuable bottle<br />

of wine, with an estimated price higher than 50 US Dollars) is high-priced enough<br />

to eventually allow extra costs due to the technological overhead introduced by the<br />

whole RFID system (i.e. tag, reader, <strong>and</strong> cryptographic system). The product<br />

shape permits a suitable disposition of the RFID inlay behind the regular bottle<br />

label, without any particular problem caused by the interference due to the materials<br />

(glass <strong>and</strong> wine).<br />

The computing resources are divided into hardware <strong>and</strong> software resources.<br />

As far as the hardware resources are considered, we used the following ones:<br />

ˆ RFID tag: the LRI512 passive tag from STMicroelectronics has been adopted.<br />

This tag is fully compliant with ISO15693 st<strong>and</strong>ard, its nominal carrier frequency<br />

is 13.56 MHz with a user memory EEPROM with 512 bits. The baud<br />

rate from tag to the reader is 6.62 Kbit/s or 26.48 Kbit/s.<br />

ˆ RFID reader: Socket Reader Card 6E from Socket <strong>Communications</strong>, Inc. compliant<br />

with ISO15693 st<strong>and</strong>ard with a nominal carrier frequency, 13.56 MHz,<br />

<strong>and</strong> 10% or 100% amplitude shift keying (ASK) modulation. The baud rate<br />

from reader to tag is 1.65 Kbit/s or 26.48 Kbit/s.<br />

ˆ Computing system: PDA with a 624 MHz Intel PXA270 processor.<br />

Software resources comprise:<br />

ˆ RFID reader interface library: Windows CE dynamic link library (DLL) provided<br />

by Socket <strong>Communications</strong>, Inc.<br />

ˆ Development environment: Visual Studio .NET 2005 from Microsoft Corp.<br />

Encryption/decryption keys’ length was chosen of 512 bit. There<strong>for</strong>e, the whole<br />

free user memory available in the tag is used to store the authentication code, thus<br />

resigning other kind of wine in<strong>for</strong>mation.<br />

While generating a public/private key pair may require a large amount of time,<br />

our decryption algorithm is completed in 130 ms. Within our case study, tag authentication<br />

is completely carried out in 460 ms, including decryption procedure <strong>and</strong><br />

52


2 – <strong>Security</strong><br />

tag memory reading. This ensures that the time overhead is negligible in the user<br />

side when authentication takes place.<br />

On the other h<strong>and</strong>, from the producer point of view, encryption needs on the<br />

order of 3500 ms to be concluded. We employ 3800 ms to entirely generate <strong>and</strong> write<br />

the signature into the tag. Although we believe that algorithm optimization may<br />

help reducing encryption time, we did not attempt to improve it since it was not part<br />

of this section’s objectives. However, we consider that valuable wine production rates<br />

are extremely low, so it is reasonable to think that time expenses introduced by the<br />

current encryption algorithm in the signature generation procedure are insignificant<br />

<strong>for</strong> the overall production chain.<br />

Conclusions<br />

RFID is a widely adopted identification technology. Our proposal is to use RFIDs to<br />

implement an anti-counterfeit mechanism in selected wine production environments.<br />

Our algorithm requires the tag to have user memory, which is a consideration that<br />

can be followed using existing technology. The proposed algorithm, based on a<br />

public/private key system, can be used to check original bottles. The basic idea is<br />

to use the private key to encode the RFID unique identifier in the RFID memory,<br />

in order to allow the final user to verify the bottle by means of the public key.<br />

Our implementation is in testing phase in a typical wine farm with a low technology<br />

environment in Piedmont (Italy). Even if the proposed algorithm does not<br />

completely solve the problem – in an extreme case it is always possible to change<br />

the wine in the bottle -, it is simple <strong>and</strong> cheap. It is particularly suited <strong>for</strong> little<br />

cellars who want to allow final user to verify authenticity of the product. From this<br />

point of view, it is useful also to improve confidence in casual buyers.<br />

2.5.2 Traceability with Privacy Protection<br />

Agri-food companies often apply simple systems, based on paper documents. Some<br />

systems exploit barcode to identify commodities: by using the identification number<br />

in the barcode, it is possible to find, in the company database, the in<strong>for</strong>mation about<br />

the food. Today new opportunities <strong>for</strong> the food traceability come from the Radio<br />

Frequency Identification (RFID) technology.<br />

RFID is widely adopted as a contactless identification technology. A typical<br />

RFID system is made up of: a reader, which creates an electromagnetic field, <strong>and</strong><br />

some passive tags without an own voltage supply. They can be read only if they<br />

are in the interrogation zone of a reader which supplies the power required through<br />

a coupling unit. Today, the size of the RFID tag memory allows recording directly<br />

on every commodity all useful in<strong>for</strong>mation <strong>for</strong> the competent authorities to trace it.<br />

53


2 – <strong>Security</strong><br />

This section proposes a system which allows competent authorities to manage<br />

alimentary traceability, preventing new privacy problems. In this system food business<br />

operators shall record on the RFID tag in<strong>for</strong>mation on their treatments, in<br />

compliance with one precise outline. The present size of the tag memory allows<br />

using the whole memory <strong>for</strong> traceability, or leaving a part <strong>for</strong> other independent<br />

aims, such as anti-counterfeit or marketing. Stored data will be protected using<br />

the public-key cryptography: every operator will record its treatments <strong>and</strong> only the<br />

competent authorities, using private-keys, will be able to decrypt the in<strong>for</strong>mation. In<br />

this way, by means of the resulting ubiquitous data system, authorities could immediately<br />

access in<strong>for</strong>mation on alimentary commodities under examination. The use<br />

of encryption allows protecting the memory area of the traceability system, without<br />

blocking the memory; it is, moreover, possible to use additional privacy protection<br />

systems, in order to ensure the privacy of the whole tag. To improve the security<br />

level we propose two different algorithms suitable <strong>for</strong> different situations:<br />

ˆ Nested Cryptography Algorithm (NCA), that uses encapsulated ciphertexts<br />

in order to enhance the security optimizing memory occupation;<br />

ˆ Authenticating Cryptography Algorithm (ACA), that proves the authenticity<br />

of in<strong>for</strong>mation.<br />

General Architecture<br />

At the present time, in order to find the operators that treated a commodity, the<br />

authorities have to follow a trail of breadcrumbs. They find the first operator <strong>and</strong><br />

then they have to trace back, step by step, in order to detect any other.<br />

In order to make easier authorities’ work, we propose to create a ubiquitous<br />

tracking database, by labeling the alimentary commodities with an RFID tag. Every<br />

operator of the chain controls a part of the tag memory (memory slot) <strong>and</strong> it has<br />

to record its own data <strong>and</strong> its treatments in<strong>for</strong>mation on it. In this way all the<br />

traceability in<strong>for</strong>mation are immediately available to the competent authorities.<br />

The tag memory is divided, at logic level, in a sufficient number of areas, to<br />

allow a sufficient number of operators to write. On the other h<strong>and</strong>, the size of a<br />

memory slot, that corresponds to the Maximum Allowed In<strong>for</strong>mation Size (MAIS)<br />

of each operator, must be large enough to store all its data. An accurate template<br />

is needed to streamline the use of the memory space. In way of employing a smaller<br />

memory area than using strings of characters, in<strong>for</strong>mation must be translated in<br />

numerical codes. The use of codes to implement the traceability is under study also<br />

by EAN [7]. Codes have to identify operators, their geographic zone, their sector,<br />

the kind of commodity <strong>and</strong> the executed treatment types. The competent authority<br />

will fill in a reference table <strong>for</strong> any kind of code:<br />

54


2 – <strong>Security</strong><br />

ˆ identification codes (IDC) reference tables; a group of three tables that identifies<br />

the operator:<br />

– geographic code (GC) reference table; the first part of the code identifies<br />

the country, the second the region, <strong>and</strong> the last the municipality; the<br />

authorities, by using this code, can immediately identify the origin of a<br />

commodity;<br />

– sector code (SC) reference table; the sector code defines the kind of operator,<br />

e.g. “farmer” or “distributor”;<br />

– operator identification (OID) reference table; this code identifies the single<br />

operator;<br />

ˆ commodity code (CC) reference table; this code identifies the kind of commodity;<br />

it is useful when a food is made by different elements;<br />

ˆ treatment code (TC) reference tables; in every sector a table holds the list of<br />

the relevant operations, <strong>and</strong> their codes.<br />

An operator must also write the IDC of its supplier, in order to enhance system<br />

reliability against frauds.<br />

In the agri-food chain the commodity follows different steps. Initially the producer<br />

stores its data into the first memory slot. Step by step each operator adds its<br />

data. The following situation may modify the initial product:<br />

ˆ Simple treatment; the operator adds its data at the bottom of previous in<strong>for</strong>mation.<br />

ˆ Merge of commodities; if the number of available memory slots is enough,<br />

the operator copies the in<strong>for</strong>mation of all the old tags in the new one. If<br />

in<strong>for</strong>mation regarding the commodities would overfill the memory, it writes<br />

only a summary, including: a header (the summary special area identifier<br />

flag) <strong>and</strong> the identification codes of suppliers that matched to commodity<br />

codes. Then the operator adds its data at the bottom of previous in<strong>for</strong>mation.<br />

ˆ Partition of a commodity; the operator adds its data at the bottom of previous<br />

in<strong>for</strong>mation, <strong>and</strong> it tags all the new commodities.<br />

Operators must put in database the data contained in all tags, in order to be<br />

able to prove, in case of an authorities’ inspection, their propriety.<br />

55


2 – <strong>Security</strong><br />

Privacy Protection System<br />

We elaborated two cryptographic algorithms, adapted to different contexts. Both<br />

the algorithms are based on RSA algorithm. The two algorithms are presented<br />

in sections 2.5.2 <strong>and</strong> 3.4. Periodically the competent authorities establish a set of<br />

Authority Public Keys (APuKs) <strong>and</strong> Authority Private Keys (APrKs) with different<br />

lengths, <strong>and</strong> distribute public key set to all operators. For the common part of the<br />

algorithms, every operator encrypts a plaintext, by using one of the authority public<br />

keys, <strong>and</strong> it writes the resulting ciphertext in the appropriate memory area. The<br />

authorities can decrypt the ciphertext by using the private keys coupled to the<br />

public keys used by the operator. By changing private <strong>and</strong> public keys periodically,<br />

authorities can increase security; in fact, an unauthorized entity which finds some<br />

private keys could use them <strong>for</strong> a short period of time while authorities can decrypt<br />

old <strong>and</strong> new ciphertexts.<br />

Figure 2.6.<br />

NCA<br />

56


2 – <strong>Security</strong><br />

Nested Cryptographic Algorithm (NCA)<br />

This system uses pairs of APuK <strong>and</strong> APrK of different length. To underst<strong>and</strong> the<br />

benefit of using different key lengths, it is important to remember that enhancing<br />

the length of the keys increases security <strong>and</strong> ciphertext size. Each operator uses<br />

a particular APuK depending on its position in the chronological sequence of the<br />

production chain (increasing numbers, e.g., 1 <strong>for</strong> the farmer, <strong>and</strong> so on). The MAIS<br />

is the same <strong>for</strong> all operators. The tag memory is, at logical level, divided in slots<br />

with this size. The description of this algorithm is shown in the Fig. 2.6.<br />

The first operator has the shortest key, the length of its key is equal to the MAIS.<br />

Its in<strong>for</strong>mation is encrypted by the first APuK, <strong>and</strong> the relative ciphertext is written<br />

in the first memory slot.<br />

The length of any operator APuK is equal to the MAIS multiplied by the number<br />

of the operator position in the chain. All operators, subsequent to the first one,<br />

compose their plaintext adding their in<strong>for</strong>mation to the bottom of the previous<br />

ciphertext. After the encryption, operators write the new ciphertext in the first<br />

part of the memory tag, occupying a number of memory slots equal to the operator<br />

position. The last operator, theoretically the retailer, uses always the last <strong>and</strong><br />

longest key. Its ciphertext occupies all the memory slots.<br />

At each chain ring the security grows. In the first part of the chain there is<br />

not a high security, the privacy of customers is not in danger, but the protection of<br />

in<strong>for</strong>mation on the first businesses is low. Instead, out of the production chain, the<br />

security is to the maximum level.<br />

Authorities decrypt, one by one, all the ciphertexts by using the correct private<br />

key.<br />

Figure 2.7.<br />

ACA<br />

57


2 – <strong>Security</strong><br />

Authenticating Cryptographic Algorithm (ACA)<br />

In this system, there is only one APuK <strong>and</strong> one APrK. The memory slot size <strong>and</strong>,<br />

consequently the MAIS, is the same <strong>for</strong> all operators. The scope of this system is to<br />

ensure also the authenticity of the message. Periodically every operator establishes<br />

its own Operator Private Key (OPrK) <strong>and</strong> Operator Public Key (OPuK), <strong>and</strong> sends<br />

the OPuK to the authority. The pair of keys of the operator is used to prove the<br />

authenticity of the message. The description of this algorithm is shown in the<br />

Fig. 2.7.<br />

The first step <strong>for</strong> operators is to translate their data by their OPrK. Since the<br />

OPrK is secret, only the authentic operator can write the cipherdata which can be<br />

decrypted by using its OPuK.<br />

Every operator subsequent to the first erases the memory slot that contains the<br />

IDC of the previous operator.<br />

Each operator encrypts its cipherdata <strong>and</strong> writes the resulting ciphertext in the<br />

first free memory slot, which contained the previous operator IDC.<br />

The last step of every operator is to encrypt its IDC by using the APuK, <strong>and</strong> to<br />

write the resulting text in the first subsequent free memory slot.<br />

Authorities decrypt the last used memory slot by using the APrK. In this slot<br />

there is the IDC of the last operator. The previous slot is decrypted by using the<br />

APrK <strong>and</strong> then by using the OPuK that is related to the IDC. Since all operators<br />

write the IDC of its supplier, authorities know what OPuK is correct to decrypt the<br />

previous memory slot.<br />

This system protects from frauds by proving the message originality. The security<br />

level depends on the memory slot size.<br />

Table 2.11. Memory Slot<br />

Name Code Bytes<br />

Geographic code - nation GC1 1<br />

Geographic code - region GC2 1<br />

Geographic code - city GC3 2<br />

Sector code SC 2<br />

Operator identification OID 2<br />

Commodity code CC 2<br />

Number of treatments NoT 1<br />

Treatment code – first one 1st TC 7<br />

Treatment code – nth one Nth TC 7<br />

Supplier IDC SIDC 8<br />

58


2 – <strong>Security</strong><br />

Figure 2.8.<br />

PDA Encryption/Decryption Time<br />

Figure 2.9.<br />

PC Encryption/Decryption Time<br />

Experimental Results<br />

We experimentally evaluated the proposed technique implementing a prototype. Initially<br />

we filled out part of the code reference tables, sufficient to test the system. The<br />

simulation allowed knowing the per<strong>for</strong>mance time of the system <strong>and</strong> the differences<br />

among the cryptography algorithms.<br />

To put into operation the system, the authorities need an RFID reader <strong>for</strong> mobile<br />

devices <strong>and</strong> a PDA with the reading software. The agri-food operators need an RFID<br />

reader to write on the tag. A small reader <strong>for</strong> mobile devices <strong>and</strong> a PDA with the<br />

writing software is enough as well. To increase the efficiency it is possible to use<br />

PCs with appropriate readers, instead. We used the following resources:<br />

ˆ RFID tag: SRIX4K from STMicroelectronics, passive tag, compliant with<br />

ISO14443, frequency 13,56 MHz, EEPROM with 4 kbits.<br />

ˆ RFID reader: ACG Dual ISO CF Card Reader Module from ACG, compliant<br />

with ISO14443, frequency 13,56 MHz.<br />

59


2 – <strong>Security</strong><br />

ˆ Computing system: PDA with a 624 MHz Intel PXA270 processor.<br />

In the simulation we use the whole memory, of 4096 bits, <strong>for</strong> the traceability<br />

system.<br />

Table 2.11 shows the composition of the data in a memory slot. The first 10 bytes<br />

identify the commodity <strong>and</strong> the operator, the subsequent byte shows the number of<br />

treatments. Then each GoO of 7 bytes describes a treatment <strong>and</strong> its time.<br />

In the NCA we set the MAIS to 512 bit, so a slot can hold at most 6 treatment<br />

codes. There are 8 keys, from 512 bit to 4096.<br />

In the ACA we set the MAIS to 1024 bit. The security level depends on the<br />

length of the keys, so the MAIS is a compromise between the security <strong>and</strong> the<br />

number of memory slot. We implemented the software by using a not optimized<br />

implementation of RSA algorithm, so the processing time cannot show the real<br />

per<strong>for</strong>mance of the system, but it can show the differences when using different key<br />

lengths. The authorities’ check of a memory slot, encrypted using a 512 bits key,<br />

in the NCA is completed in 3800 ms, in the ACA in 3930 ms, 3500 of which are<br />

spent by the decryption algorithm. Operators in the NCA employ 500 ms to entirely<br />

generate <strong>and</strong> write their ciphertext, in the ACA 3930, the encryption needs on the<br />

order of 130 ms to be concluded. Anyway, by using a PC, with a Pentium 4 at<br />

3,20 GHz processor, the decryption needs 62 ms <strong>and</strong> the encryption 1 ms; with a<br />

4096 bit key the decryption needs 4125 ms, the encryption 31 ms. The difference<br />

between encryption <strong>and</strong> decryption comes from the use of a very optimized public<br />

key. Figures 2.8 <strong>and</strong> 2.9 show the encryption/decryption time. Although, this time<br />

table results from the simplicity of the used algorithm implementation; we did not<br />

attempt to improve it since its characteristics are not part of this section objectives.<br />

Conclusion<br />

Today, an efficient management of the traceability is necessary; RFID technology<br />

offers the possibility to implement a rapid <strong>and</strong> effective ubiquitous system. Un<strong>for</strong>tunately,<br />

recording operators <strong>and</strong> commodity data on a RFID tag involves, in<br />

addition to st<strong>and</strong>ard RFIDs privacy problems, the risk of unauthorized readings of<br />

in<strong>for</strong>mation about the belongings of a person, <strong>and</strong> industrial espionage. However,<br />

privacy can be protected by using an opportune cryptosystem: algorithms presented<br />

in this section produce a satisfactory reply to these privacy problems.<br />

Even considering the possible optimization of the cryptography algorithm implementation,<br />

the decryption time requires the use of a PC, while the encryption can<br />

be made simply by a PDA. The ACA implies one encryption <strong>and</strong> one decryption <strong>for</strong><br />

any operation, so, unless using short keys, it requires a PC.<br />

In the NCA it is not possible to lock an area until the subsequent operators have<br />

written on the tag, while the ACA requires larger tag memory to ensure a high level<br />

of security, but it allows locking a memory slot, after recording on it.<br />

60


2 – <strong>Security</strong><br />

In order to increase the protection from fraud, also in the NCA it is possible to<br />

use the authenticating system, but it involves the management of a great number<br />

of keys <strong>and</strong> it extends the operation time.<br />

Our traceability system, with a suitable RSA implementation, can satisfy efficiency<br />

<strong>and</strong> privacy dem<strong>and</strong>s. Future work involves the practical implementation of<br />

the proposed algorithms in a wine bottling chain. We think it could address the<br />

safety of alimentary commodities, improving actual st<strong>and</strong>ards.<br />

2.5.3 A <strong>Security</strong> System <strong>for</strong> Chain Applications<br />

Ubiquitous computing environments offer new opportunities <strong>for</strong> several services [75].<br />

One of the main technologies <strong>for</strong> ubiquitous environments is represented by Radio<br />

Frequency Identification (RFID), which is widely adopted as a contactless identification<br />

technology. In particular, environments based on RFID technology are<br />

employed in very different areas, such as health care [15], robot localization [65] <strong>and</strong><br />

navigation [104], but their most promising applications are within Supply Chain<br />

Management (SCM) [116], traceability [53], shopping [100], <strong>and</strong> smart home [131].<br />

Various applications employ RFID technology as base <strong>for</strong> their In<strong>for</strong>mation Systems<br />

(ISs), since RFID technology allows to improve services with the introduction<br />

of automatic identification. Although ubiquitous environments offer many benefits,<br />

they involve also security threats to in<strong>for</strong>mation. On the one h<strong>and</strong>, the intense use<br />

of RFID tags can endanger the in<strong>for</strong>mation privacy, on the other h<strong>and</strong>, RFIDs can<br />

be used to spread false in<strong>for</strong>mation <strong>for</strong> malicious actions. Modern society requires<br />

more attention to privacy threats, <strong>and</strong> in many countries laws about privacy protection<br />

limit the use of RFIDs [1]. Furthermore, all the br<strong>and</strong>s require firmly to reserve<br />

the key in<strong>for</strong>mation about their production flow. Nowadays in the global market,<br />

also the authenticity of the in<strong>for</strong>mation is a critical problem <strong>for</strong> business. There<strong>for</strong>e,<br />

strong in<strong>for</strong>mation security systems are required, in order to reach all the potential<br />

benefits of RFID-based environments avoiding dangers <strong>and</strong> damages.<br />

This section presents an IS based on RFID technology, which exploits the opportunities<br />

of ubiquitous environments, <strong>and</strong> is suitable <strong>for</strong> SCM, traceability management,<br />

<strong>and</strong> other services. Furthermore, the proposed IS is protected by a new in<strong>for</strong>mation<br />

security system based on the Nested Supply Chain Cryptographic Algorithm<br />

(NSCCA), which employs public-key cryptography, addresses the most dangerous<br />

privacy threats, proofs the authenticity of the in<strong>for</strong>mation, <strong>and</strong> detects malicious<br />

alteration of the in<strong>for</strong>mation. NSCCA is an evolution of the Nested Cryptographic<br />

Algorithm (NCA) [27], a security algorithm based on RSA [110], that protects the<br />

privacy <strong>and</strong> is suitable <strong>for</strong> traceability management. Both the algorithms employ<br />

nested ciphertexts, in order to reach a high security with small memory areas. The<br />

novelties of NSCCA with respect to NCA are:<br />

61


2 – <strong>Security</strong><br />

ˆ the authenticity proof;<br />

ˆ the suitability <strong>for</strong> several services;<br />

ˆ the management of large supply chains avoiding too long cryptographic keys;<br />

ˆ the tamper detection property extended to authorized Chain Members (CMs),<br />

where the CMs are the companies involved in the supply chain.<br />

The feasibility of the IS has been evaluated, <strong>and</strong> the per<strong>for</strong>mance of its implementation<br />

based on st<strong>and</strong>ard passive RFID tags with a rewritable memory has been<br />

analyzed. The experimental analysis shows that the IS does not require any special<br />

device, so its application is cheap <strong>and</strong> easy. Furthermore, no modification to the tag<br />

architecture or to communication protocols is required.<br />

Related Work<br />

Although there are many research studies that try to address the RFID tracking<br />

problem, this threat requires a quantity of RFID readers that nowadays is unfeasible.<br />

A deep analysis on anti-tracking schemes has been presented in [19].<br />

The proposed system is able to address all the described threats, apart from the<br />

tracking one, along the whole path of a product.<br />

Several other studies address some security threats. Many approaches <strong>for</strong> pervasive<br />

technologies are focused on authentication. In [76, 120], two schemes <strong>for</strong> the<br />

authentication of smart cards, which can per<strong>for</strong>m keyed hash functions, have been<br />

proposed. Some approaches, starting from [101], propose tag authentication schemes<br />

where the RFID tags change their identification after each reading. In [20], the authors<br />

proposed an authentication scheme based on keyed hash function. This scheme<br />

is designed to address the counterfeiting <strong>and</strong> the tracking threats. Moreover, the<br />

identification of the tag is just a link to a database, so this system protects against<br />

personal belongings monitoring <strong>and</strong> industrial espionage. The tag has a read-only<br />

memory, so the system protects also against sabotage. Also the YA-TRAP protocol<br />

[123], which is a tag authentication scheme based on Message Authentication<br />

Code, addresses all the described threats. However, these schemes require a central<br />

server that stores all the in<strong>for</strong>mation matched to any involved tag <strong>and</strong> manages the<br />

updating of the security material. This requirement strongly limits the applicability,<br />

since they can protect against personal belongings monitoring <strong>and</strong> industrial<br />

espionage only if the access to the central server is limited to authorized users.<br />

Furthermore, they require tags with the ability to compute keyed hash functions.<br />

62


2 – <strong>Security</strong><br />

General architecture<br />

The EPC st<strong>and</strong>ard [8] provides only the unique identification of the item, its type,<br />

<strong>and</strong> its manufacturer. Instead, in the proposed IS, the data required by the listed<br />

applications are stored directly on the tag, so authorized users can directly access<br />

to them. Furthermore, the system employs an algorithm based on public key<br />

cryptography, which ensures the authenticity of the in<strong>for</strong>mation, the privacy of the<br />

customers, the protection against industrial espionage, <strong>and</strong> the rapid detection of<br />

malicious alterations of the in<strong>for</strong>mation.<br />

The proposed pervasive IS is based on rewritable RFID tags. The activities<br />

managed by the system, <strong>and</strong> the operations required <strong>for</strong> these activities are:<br />

ˆ traceability management, each CM writes on the tag the useful data about<br />

the product <strong>and</strong> the treatments executed on it, these data are reserved <strong>for</strong> the<br />

CA;<br />

ˆ SCM, each CM writes on the tag the useful data about the product, these<br />

data are reserved <strong>for</strong> the authorized CMs <strong>and</strong> the CA;<br />

ˆ multimodality shopping, the retailer writes the useful data about the product,<br />

these data are public;<br />

ˆ after the point-of-sell applications, the IS can be used <strong>for</strong> many applications:<br />

– maintenance, the retailer writes the useful data about the product <strong>and</strong><br />

its history, these data are reserved only to the authorized CMs managing<br />

the maintenance;<br />

– smart home, the retailer writes the useful data about the product, these<br />

data are reserved to the customer.<br />

In our approach, the tag memory is divided at the application layer in Memory<br />

Slots (MSs); each MS is used by one CM in order to record its in<strong>for</strong>mation, whereas<br />

the final retailer uses two MSs. The first CM uses the first MS, each following CM<br />

uses one more MS. The final retailer writes in its first MS the data <strong>for</strong> the traceability<br />

<strong>and</strong>, instead of data <strong>for</strong> SCM, he/she writes the data <strong>for</strong> the maintenance. The final<br />

MS is used <strong>for</strong> multimodality shopping <strong>and</strong> after the point-of-sell applications; the<br />

retailer writes in this area the data that are used by customer during the shopping<br />

<strong>and</strong> by smart home applications.<br />

The data are represented by records that correspond to label/value couples,<br />

where the label stores a code representing the kind of in<strong>for</strong>mation, <strong>and</strong> the value<br />

corresponds to the in<strong>for</strong>mation itself. This method of representation, when it is applied<br />

to a steady system, requires more memory than a method based on structures,<br />

63


2 – <strong>Security</strong><br />

where each record corresponds to a specific meaning. Nevertheless, it involves more<br />

flexibility, so it allows each company to choose which data should be recorded <strong>for</strong><br />

each activity. The label identifies the kind of in<strong>for</strong>mation, <strong>and</strong> so the correct reference<br />

table. Each label is followed by a value with a specific length. The managed<br />

data are:<br />

ˆ identification, <strong>for</strong>matted according to EPC96 [8], identifying the company<br />

(EPC Manager), the kind of product (Object Class), <strong>and</strong> the single item (Serial<br />

Number);<br />

ˆ company identification (CID), compliant to EPC Manager, identifying the<br />

company that wrote the previous MS;<br />

ˆ treatments, which identify the executed treatments according to the reference<br />

tables; the value represents the number of subsequent related characteristics;<br />

ˆ characteristics, which describe the product or detail the treatments according<br />

to the reference tables.<br />

Figure 2.10.<br />

Example of data structure<br />

An example of possible implementation, shown in Fig. 2.10, is based on a data<br />

structure composed of 2-byte labels, <strong>and</strong> values of 1 byte <strong>for</strong> the treatments, 2 bytes<br />

<strong>for</strong> the characteristics, 3 bytes <strong>for</strong> the CIDs, <strong>and</strong> 12 bytes <strong>for</strong> the identifications. In<br />

this example the first bit of the label identifies the kind of value: “0” <strong>for</strong> identification<br />

<strong>and</strong> characteristics, “1” <strong>for</strong> treatments. The second <strong>and</strong> the third bits of the label<br />

identify the relevance of the record: “00” as maximum, <strong>and</strong> “11“ as minimum<br />

relevance. Since the identification is always required, its relevance bits are set to<br />

”00”. The other 13 bits of the label describe the in<strong>for</strong>mation according to the<br />

reference tables.<br />

64


2 – <strong>Security</strong><br />

Each MS has a fixed size that must be set according to a trade-off between the<br />

possible number of CMs in a generic supply chain <strong>and</strong> the amount of data <strong>for</strong> each<br />

CM.<br />

According to the described IS, each CM, getting a product from its supplier,<br />

adds its data to the product tag <strong>and</strong> then gives the product to the following CM.<br />

Three different situations are possible:<br />

ˆ simple treatment; when a company gets, stores, gives to another company, <strong>and</strong><br />

eventually treats a product, it adds its data in the first free MS;<br />

ˆ merging of products; when a company uses more than one product, if the<br />

number of free memory slots is enough, the company adds all the data from<br />

the tags of the merged products, otherwise it gets only the main important<br />

data <strong>and</strong> puts them in a summary slot;<br />

ˆ partition of one product; when a company uses one product to manufacture<br />

more than one commodity, it copies the previous data in the empty memory<br />

of the tags of the new commodities <strong>and</strong> it adds its data in the subsequent first<br />

free MS.<br />

The most critical situation is the merge of products, since it could require several<br />

MSs. When the number of free MSs is not enough, a company has to write a<br />

summary, but this operation is not trivial since the company could not have the<br />

permission to read all the previous data in the tag memories. The lack of in<strong>for</strong>mation<br />

about the previous CMs affects predominantly the traceability management,<br />

which requires accurate in<strong>for</strong>mation about the whole history of a product, so a wellstructured<br />

summary is essential. The summary shall include at least the data with<br />

maximum priority of the products directly merged. However, the company must include<br />

the maximum quantity of data according to their importance. Useful data can<br />

be selected in a decreasing relevant order, considering the relevance of the record,<br />

the proximity of the record writer along the supply chain, <strong>and</strong> the importance of<br />

the product matched to the record <strong>for</strong> the manufacturing of the new item.<br />

Cryptographic system<br />

The proposed IS requires that CMs record in the tag memory the data that are<br />

useful <strong>for</strong> traceability <strong>and</strong> SCM. According to Section 1 the in<strong>for</strong>mation useful <strong>for</strong><br />

SCM is a subset of the traceability management in<strong>for</strong>mation, so a part is required<br />

only by the CA, <strong>and</strong> another one is required both by the CA <strong>and</strong> by some CMs.<br />

There<strong>for</strong>e, the security system allows CA to read all the data, instead authorized<br />

CMs are allowed to read only the in<strong>for</strong>mation <strong>for</strong> SCM. The security system is<br />

controlled by the same CA that controls the traceability.<br />

65


2 – <strong>Security</strong><br />

Table 2.12. NSCCA Keys<br />

Key Quantity Length Owner Holders<br />

1<br />

APuK 1 MS CA Public<br />

2<br />

1<br />

APrK 1 MS CA CA<br />

2<br />

1<br />

OPuK 1 MS N th CM Authorized CMs<br />

2<br />

1<br />

OPrK 1 MS N th CM N th CM<br />

2<br />

i th OPuK MaxNMS i× MS N th CM Authorized CMs, CA<br />

i th OPrK MaxNMS i× MS N th CM N th CM<br />

1<br />

CPuK 1 MS Customer Public<br />

2<br />

1<br />

CPrK 1 MS Customer Customer<br />

2<br />

Differently <strong>for</strong>m NCA, which involves only a set of nested cryptographic keys<br />

generated by CA <strong>for</strong> traceability management, the proposed public key cryptosystem<br />

manages different privileges of in<strong>for</strong>mation access by using three different sets<br />

of keys, which are shown in Table 2.12. The first set is managed by the CA which establishes<br />

the Authority Public Key (APuK) <strong>and</strong> the Authority Private Key (APrK);<br />

the length of this couple of keys is equal to 1 MS; the APuK is public <strong>and</strong> it is used<br />

2<br />

by all the CMs in order to encrypt the in<strong>for</strong>mation reserved to the CA; the APrK<br />

is secret, so only the CA can decrypt the traceability in<strong>for</strong>mation. The second set<br />

of keys is established by the CMs: each CM establishes its own set of Operator<br />

Public Keys (OPuKs) <strong>and</strong> Operator Private Keys (OPrKs), which is composed by<br />

couples of keys of different lengths; the first couple has a length equal to 1 MS area,<br />

2<br />

the length of the following couple of keys, which are used <strong>for</strong> nested MSs, is equal<br />

to the length of 1 MS multiplied by the position of any CM in the supply chain,<br />

so the first couple has a length equal to 1 MS, the second a length of 2 MSs, <strong>and</strong><br />

so on. However, the couples of keys with the greatest length could be so long to<br />

affect the efficiency of RSA encryption <strong>and</strong> decryption, since the time per<strong>for</strong>mance<br />

of RSA depends on the length of the employed keys. There<strong>for</strong>e, in order to avoid a<br />

significant per<strong>for</strong>mance penalty the maximum number of nested MSs (MaxNMS)<br />

must be set to a proper number that is a factor of the total number of MSs minus<br />

1 (used as second MS of the retailer <strong>and</strong> not included in the sets of nested MSs).<br />

There<strong>for</strong>e, the memory is divided in sets, where each set is composed by MaxNMS.<br />

The length of the couples of keys (kl) is:<br />

kl = MS · (CMpos mod (MaxNMS)) ; (2.3)<br />

where CMpos is the position of any CM in the supply chain. Each CM uses a OPrK<br />

of a specific length in order to encrypt the whole in<strong>for</strong>mation. The OPrKs, which are<br />

used <strong>for</strong> SCM in<strong>for</strong>mation encryption, are secret, <strong>and</strong> known only by the company<br />

66


2 – <strong>Security</strong><br />

that generated them, instead the OPuKs are distributed to the CA <strong>and</strong> to the<br />

CMs that are authorized to read the data <strong>for</strong> SCM. There<strong>for</strong>e, only the authorized<br />

CMs <strong>and</strong> the CA can read the in<strong>for</strong>mation <strong>for</strong> SCM; furthermore, they can also<br />

check the authenticity of the in<strong>for</strong>mation, since only the original company owns the<br />

OPrK used <strong>for</strong> the encryption, so, only an authentic ciphertext can be decrypted<br />

by using the correct OPuK. The last set of keys is managed by the customers.<br />

Each customer establishes his/her own couple of Customer Public Key (CPuK) <strong>and</strong><br />

Customer Private Key (CPrK), which are used to avoid unauthorized accesses to<br />

the in<strong>for</strong>mation <strong>for</strong> after the-point-of-sell applications. The length of CPuK <strong>and</strong><br />

CPrK is equal to 1 MS area. The CPrK is secret, instead the CPuK is given to<br />

2<br />

retail shops during the shopping, in order to per<strong>for</strong>m the encryption.<br />

In order to ensure the authenticity of the in<strong>for</strong>mation against <strong>for</strong>gery in the<br />

plaintext <strong>for</strong> SCM the company inserts a tag signature (TS). The TS is composed<br />

by address-block couples, where the <strong>for</strong>mer element represents the address of a block<br />

of bits in the tag ID, <strong>and</strong> the latter is the value of the bits. The TS is characterized<br />

by the number of couples, the length of the address, <strong>and</strong> the length of the block.<br />

Fig. 2.11 shows an example of TS, where the length of the address is 6 bits, the<br />

length of the block is 2 bits (at most <strong>for</strong> tag ID of 2 6 · 2 = 2 7 bits) <strong>and</strong> the number<br />

of couples is 4. In the example, the address of the first couple, represented on 6<br />

bits, is 2, the values, represented on 2 bits, is 0. The other couples, according to<br />

hexadecimal representation, are 34 H -1, 19 H -2, 38 H -3.<br />

Figure 2.11. Example of Tag Signature. The elements of the TS are<br />

represented in italic-bold style<br />

NSCCA Algorithm<br />

In the following the NSCCA algorithm is described step by step (Fig. 2.12). In the<br />

remain of the section we will refer to ciphertexts encrypted by using APuK as CT A ,<br />

<strong>and</strong> to ciphertexts encrypted by using OPuK as CT O .<br />

The first CM encrypts a plaintext that contains the traceability in<strong>for</strong>mation<br />

reserved to CA by using the APuK; the length of the plaintext is at most as 1 2<br />

MS. Then the first CM encrypts a new plaintext that is composed by 1 st CT A , by<br />

the SCM in<strong>for</strong>mation <strong>for</strong> the authorized CMs, <strong>and</strong> TS. The length of the OPrK<br />

67


2 – <strong>Security</strong><br />

Figure 2.12.<br />

Nested Supply Chain Cryptographic Algorithm<br />

68


2 – <strong>Security</strong><br />

which is used by the first company of the chain <strong>for</strong> the new encryption is equal<br />

to 1 MS, so the length of the plaintext can be at most equal to 1 MS, <strong>and</strong> the<br />

length of the in<strong>for</strong>mation <strong>for</strong> SCM is 1 MS. The resulting ciphertext is written by<br />

2<br />

the first CM in the first MS. Even if all the data are on the tag memory, they<br />

can be decrypted only by one specific OPuK, so both CA <strong>and</strong> CMs need to know<br />

which CM has encrypted them. Then, the first CM encrypts its CID by using the<br />

APuK <strong>and</strong> writes the resulting ciphertext (CID A) in the first half of the second<br />

MS. Then the CID should be encrypted by using the OPuK of the second CM with<br />

length equal to 1 MS, <strong>and</strong> written in the second half of the second MS (CID O).<br />

2<br />

However, this operation can be per<strong>for</strong>med either by the first CM be<strong>for</strong>e delivering<br />

of the commodity, or by the second CM after receiving the commodity, according<br />

to the SCM.<br />

The MSs <strong>and</strong> the CMs are grouped in nested MS sets, which include a number<br />

of consecutive MSs equal to the MaxNMS. The behavior of a CM depends on its<br />

position in its nested MS set.<br />

Each CM between the first <strong>and</strong> the last one can decrypt the in<strong>for</strong>mation written<br />

in the second half of the last used memory slot by using its OPrK with length equal<br />

to 1 MS, since the encryption was per<strong>for</strong>med by the supplier by using the OPuK of<br />

2<br />

that CM. The decrypted in<strong>for</strong>mation represents the CID of the supplier <strong>and</strong> it allows<br />

the identification of the correct OPuK. This CID will be inserted in the plaintext<br />

<strong>for</strong> Authorities, in order to allow CA finding the correct key <strong>and</strong> decrypting the<br />

previous ciphertext, or in the plaintext <strong>for</strong> SCM, when also subsequent CMs are<br />

authorized to know who is the previous CM <strong>and</strong> to decrypt its ciphertext. Each CM<br />

composes a plaintext that contains the in<strong>for</strong>mation <strong>for</strong> traceability <strong>and</strong> it encrypts<br />

it by using the APuK. After using the APuK, each CM encrypts a new plaintext<br />

that is composed by:<br />

ˆ the ciphertext written in the tag memory by the previous CM ((n − 1) th CT O ),<br />

when the CM is not the first of its nested MS set;<br />

ˆ the ciphertext resulting from the encryption of the traceability in<strong>for</strong>mation<br />

<strong>and</strong> the CID related to the previous MS(n th CT A );<br />

ˆ the SCM in<strong>for</strong>mation;<br />

ˆ the TS.<br />

The length of the OPrK used to per<strong>for</strong>m the second encryption is calculated<br />

according to (2.3). After the encryption, if the N th CM is the first in its nested MS<br />

set, it erases the CID MS <strong>and</strong> it writes the ciphertext in the first free MS, else it<br />

erases also the last nested MS set, <strong>and</strong> it writes in the first free MSs, by using a<br />

number of MSs equal to n mod (MaxNMS). Then the n th CM encrypts its CID by<br />

69


2 – <strong>Security</strong><br />

using the APuK, it writes the resulting ciphertext in the first half of the (n + 1) th<br />

MS, it encrypts its CID by using the OPuK of the subsequent CM with length equal<br />

to half MS, <strong>and</strong> it writes the resulting ciphertext in the second half of the (n + 1) th<br />

MS.<br />

As the previous CMs, the last CM, which is the final retail store, can decrypt<br />

the in<strong>for</strong>mation on the tag memory in the same way. It composes a plaintext that<br />

contains the in<strong>for</strong>mation <strong>for</strong> traceability <strong>and</strong> it encrypts it by using the APuK.<br />

However, the retailer composes a plaintext by using in<strong>for</strong>mation <strong>for</strong> maintenance<br />

activities that are managed by some CMs. There<strong>for</strong>e, the last CM encrypts, by<br />

using the longest key in order to fill its nested MS set, a plaintext that is composed<br />

as the previous ones, except from the maintenance in<strong>for</strong>mation.<br />

After the encryption, the retailer writes its ciphertext <strong>and</strong> the CID <strong>for</strong> CAs as<br />

previous CMs. Finally, it writes, without encryption, in the second half of the last<br />

MS the in<strong>for</strong>mation <strong>for</strong> multimodality shopping <strong>and</strong> after the point-of-sell applications.<br />

At the point-of-sell the customer can give to the retailer its CPuK, so the<br />

retailer will encrypt the in<strong>for</strong>mation in the last half MS by using the CPuK. Alternatively,<br />

if the customer does not own a couple of keys, the retailer can erase that<br />

in<strong>for</strong>mation or leave it without encryption, according to customer needs.<br />

At least the identification record must be written in the area that is not encrypted<br />

by the APuk, in order to allow the identification of the product <strong>and</strong> the generation<br />

of a potential summary by the supplied companies. When a company does not<br />

require to hide in<strong>for</strong>mation to the other CMs, the use of the APuK can be avoided.<br />

This approach is especially suitable <strong>for</strong> summary, since enlarges the area readable<br />

by CMs.<br />

Example of Application<br />

In order to explain the behavior of the system, an example of application of the IS<br />

to a complex business as a tire company is here described.<br />

A tire is composed by the following materials: various types of polymer compounds,<br />

metallic <strong>and</strong> textile yarns, <strong>and</strong> beads. Each tire can be composed by more<br />

than one compound <strong>and</strong> yarn. Since the production of a tire corresponds to the joining<br />

of several products, where each product is used <strong>for</strong> many tires, this operation<br />

corresponds both to a merging <strong>and</strong> to a partition. Let’s consider that 6 products<br />

are merged <strong>and</strong> that the tags of 2 of them contain two filled MSs, <strong>and</strong> that the<br />

others contain one filled MS. Moreover, let’s consider that the tire company has<br />

the privilege to access to the data <strong>for</strong> SCM of all the suppliers except one. If the<br />

tags contain 10 MSs, then all the MS filled by the suppliers can be copied in the<br />

first 8 MSs of the new plaintext, else a summary is composed. The tire company<br />

can access to the data <strong>for</strong> SCM of 7 MSs, so the summary will include the main<br />

important data from these MSs, <strong>and</strong> only the EPC code that identifies the other<br />

70


2 – <strong>Security</strong><br />

supplier. The summary is encrypted with APuK <strong>and</strong> with OPrK, according to the<br />

traceability <strong>and</strong>/or SCM scope.<br />

The data that the company will add to the tag are the identification of the<br />

tire, the CIDs required to decrypt the previous MSs, <strong>and</strong> the additional data on<br />

the tire <strong>and</strong> on the treatments (e.g. the identification of the machines used <strong>for</strong><br />

the treatments). The data that are used only <strong>for</strong> traceability, which compose the<br />

P B A , are encrypted with APuK. The P T O of the tire company is composed by the<br />

in<strong>for</strong>mation on the suppliers (the original MSs or the summary), the CT A , <strong>and</strong> the<br />

TS. P T O is encrypted with the OPrK with the correct length.<br />

The resulting ciphertext CT C is written on the first MSs of the new tags. In the<br />

first half of the subsequent MS, the company writes its CID encrypted with APuK,<br />

<strong>and</strong> in the subsequent its CID encrypted with OPrK.<br />

IS Evaluation<br />

In order to evaluate the feasibility of the approach, in this section the characteristics<br />

of the IS <strong>and</strong> its implementation will be discussed.<br />

Time The time required to read <strong>and</strong> write on RFID tags <strong>and</strong> to elaborate the<br />

in<strong>for</strong>mation depends mainly on the length of the keys <strong>and</strong> on the employed devices.<br />

The time spent <strong>for</strong> reading <strong>and</strong> writing on RFID tags is proportional to the<br />

number of transmitted bits. An RFID reader ACG Dual ISO CF Card Reader<br />

Module, compliant with ISO14443, at 13.56 MHz, requires 21 ms to read a 32-bit<br />

block from an SRIX4K STMicroelectronics tag, <strong>and</strong> it requires 37 ms to write a 32-<br />

bit block. There<strong>for</strong>e, the reading <strong>and</strong> the writing of 1,024 bits require respectively<br />

about 0.67 s <strong>and</strong> 1.18 s.<br />

The computational capacity affects strongly the time per<strong>for</strong>mance, especially<br />

when the cryptographic operations are executed on mobile devices. Some tests on<br />

the ratio between the time per<strong>for</strong>mance of RSA encryption (by public-key) <strong>and</strong><br />

decryption (by private-key) executed on a PDA or on a PC were per<strong>for</strong>med by using<br />

a PC with an Intel Core 2 Quad at 2.67 GHz <strong>and</strong> 3.2 GB of RAM, <strong>and</strong> a PDA with<br />

a 624 MHz Marvell PXA310 processor <strong>and</strong> 128 MB of RAM. The decryption ratio<br />

is about 10 times. A device with low computational capacity could be too slow <strong>for</strong><br />

cryptographic operations, especially <strong>for</strong> decryption with a large key.<br />

The time per<strong>for</strong>mance is strongly affected by the key length employed <strong>for</strong> the<br />

encryption. Fig. 2.13 shows the time per<strong>for</strong>mance reached by a PC <strong>and</strong> by a PDA.<br />

The decryption operations require longer time, since the computational ef<strong>for</strong>t is<br />

asymmetric, where private-key operations require the major ef<strong>for</strong>t in public key<br />

cryptography. The per<strong>for</strong>mance of the PDA <strong>for</strong> decryption varies from about 258<br />

ms with a 512-bit ciphertext, to over 2500 ms <strong>for</strong> 4096 bits. A PC <strong>for</strong> decryption<br />

requires from about 16 ms with a 512-bit ciphertext, to about 300 ms <strong>for</strong> 4096 bits.<br />

71


2 – <strong>Security</strong><br />

There<strong>for</strong>e, the decryption with long keys can be executed, but it requires both an<br />

efficient implementation <strong>and</strong> a device with great computational capacity.<br />

NCA is faster than NSCCA, since it requires the same type of operations, but<br />

the number of encryption <strong>and</strong> decryption operations is minor. However, the additional<br />

operations are per<strong>for</strong>med with the APuK <strong>and</strong> the APrK that have the shortest<br />

length, so the additional time is almost negligible. Moreover, in NSCCA the maximum<br />

length <strong>for</strong> a key is limited to MaxNMS. This feature improves drastically<br />

the time per<strong>for</strong>mance, but it could be extended to NCA.<br />

YA-TRAP requires: the transmission from the reader to the tag of at most<br />

160 bits; the computation by the tag of a keyed hash function on 160 bits; the<br />

transmission from the tag to the reader of at most 160 bits; the transmission from<br />

the reader to the central server of at most 160 bits; the computation by the tag of<br />

O(n) keyed hash function on 160 bits, where n is total number of tags in the system;<br />

the transmission from the reader to the tag of the whole in<strong>for</strong>mation matched to<br />

the tag. YA-TRAP is quite efficient <strong>for</strong> small applications, but the central server<br />

represents a strict bottleneck <strong>for</strong> applications with many tags <strong>and</strong> readers that can<br />

access simultaneously to the central server.<br />

<strong>Security</strong> <strong>Pervasive</strong> environments based on RFID tags involve several in<strong>for</strong>mation<br />

security threats. The NSCCA is based on RSA encryption, so the security is related<br />

to the length of the employed keys. The constant improvements in computational<br />

capacity reduce the time required by factorization. A point is the factorization of<br />

a 663-bit RSA key recently completed [9], which took the equivalent of 55 years on<br />

a single 2.2 GHz Opteron CPU. There<strong>for</strong>e, the factorization of keys with a length<br />

close to 700 bits is possible, but it requires a strong ef<strong>for</strong>t.<br />

The analysis of the system security is based on the malicious actions described<br />

in [113].<br />

In order to prove the authenticity of the in<strong>for</strong>mation on the tag, CMs encrypt<br />

it by using their OPrKs <strong>and</strong> write the TS. The two main threats <strong>for</strong> authenticity<br />

are cloning <strong>and</strong> <strong>for</strong>gery. The NSCCA protects against <strong>for</strong>gery by using the OPrKs,<br />

since both the CMs in the same chain of the company that wrote the <strong>for</strong>ged tag <strong>and</strong><br />

the authorities hold the OPuK that can decrypt the ciphertext <strong>and</strong> so that allows<br />

detecting the false tag. A malicious opponent can <strong>for</strong>ge authentic new tags only by<br />

stealing the OPrK or by factorizing it. The length of the OPrK is related to the<br />

position of the owner in the nested MS set inside the supply chain, so it is more<br />

difficult factorizing the key of CMs in the last positions of the sets <strong>and</strong> of the retailer,<br />

which uses always the longest OPrK. However, the authenticity check requires the<br />

OPuK, but customers <strong>and</strong> CMs without the correct key could use an on-line web<br />

service of the authorities that checks the authenticity of the in<strong>for</strong>mation.<br />

An opponent could try to clone an RFID tag by copying the in<strong>for</strong>mation in<br />

72


2 – <strong>Security</strong><br />

Figure 2.13.<br />

Time required <strong>for</strong> Cryptographic Operations by a PC <strong>and</strong> by a PDA<br />

the tag memory into the memory of new tags, but the TS in the memory avoids<br />

this malicious action, since the probability that the TS of a tag corresponds also to<br />

another tag with r<strong>and</strong>om ID is<br />

probability = 1<br />

2 L·b (2.4)<br />

where b is the number of blocks in the TS, <strong>and</strong> L is the length of the block.<br />

Table 2.13 shows the possible configurations of a TS, where the length of the tag<br />

ID could be up to 128 bits. Although typically the length of an ID is 64 or 96,<br />

the configurations based on a longer ID, where the block length is shorter than or<br />

equal to the length of the ID, are applicable, but b must be recomputed. With a<br />

64-bit ID, by using TS with 4-bit address <strong>and</strong> L equal to 4 bits, with a 3-byte TS<br />

(b = 3) the probability of identical TS is 2.44·10 −4 , <strong>and</strong> with a 6-byte TS (b = 6) the<br />

probability is 5.96·10 −8 . There<strong>for</strong>e, finding r<strong>and</strong>om tags with the IDs corresponding<br />

to a specific TS is not feasible, so the cloning action requires the knowledge of the<br />

OPuK, in order to read the TS, <strong>and</strong> it requires the ability to write new tags with<br />

73


2 – <strong>Security</strong><br />

Table 2.13. TS characteristics<br />

Address length Number of Block length Address-block<br />

(bits) Blocks (NB) (bits) couple length (bits)<br />

7 128 1 8<br />

6 64 2 8<br />

5 32 4 9<br />

4 16 8 12<br />

3 8 16 19<br />

2 4 32 34<br />

1 2 64 65<br />

0 1 128 128<br />

a desired ID. However, the presence of a stock of commodities with cloned tags can<br />

be easily detected, thanks to the presence of the same TS on different tags.<br />

Differently from NSCCA, NCA does not provide the authenticity of the in<strong>for</strong>mation<br />

on the tag. YA-TRAP provides authenticity, but the authenticity check can<br />

be per<strong>for</strong>med only by the users that are authorized to access to the server.<br />

The privacy of customers is protected by the OPrKs, the APuK, <strong>and</strong> by the<br />

CPuK. A privacy threat is the finding on the tag memories of in<strong>for</strong>mation about<br />

personal belongings. On the one h<strong>and</strong>, after the point-of-sell the in<strong>for</strong>mation <strong>for</strong><br />

SCM <strong>and</strong> traceability is encrypted by using also the longest OPrK, so only who<br />

knows the correct OPuK can read that in<strong>for</strong>mation. Furthermore, the OPuK allows<br />

only the access to maintenance in<strong>for</strong>mation or to the SCM in<strong>for</strong>mation of one CM,<br />

instead opponents need other OPuKs <strong>and</strong> the APrK in order to read more data.<br />

However, OPuK security is also based on the reliability of the CMs that hold it,<br />

so its circulation should be tightly limited. On the other h<strong>and</strong>, the in<strong>for</strong>mation <strong>for</strong><br />

smart home is encrypted by the CPuK, which has a length equal to 1 MS, so it<br />

2<br />

is subject to a minor protection. However, the in<strong>for</strong>mation <strong>for</strong> smart home may<br />

hold only some specific data, e.g. the expiration date, in order to avoid risks <strong>for</strong><br />

in<strong>for</strong>mation important <strong>for</strong> privacy. Furthermore, customers can delete a part or the<br />

whole in<strong>for</strong>mation <strong>for</strong> smart home, according to their privacy requirements.<br />

NCA provides the same protection to customer privacy as NSCCA, but it allows<br />

only the application to traceability management. In YA-TRAP the adversaries<br />

cannot reach data related to the tag, since all the in<strong>for</strong>mation are stored on the<br />

central server. However, this scheme does not involve users with different privileges,<br />

so the same tag can not be employed by different applications, such as traceability,<br />

SCM, <strong>and</strong> multimodality shopping. Furthermore, the scheme is not suitable <strong>for</strong> after<br />

the point-of-sell applications, since they would require that customers can access to<br />

the central server.<br />

74


2 – <strong>Security</strong><br />

Industrial espionage is addressed by encrypting the in<strong>for</strong>mation by using the<br />

OPrKs of the CMs <strong>and</strong> the APuK. The length of the shortest key is related to<br />

the chain position of the last CM that has written on the tag. An opponent, in<br />

order to read the last in<strong>for</strong>mation <strong>for</strong> SCM, needs to find the correct OPuK, or to<br />

factorize it. In order to read other in<strong>for</strong>mation, the opponent needs the subsequent<br />

correct OPuK. Also NCA <strong>and</strong> YA-TRAP can protect against industrial espionage<br />

as NSCCA.<br />

Another threat is the tampering. NSCCA is not tamper-resistant, but it is<br />

tamper-evident. Only an opponent that owns the OPrK <strong>and</strong> the OPuK of the CM<br />

could correctly modify the in<strong>for</strong>mation on the tag. After the-point-of-sell, if the<br />

writing block comm<strong>and</strong> on the employed RFID tags is active, the memory can be<br />

blocked, in order to avoid tampering. Furthermore, also inside the supply chain, the<br />

closed nested MS sets can be blocked, so only the last set, if it is incomplete, can<br />

be tampered.<br />

NCA provides the same protection against tampering as NSCCA. YA-TRAP is<br />

tamper resistant, since the data are stored in the server. However, YA-TRAP is<br />

exposed to denial-of-service, since it involves time stamps, which can be modified<br />

per<strong>for</strong>ming several malicious readings.<br />

Differently from NSCCA <strong>and</strong> NCA, that do not provide protection against tracking,<br />

YA-TRAP has been designed to protect against it.<br />

The main improvement of NSCCA over NCA <strong>and</strong> YA-TRAP is that it protects<br />

against the same or more security threats than them (except <strong>for</strong> tracking), but<br />

it is the only scheme suitable <strong>for</strong> several applications <strong>and</strong> it can manage different<br />

privilege levels.<br />

Memory dimension The tag memory is one of the main elements of the proposed<br />

system. The parameters of the memory division are the size of the MS <strong>and</strong> the<br />

number of MSs in each tag memory.<br />

The number of MSs should be greater than or equal to the greatest number of<br />

CMs that can be involved in the supply chain of a product. Although the number<br />

of CMs is related to the production sector, it can vary significantly within the same<br />

sector. Furthermore, the merging of products requires several MSs, so it is difficult<br />

that the number of MSs can be so great to store all the data of any product. When<br />

the number of MSs is not enough the CM has to record a summary, as described<br />

in Section 2.5.3, <strong>and</strong> to store the other data in the company database, but this<br />

operation affects the efficiency of the traceability application, so it should be avoided<br />

by setting proper memory dimension parameters.<br />

The size of the MS affects:<br />

ˆ the security of the system, since it is based on the length of the keys, which is<br />

related to the size of the MS;<br />

75


2 – <strong>Security</strong><br />

ˆ the time required <strong>for</strong> encryption <strong>and</strong> decryption, since it depends on the length<br />

of the keys;<br />

ˆ the quantity of data that each CM can record.<br />

On the one h<strong>and</strong> the benefits, from recording on the tag memory the in<strong>for</strong>mation<br />

about all the CMs involved in the supply chain of the product, <strong>and</strong> from the<br />

encryption <strong>and</strong> decryption time saving, are based on the smallness of the MSs. On<br />

the other h<strong>and</strong>, the security of the IS <strong>and</strong> the quantity of in<strong>for</strong>mation recordable by<br />

each CM are based on the largeness of the MSs. There<strong>for</strong>e, the described elements<br />

must be carefully evaluated.<br />

We assume that the typical number of CMs in a simple supply chain is normally<br />

lower than 10; instead the most complex chain can involve several companies, <strong>and</strong><br />

<strong>for</strong> particular commodities, that are the result of the merging of different products,<br />

the chain could require several MSs. There<strong>for</strong>e, a suitable number of MSs per tag<br />

memory should be at least great enough <strong>for</strong> the basic chains, <strong>and</strong> the merging excess<br />

in<strong>for</strong>mation may be stored in the database of the CM.<br />

SRIX4K is an example of RFID tag from STMicroelectronics, which has a 64-bit<br />

Unique Identifier <strong>and</strong> a 4096-bit EEPROM, but only 3872 bits can be written by<br />

users. However, with a 4-Kbit area the size of the shortest keys is not enough also<br />

with few MSs. There<strong>for</strong>e, the RFID tags with larger memories are required, in order<br />

to reach a good security level. In Table 2.14 the configurations of the passive tag<br />

D5-TAGb with a 16-Kbit EEPROM is shown. Furthermore, nowadays there are<br />

other RFID tags with larger memory, e.g. mic3®-TAG with 32 Kbit.<br />

The length of the keys used with a 16-Kbit area allows reaching a good security<br />

level also with more than 8 CMs, but the cryptographic operations per<strong>for</strong>med with<br />

the longest possible keys require too elapsed time, so the maximum number of<br />

nested MSs should be properly set to a value that avoids too long keys. A possible<br />

configuration is shown in Table 2.15. According to the time per<strong>for</strong>mance reported<br />

in Section 2.5.3, the reading <strong>and</strong> decryption of the 512 bits by the customer <strong>for</strong> after<br />

point-of-sell application data require less than 0.5 second, <strong>and</strong> the encryption <strong>and</strong><br />

writing of the 3072 bits by the retailer require less than 6 seconds.<br />

According to the label/value implementation described in Section 2.5.3, an identification<br />

requires 14 bytes, <strong>and</strong> the other records require 5 bytes or less. By employing<br />

the PKSC 1.5 [81] method <strong>for</strong> encrypting data using the RSA, 11 bytes<br />

are required by the encryption in<strong>for</strong>mation. Considering a TS of 6 bytes, according<br />

to the configuration shown in Table 2.15, each CM can write 53 bytes reserved <strong>for</strong><br />

CA <strong>and</strong> 47 bytes reserved <strong>for</strong> authorized CMs. For example the CM could write<br />

in the area <strong>for</strong> CMs its identification, the previous CID, <strong>and</strong> 11 treatments or 8<br />

characteristics, <strong>and</strong> in the area <strong>for</strong> authorities 3 identifications, 1 characteristic, or<br />

11 characteristics <strong>and</strong> 1 treatment.<br />

76


2 – <strong>Security</strong><br />

Table 2.14. 16-Kbit memory configurations<br />

Number Number MS size Largest key Shortest key<br />

of MSs of CMs (bits) (bits) (bits)<br />

2 1 8192 8192 4096<br />

3 2 5461 10922 2730<br />

4 3 4096 12288 2048<br />

5 4 3276 13104 1638<br />

6 5 2730 13650 1365<br />

7 6 2340 14040 1170<br />

8 7 2048 14336 1024<br />

9 8 1820 14560 910<br />

10 9 1638 14742 819<br />

11 10 1489 14890 744<br />

12 11 1365 15015 682<br />

13 12 1260 15120 630<br />

14 13 1170 15210 585<br />

15 14 1092 15288 546<br />

16 15 1024 15360 512<br />

17 16 963 15408 481<br />

18 17 910 15470 455<br />

Table 2.15. 16-Kbit memory configuration example<br />

Memory size 16 Kbit MSs 16 CMs 15<br />

MS size 1024 bits MaxNMS 3 Nested sets 5<br />

Longest key 3072 Shortest key 512<br />

NSCCA requires the same memory area of NCA, except <strong>for</strong> the memory employed<br />

<strong>for</strong> after the point-of-sell applications, which are not managed. The memory required<br />

by YA-TRAP is quite small, but it requires RFID tags <strong>and</strong> communication protocols<br />

out from the RFID st<strong>and</strong>ards.<br />

Conclusion<br />

<strong>Pervasive</strong> computing environments offer great benefits to various sectors. Nevertheless,<br />

they possibly involve dangerous threats <strong>for</strong> the in<strong>for</strong>mation security. Some<br />

very relevant applications could be strongly improved by pervasive environments,<br />

but they require firmly in<strong>for</strong>mation security.<br />

77


2 – <strong>Security</strong><br />

The analysis has shown that the proposed pervasive IS based on RFID technology<br />

is suitable <strong>for</strong> SCM, traceability management, multimodality shopping, maintenance,<br />

<strong>and</strong> smart home applications. Furthermore, all the described applications<br />

get benefits from pervasive environments. At the same time the algorithm here<br />

proposed (NSCCA) avoids industrial espionage, it protects the customer privacy, it<br />

guarantees the authenticity of in<strong>for</strong>mation, <strong>and</strong> it can easily detect sabotage actions<br />

that aim to alter the in<strong>for</strong>mation. The analysis of the tag memory characteristics<br />

demonstrated that st<strong>and</strong>ard RFID passive tags allow implementing the proposed IS<br />

with proper features of time requirements, security <strong>and</strong> quantity of recordable data.<br />

There<strong>for</strong>e, the implementation of the IS does not require new devices, <strong>and</strong> so it can<br />

be cheaply <strong>and</strong> easily applied in commercial sector.<br />

Compared with previous schemes NSCCA has greater memory requirements, but<br />

it can be widely applied, <strong>and</strong> it is compatible with RFID st<strong>and</strong>ards. The future work<br />

will involve the integration of the proposed IS with tracking protection systems, <strong>for</strong><br />

security reasons. On the one h<strong>and</strong>, the optimization of the cryptographic software<br />

implementation seems an effective solution that does not require alterations of the IS.<br />

On the other h<strong>and</strong>, the introduction of new protocols that join symmetric encryption<br />

to public key cryptography could bring more efficient results, but it involves the<br />

challenge of key management.<br />

Figure 2.14.<br />

Reader-transponder scheme<br />

2.6 RFID Tags with cryptographic capability<br />

A common RFID reader-transponder scheme is presented in Figure 2.14. The reader<br />

transmits in<strong>for</strong>mation to the transponders, or tags, by modulating an RF signal.<br />

Then, transponders recover in<strong>for</strong>mation <strong>and</strong> operating power from the RF signals.<br />

After processing in<strong>for</strong>mation, a tag responds to the reader by backscattering, i.e.<br />

modulating the reflection coefficient of its antenna while the reader is transmitting<br />

a continuous wave RF signal.<br />

Current RFID implementations <strong>and</strong> protocols vary deeply since a worldwide<br />

78


2 – <strong>Security</strong><br />

st<strong>and</strong>ardization is still under development. EPC Global specified a ultra-high frequency<br />

(UHF) RFID air interface when introduced its EPC Class-1 Generation-2<br />

(C1G2) UHF RFID protocol [8]. While being a robust specification suitable <strong>for</strong><br />

many UHF RFID applications, the EPC C1G2 protocol also presents several novelties<br />

on its anti-collision <strong>and</strong> tag selection mechanisms.<br />

Even though significant attention has been placed on RFID security <strong>and</strong> privacy<br />

issues 8, few st<strong>and</strong>ardization entities have really addressed them. Customer<br />

privacy issues have overshadowed authentication concerns in RFID research. However,<br />

proper tag authentication is an essential keystone <strong>for</strong> guaranteeing genuine<br />

identification. In general, RFID authentication diminishes the problem of readers<br />

harvesting in<strong>for</strong>mation from counterfeit tags.<br />

RFID’s authentication <strong>and</strong> privacy procedures are based on undem<strong>and</strong>ing symmetric<br />

encryption mechanisms where cryptography keys are exchanged through an<br />

unsafe communication channel. Symmetric encryption schemes use the same key to<br />

encrypt <strong>and</strong> decrypt a message. On the other h<strong>and</strong>, asymmetric encryption, which<br />

is also known as public-key cryptography, utilizes different keys <strong>for</strong> decrypting <strong>and</strong><br />

encrypting a message. Public-key cryptography has been widely used <strong>for</strong> authenticating<br />

a message; electronic signatures are a clear application of it. When using<br />

asymmetric encryption schemes, rather than symmetric ones, a system’s security<br />

level raises, but so does its complexity.<br />

This section introduces a transponder architecture that follows the specifications<br />

of the EPC C1G2 protocol. Our design comprises an asymmetric cryptographic<br />

module that is able to encrypt in<strong>for</strong>mation transmitted to the interrogator.<br />

In this design, we focus on digital components, neglecting the radiofrequency<br />

transceiver <strong>and</strong> other analog elements. Our tag is constituted by different functional<br />

modules that are able to per<strong>for</strong>m the following operations: receiving interrogator<br />

queries, processing internal in<strong>for</strong>mation, managing tag status, h<strong>and</strong>ling inner memory,<br />

encrypting data <strong>and</strong> generating tag responses.<br />

By including an internal encryption element, we empower the tag to per<strong>for</strong>m<br />

authentication tasks. As described in Section 2.5.1, encrypted in<strong>for</strong>mation recorded<br />

in the memory of a tag may lead to satisfactory authentication <strong>and</strong> anti-counterfeit<br />

mechanisms. In this section, we evaluate the possibility of rearranging the encryption<br />

procedure from a high-level system, such as an external computer, to a low-level<br />

device, such as the RFID tag. Results about the trade-off of this reorganization in<br />

terms of cryptographic capabilities, required area <strong>and</strong> power consumption are presented.<br />

2.6.1 EPC<br />

This section provides details abourt EPC C1G2 St<strong>and</strong>ard.<br />

79


2 – <strong>Security</strong><br />

Physical Layer <strong>and</strong> Tag Components<br />

An EPC C1G2 compliant tag is able to establish a reader-to-tag communication if<br />

it implements precise directives regarding the physical layer of the protocol. Within<br />

this layer, modulation <strong>and</strong> data encoding directions are found. The physical layer<br />

also sets up what should be the composition of the tag, that is, its hardware requirements.<br />

The EPC C1G2 presents m<strong>and</strong>atory <strong>and</strong> optional hardware characteristics. Some<br />

of them are related directly with the physical layer, while others are associated with<br />

higher layers <strong>and</strong> procedures. Important hardware requirements have to do with the<br />

memory <strong>and</strong> the anti-collision systems.<br />

According to the EPC C1G2, tag memory must be divided in four banks as<br />

follows:<br />

ˆ Reserved memory. Passwords <strong>for</strong> accessing some tag functionalities, such as<br />

memory locking or tag disabling, must be stored here.<br />

ˆ EPC memory. A code that is used to identify the object to which the tag<br />

is attached must be placed in this bank. Some control data is also allocated<br />

here.<br />

ˆ Tag Identifier (TID) memory. This is the portion of the memory where the<br />

tag identifier should be stored.<br />

ˆ User memory. User-specific data storage is allowed in this part. This is an<br />

optional bank.<br />

In addition, a tag should contain a set of registers that are useful when the anticollision<br />

procedure is in execution. These registers are commonly called inventory<br />

flags. A tag uses them to keep a record of its own status when a reader is executing<br />

an inventory round, i.e. it is trying to catalog a group of tags based on their inventory<br />

flags status.<br />

Communication Layer<br />

The communication layer, according to EPC C1G2, allows a reader to manage tag<br />

populations. A great number of tags may be controlled by supervising tag’s data<br />

collisions. EPC C1G2 protocol implements anti-collision mechanisms within this<br />

layer by using a two-part scheme. First of all, a comm<strong>and</strong>, or instruction, must be<br />

provided by the EPC C1G2 compliant reader <strong>and</strong> tag to allow broad tag selections.<br />

Second, a set of comm<strong>and</strong>s have to be used by the reader in order to choose singularly<br />

a tag.<br />

80


2 – <strong>Security</strong><br />

A selection comm<strong>and</strong> tells a tag or group of tags to set or unset their inventory<br />

flags according to a comparison mask. In this way, a reader is able to split in smaller<br />

sets a larger group of tags in order to access them easily.<br />

As indicated by the EPC C1G2 protocol, a reader can tell a tag to compare<br />

any 256-bit portion of the memory with the aim of regulating its inventory flags.<br />

Nevertheless, usually a reader evaluates just the portion of the memory where the<br />

tag’s identification code is mapped. Generally, after selecting a group of tags, a<br />

reader proceeds with the inventory stage.<br />

A reader builds up an inventory of tags by using several comm<strong>and</strong>s. Within this<br />

stage, anti-collision mechanisms become crucial because different tags may response<br />

at the same time generating data disagreements.<br />

Typically, a reader executes inventory comm<strong>and</strong>s pointing towards a previously<br />

selected set of tags. That is, after sending a selection comm<strong>and</strong>, a reader issues<br />

an instruction indicating that those tags with specific inventory flags status must<br />

initiate an inventory round.<br />

When starting a new inventory round, an inventory-flags-matching tag generates<br />

an internal r<strong>and</strong>om Queue Position Number (QPN) which is the core of the anticollision<br />

scheme. The protocol states that when a tag’s QPN is equal to zero, the<br />

tag must answer to the reader by sending a temporary r<strong>and</strong>om 16-bit address. From<br />

that moment on, <strong>and</strong> until the next inventory round starts, the reader may turn to<br />

the tag by means of its temporary address.<br />

EPC C1G2 protocol provides a large set of reader instructions to manage inventory<br />

rounds <strong>and</strong> to h<strong>and</strong>le QPNs behavior. As noted be<strong>for</strong>e, tags’ anti-collision<br />

system relies on the associated probability of r<strong>and</strong>om number generation.<br />

Application Layer<br />

The EPC C1G2 protocol offers several accessing comm<strong>and</strong>s that become functional<br />

only after a tag has been differentiated. These comm<strong>and</strong>s are part of the application<br />

layer protocol. Accessing a transponder generally consists of writing, reading or<br />

locking its internal memory.<br />

Writing or reading a tag’s memory does not require reader validation. However,<br />

if a memory portion is locked, a reader might not be able to read or write it. A<br />

reader that wants to lock a portion of the memory, such as the TID memory portion<br />

or the user memory bank, should validate itself by issuing an access password.<br />

Other than sending writing or reading instructions, a reader is able to terminate<br />

indefinitely tag’s operation by issuing another password-protected comm<strong>and</strong>.<br />

81


2 – <strong>Security</strong><br />

Figure 2.15.<br />

Transponder architecture<br />

Figure 2.16.<br />

Encryption module<br />

2.6.2 Proposed Tag Architecture<br />

As RFID technology becomes ubiquitous, new sets of functionalities are being added<br />

to tags <strong>and</strong> readers, <strong>and</strong>, thus, new threats <strong>and</strong> risks are emerging as well. Counterfeiting<br />

is one of the most important issues that RFID users may encounter. A<br />

well-designed tag may reduce counterfeiting <strong>and</strong> may help to give an additional value<br />

to the object to which the tag is attached.<br />

The tag architecture that is introduced in this section may be useful to efficiently<br />

address counterfeiting <strong>and</strong> authentication issues because of its public-key<br />

cryptographic module. Authenticated <strong>and</strong> counterfeit-free tags may provide confidence<br />

to RFID users, allowing that technology to enhance its scope <strong>and</strong> to reach a<br />

Figure 2.17.<br />

Crypto writing <strong>and</strong> reading operations<br />

82


2 – <strong>Security</strong><br />

Figure 2.18.<br />

Tag authentication algorithm<br />

higher degree of expansion.<br />

The tag architecture that we introduce is compliant with the EPC C1G2 protocol<br />

<strong>and</strong> comprises a public-key encryption module. The architecture of the novel<br />

RFID tag is presented in Figure 2.15. It is divided in the following macro-modules<br />

according to its functionality.<br />

ˆ Decoder/Encoder (DECENC). This module is in charge of decoding queries arriving<br />

from the interrogator <strong>and</strong> encoding the responses that the tag backscatters.<br />

This module deals directly with physical data encoding, PIE when decoding<br />

<strong>and</strong> FM0 or MMS when encoding. In addition, this module also decodes<br />

interrogator instructions.<br />

ˆ Main Control Unit (MCU). It is the control unit of the whole tag. It keeps a<br />

record of the state of the tag <strong>and</strong> deals directly with interrogator comm<strong>and</strong>s.<br />

ˆ Output Control Unit (OCU). After MCU decides whether to answer or not<br />

to an interrogator comm<strong>and</strong>, the OCU takes control <strong>and</strong> <strong>for</strong>mats the output<br />

response.<br />

ˆ Memory (MEM). It is the memory of the tag. It includes the memory banks.<br />

ˆ Encryption Module (CRY). It is the public-key encryption module. It becomes<br />

active only when the interrogator issues a read comm<strong>and</strong> related to encrypted<br />

data.<br />

Most of these modules are intended to pursue a specific EPC C1G2 function;<br />

indeed, the tag was designed based on the instruction set required by the EPC<br />

83


2 – <strong>Security</strong><br />

C1G2 protocol. However, CRY has been added in order to enhance transponder’s<br />

capabilities without altering the compatibility with EPC C1G2 protocol.<br />

Cryptographic Architecture<br />

CRY is a public-key encryption module suitable <strong>for</strong> authentication applications.<br />

Tags implementing this module are able to authenticate themselves as electronic<br />

signatures do. Thus, our architecture helps to reduce counterfeiting.<br />

The CRY module is a simplified low-efficient version of the RSA algorithm that<br />

shares the same bus with OCU <strong>and</strong> MEM.<br />

CRY per<strong>for</strong>ms the encryption with the secret key shown in Figure 2.16. As<br />

explained in Section 2.5.1, the secret key algorithm, D K0 , is a power operation. It<br />

is composed by a secret pair D,q that defines the exponent <strong>and</strong> the modulus used<br />

in the encryption. Thus, a plaintext P is encrypted into a ciphertext C that can be<br />

decrypted by anyone who possesses the public function E K0 .<br />

In our design, each one of the elements in the secret pair D,q is a 1024-bit value<br />

fixed <strong>and</strong> wired internally in CRY. A 1024-bit secret key assures a high level of<br />

protection <strong>for</strong> the ciphertext which resultant length is 1024 bits as well. Secret keys<br />

are not automatically generated by CRY, they should be previously generated with<br />

proper tools.<br />

In order to avoid overloading the memory, in<strong>for</strong>mation that is meant to be encrypted<br />

is actually stored inside the tag in its plain <strong>for</strong>m, i.e. without encryption.<br />

Thus, when a user wants to access encrypted in<strong>for</strong>mation, CRY encrypts it <strong>and</strong><br />

delivers the associated ciphertext.<br />

CRY behavior <strong>and</strong> usefulness are easily understood by analyzing its writing <strong>and</strong><br />

reading mechanisms. Our implementation uses the User Memory exclusively <strong>for</strong><br />

cryptographic operations. Consequently, in<strong>for</strong>mation that is intended to be read in<br />

plain <strong>for</strong>m cannot be stored in the user memory.<br />

A generic crypto writing operation is presented in the left segment of Figure 2.17.<br />

When a user wants to write an authenticating signature into the tag, he/she writes<br />

16-bit plaintext blocks into the user memory. Afterward, he/she may lock the user<br />

memory bank, avoiding further writing-accesses to the signature. A user may efficiently<br />

authenticate a tag by writing signature data that combines the tag identifier<br />

number <strong>and</strong> pertinent in<strong>for</strong>mation of the object to which the tag is attached.<br />

In Figure 2.17, we present the crypto reading operation. Our design does not<br />

allow reading the user memory if it is not done with a cryptographic scope. When<br />

a user requests encrypted in<strong>for</strong>mation, the tag maps a single 16-bit plaintext word<br />

into a 1024-bit ciphertext by means of CRY.<br />

With our cryptographic tag, a producer who wants to offer an authentication<br />

system, may pursue a crypto writing operation using the tag identifier as plaintext.<br />

Thus, a user may verify tag authenticity by following the algorithm in Figure 2.18.<br />

84


2 – <strong>Security</strong><br />

Any user in possession of the public function E K0 , is able to per<strong>for</strong>m tag authentication.<br />

Initially, the tag identifier (T ID) <strong>and</strong> the ciphered tag identifier (CID) are<br />

read from the tag’s memory. Afterwards, the deciphering public function is applied<br />

to CID to compute the plain decrypted identifier (P ID). By comparing P ID <strong>and</strong><br />

ID, it is possible to authenticate the tag.<br />

Figure 2.19.<br />

Tag recognition <strong>and</strong> authentication example<br />

An Application Example<br />

EPC C1G2 instruction set includes a large number of comm<strong>and</strong>s or instructions.<br />

Practical usefulness of the protocol can be perceived by means of an application<br />

example. In the following, we present an example of a reader that wants to verify<br />

the authenticity of a set of tags.<br />

We suppose that within the reader interrogation field there are four different<br />

tags. We also hypothesize that the tags have been prepared <strong>for</strong> the authentication<br />

procedure described in the previous section. In order to present the example, we<br />

illustrate reader queries, tags responses <strong>and</strong> tags status.<br />

Figure 2.19 presents the first phase of our example. The reader manages the tag<br />

population in order to single out a tag. First, the reader sends a Select comm<strong>and</strong> to<br />

execute a broad selection; tags matching the selection criterion set their inventory<br />

flags. For this particular case, the selection mask is compared with the first part<br />

of the EPC code; as expected, just three out of the four tags are selected. After,<br />

the reader issues a Query comm<strong>and</strong> to start a new inventory round; selected tags<br />

compute their QPN. Subsequently, the reader broadcasts QueryRep comm<strong>and</strong>s until<br />

a tag responds with its temporal address.<br />

85


2 – <strong>Security</strong><br />

Once a tag has been singled out, the reader is able to verify its authenticity.<br />

Every access or cryptography comm<strong>and</strong> sent by the reader must specify the temporal<br />

address of the tag previously selected, which in this case is the second one. As seen in<br />

Figure 2.19, the reader first read the tag identifier <strong>and</strong> then queries <strong>for</strong> the encrypted<br />

identifier, requesting one 16-bit word at a time. Verification <strong>and</strong> authentication take<br />

place when the user executes the algorithm already explained in Figure 2.18.<br />

In this simplified example, the tag identifier is 32-bit long. In any case, even if<br />

it is common to find much longer identifiers, the authentication procedure is always<br />

the same.<br />

1800<br />

1600<br />

1400<br />

Dynamic Power<br />

Static Power<br />

Total Power<br />

1200<br />

Power (µW)<br />

1000<br />

800<br />

600<br />

400<br />

200<br />

0<br />

128 256 512 1024<br />

Secret Key Length (bit)<br />

Figure 2.20.<br />

Power consumption <strong>for</strong> different key lengths<br />

2.6.3 Experimental Results<br />

Based on the proposed architecture, our design was described using the VHDL language.<br />

Afterwards, a gate-level description of the tag was obtained by synthesizing<br />

using a 90-nm HMOS industrial library. Circuit verification was done at both levels<br />

– RTL <strong>and</strong> netlist – of the design flow.<br />

When varying key length, circuit’s characteristics also fluctuate as shown in Figure<br />

2.20 <strong>and</strong> Figure 2.21. Area requirements <strong>and</strong> power consumption are constrained<br />

by the encryption module <strong>and</strong> the length of its key.<br />

In order to estimate time requirements, we evaluated the time spent by CRY to<br />

compute the encryption of a single memory word, while varying the secret key <strong>and</strong><br />

the memory word. The resulting time required by CRY is close to 539.5 ms on the<br />

average.<br />

86


2 – <strong>Security</strong><br />

Figure 2.21.<br />

Area requirements <strong>for</strong> different key lengths<br />

2.6.4 Conclusion<br />

In this section, we presented a novel RFID tag architecture. The design was synthesized,<br />

simulated <strong>and</strong> verified. The tag was conceived according to the EPC Class-1<br />

Generation-2 protocol <strong>for</strong> UHF RFID transponders, however it is able to work <strong>for</strong><br />

other frequencies as well without substantial changes.<br />

We added an encryption module to the tag design in order to improve tag capabilities<br />

<strong>for</strong> privacy protection <strong>and</strong> authentication. A suitable method <strong>for</strong> tag<br />

authentication was described; it showed itself useful <strong>for</strong> authenticating also the object<br />

that is attached to the tag. A large number of applications, such as small wine<br />

producers or large clothing manufacturers, may take advantage of this implementation.<br />

Future work involves the practical implementation of the proposed tag in a<br />

wine bottling chain to power it with an authentication mechanism.<br />

87


Chapter 3<br />

RFID Reader-to-Reader<br />

Anti-collision<br />

The wide adoption of Radio Frequency Identification (RFID) <strong>for</strong> applications that<br />

require a large number of tags <strong>and</strong> readers makes critical the reader-to-reader collision<br />

problem. Various anticollision protocols have been proposed, but the majority<br />

requires considerable additional resources <strong>and</strong> costs. The best protocol without<br />

noteworthy additional requirements is DCS, which is based on time division.<br />

This Chapter presents the Probabilistic DCS (PDCS) reader-to-reader anticollision<br />

protocol which employs probabilistic collision resolution. Differently by previous<br />

time division protocols, PDCS allows multichannel transmissions, according<br />

to international RFID regulations. A theoretical analysis is provided in order to<br />

clearly identify the behavior of the new parameter representing the probability. An<br />

improved evaluation method is presented, in order to evaluate more accurately the<br />

fairness of the protocols.<br />

The proposed protocol keeps the features of DCS, achieving more efficiency.<br />

Theoretical analysis demonstrates that the number of reader-to-reader collisions<br />

after a slot changing is decreased by over 30%. The simulation analysis validates the<br />

theoretical results, <strong>and</strong> shows that PDCS reaches better per<strong>for</strong>mance than previously<br />

presented reader-to-reader anticollision protocols.<br />

Radio Frequency Identification (RFID) is a well-known identification technology<br />

which is applied to several sectors, such as Supply Chain Management (SCM) [96],<br />

traceability [53], <strong>and</strong> emergency management [93]. The majority of RFID systems<br />

are composed by some RFID readers <strong>and</strong> many passive transponders, called tags.<br />

Passive tags get their power supply from the electromagnetic field of the reader.<br />

A reader can read <strong>and</strong> write the tag memories in its interrogation range, which is<br />

limited by the power requirements of the tag. However, the low power messages<br />

of the tags are affected by the stronger transmissions at the same frequency of the<br />

close readers. A reader affects the communications of other readers in its interference<br />

88


3 – RFID Reader-to-Reader Anti-collision<br />

Interrogation Ranges<br />

Interference Ranges<br />

Reader 1 Reader 2<br />

Figure 3.1.<br />

Reader to Reader Collision<br />

range. If two readers, within the reciprocal interference range, try simultaneously to<br />

communicate with different tags, the two transmissions may collide (reader-to-reader<br />

collision). Figure 3.1 shows an example of two tightly coupled readers.<br />

Usually, RFID systems <strong>for</strong> auto-identification employ ultra high frequency (UHF).<br />

In free space, the interrogation range of a reader that transmits at 33 dBm with tags<br />

that require 14 dB is approximately 7 meters. According to the European regulation<br />

<strong>for</strong> UHF RFID, ETSI EN 302 208-1 V1.2.1 [13], the threshold level over that signals<br />

may degrade RFID transmissions shall be −35 dBm or less depending on the RFID<br />

application. There<strong>for</strong>e, the corresponding interference range is approximately 70<br />

meters. The ratio between interrogation range <strong>and</strong> interference range is 10 times, as<br />

stated also in [30]. According to the reader deployment analysis presented in [47],<br />

the best placement model to cover a whole area is hexagonal. Figure 3.2 shows an<br />

example of the interference range of a reader <strong>and</strong> its hexagonal deployed neighbors.<br />

The high number of readers in the interference range can produce several collisions,<br />

impairing the network per<strong>for</strong>mance. The reader-to-reader collision must be carefully<br />

addressed, otherwise the RFID network could be ineffective.<br />

Listen Be<strong>for</strong>e Talk (LBT) is the optional reader-to-reader anticollision protocol<br />

proposed by the European st<strong>and</strong>ard [13], <strong>and</strong> it is based on Carrier Sense Multiple<br />

Access (CSMA). Although various other anticollision protocols have been proposed,<br />

the majority are not consistent with the readers actually produced, <strong>and</strong> require<br />

additional resources <strong>and</strong> costs. Waldrop et al. presented DCS <strong>and</strong> Colorwave [126]<br />

[125], based on time division. The transmissions are composed by rounds divided in<br />

timeslots called colors. DCS does not have noteworthy additional requirements <strong>and</strong><br />

with a correct configuration it can provide good per<strong>for</strong>mance. Colorwave does not<br />

89


3 – RFID Reader-to-Reader Anti-collision<br />

need a specific configuration, but it requires to manage an additional transmission<br />

among RFID readers. These protocols present an acceptable time efficiency <strong>and</strong><br />

provide a high probability that readers do not collide two times consecutively. Other<br />

protocols, Pulse [30, 31], HiQ [68], <strong>and</strong> NFRA [47], try to reach better per<strong>for</strong>mance<br />

using an additional control channel. However, these protocols require additional<br />

resources <strong>and</strong> are more expensive. G<strong>and</strong>ino et al. [52] proposed to introduce a<br />

new parameter in collision resolution of time division RFID anticollision protocols,<br />

representing the probability to change timeslot after a collision.<br />

This Section presents the Probabilistic DCS (PDCS) reader-to-reader anticollision<br />

protocol which employs the probability P . In DCS after every collision a reader<br />

r<strong>and</strong>omly changes timeslot. Since this change can produce new collisions, in PDCS<br />

after a collision readers change timeslot with probability P , so the number of readers<br />

that change timeslot <strong>and</strong> the resulting new collisions are reduced. Moreover, PDCS<br />

is a multichannel protocol, according to the majority of the international RFID regulations<br />

(e.g. [13]). The existing evaluation critera are analyzed <strong>and</strong> an improved<br />

evaluation method is presented, in order to find more accurately the fairness of the<br />

protocols.<br />

This Section presents a new theoretical analysis on the proposed protocol, <strong>and</strong><br />

it studies the effects of P . The behavior of PDCS has been simulated <strong>and</strong> compared<br />

with DCS <strong>and</strong> Colorwave in order to compare their time per<strong>for</strong>mance <strong>and</strong><br />

to validate the results of the theoretical analysis. Experimental results show that<br />

the number of Reader-to-Reader collisions after a slot changing decreases by over<br />

30%, <strong>and</strong> demonstrate that PDCS presents limited additional constraints <strong>and</strong> better<br />

time per<strong>for</strong>mance than previously proposed protocols with equivalent requirements.<br />

Thanks to the smaller number of readers that change timeslot, PDCS results suitable<br />

also to RFID reader networks with mobile nodes.<br />

3.1 Per<strong>for</strong>mance Evaluation Criteria<br />

According to the main state-of-the-art approaches recently proposed in the literature,<br />

there is not accordance on the most effective criteria <strong>for</strong> per<strong>for</strong>mance evaluation<br />

of a general RFID reader-to-reader anticollision protocol. In this section the main<br />

evaluation approaches are described, <strong>and</strong> a novel proposal is presented.<br />

The parameters that are used to evaluate RFID reader-to-reader anticollision<br />

protocols are:<br />

ˆ Waiting Time (WT), which corresponds to the time interval between the request<br />

<strong>and</strong> the transmission; it involves:<br />

– Average Reader Waiting Time (ARWT), which corresponds to the average<br />

WT <strong>for</strong> all the transmissions of a specific reader;<br />

90


3 – RFID Reader-to-Reader Anti-collision<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

R<br />

Figure 3.2.<br />

Reader-to-Reader Collision<br />

– Total Average Waiting Time (TAWT), which corresponds to the average<br />

WT <strong>for</strong> all the transmissions in the RFID network;<br />

– Average Average Waiting Time (AAWT), which corresponds to the average<br />

ARWT of all the readers in the RFID network;<br />

– Variance of Average Waiting Time (VAWT), which corresponds to the<br />

variance of ARWT of all the readers in the RFID network;<br />

– Reader Waiting Time Variance (RWTV), which corresponds to the variance<br />

of WT <strong>for</strong> all the transmissions of a specific reader;<br />

– Total Waiting Time Variance (TWTV), which corresponds to the variance<br />

of WT <strong>for</strong> all the transmissions in the RFID network;<br />

– Average Waiting Time Variance (AWTV), which corresponds to the average<br />

RWTV of all the readers in the RFID network;<br />

– Maximum Waiting Time (MWT), which corresponds to the longest WT<br />

among all the transmissions in the RFID network;.<br />

91


3 – RFID Reader-to-Reader Anti-collision<br />

ˆ Attempted Transmissions (AT), which corresponds to the total number of<br />

attempted transmissions in the RFID network;<br />

ˆ Number of Transmissions (NT), which corresponds to the total number of<br />

successfully per<strong>for</strong>med transmissions in the RFID network.<br />

3.1.1 Adopted Metrics<br />

In [46], Engels <strong>and</strong> Sarma state that the goals of reader-to-reader anti-collision<br />

protocols are to minimize the time span required to let all readers communicate at<br />

least once (MWT ), <strong>and</strong> to schedule all readers to communicate as often as possible<br />

(NT ).<br />

In [125], the authors consider the requirements of real-time applications as inventory<br />

detection, so they propose the goal of scheduling readers to communicate<br />

as often as possible (NT ). The total successful transmissions per<strong>for</strong>med by a set<br />

of readers according to different configurations is used to evaluate different configuration<br />

of Colorwave <strong>and</strong> to compare Colorwave <strong>and</strong> DCS. In [126], the successful<br />

transmission percentage ( NT ) is used to evaluate different configurations of DCS.<br />

AT<br />

Birari <strong>and</strong> Iyer [30] [31] use two parameters <strong>for</strong> the evaluation of anti-collision<br />

protocols: the throughput, which corresponds to the total number of successful<br />

transmissions per<strong>for</strong>med by all the readers per unit of time ( NT ); <strong>and</strong> the efficiency,<br />

time<br />

which corresponds to the successful transmission percentage ( NT ). AT<br />

In [68] the goal of anti-collision protocols is to maximize the number of readers<br />

simultaneously communicating ( NT ). time<br />

G<strong>and</strong>ino et al. [52] state that the goal of reader-to-reader protocols is to provide<br />

short (TAWT ) <strong>and</strong> steady (TWTV ) waiting times.<br />

3.1.2 Proposed Evaluation Criteria<br />

Methods based only on NT evaluate positively protocols where AT is close to NT ,<br />

AT<br />

also when NT is low. There<strong>for</strong>e, this kind of evaluation seems not effective, since it<br />

does not consider the throughput.<br />

The throughput is represented by NT , but this metric does not consider the<br />

time distribution of the transmissions <strong>and</strong> the different contribution of each reader<br />

to NT. There<strong>for</strong>e, NT is not suitable <strong>for</strong> applications that require constant quality<br />

of service <strong>for</strong> the whole RFID network.<br />

T AW T <strong>and</strong> T W T V are effective indexes of the throughput <strong>and</strong> of the per<strong>for</strong>mance<br />

stability. However, these parameters do not consider the differences among<br />

the per<strong>for</strong>mance of the single readers. Moreover, a reader with optimal per<strong>for</strong>mance<br />

can strongly increase T AW T , hiding several readers with very low per<strong>for</strong>mance,<br />

because each transmission has the same weight. There<strong>for</strong>e, we state that these<br />

92


3 – RFID Reader-to-Reader Anti-collision<br />

problems can be solved analyzing AAW T <strong>and</strong> V AW T , which give the same weight<br />

to each reader, instead of to each transmission. More in detail, a protocol should<br />

mainly minimize:<br />

ˆ AAWT, in order to schedule readers to communicate as soon as possible,<br />

ˆ VAWT, in order to minimize the quantity of readers with minor efficiency,<br />

ˆ TWTV, in order to provide steady per<strong>for</strong>mance,<br />

ˆ MWT, in order to avoid large gaps between two transmissions of the same<br />

reader.<br />

3.2 Related Work<br />

Several approaches try to address the reader-to-reader collision problem [64, 115].<br />

This section describes the main relevant anti-collision protocols <strong>and</strong> their requirements.<br />

3.2.1 ETSI EN 302 208-1 V1.2.1<br />

This st<strong>and</strong>ard [13] involves the optional use of a Carrier Sense Multiple Access<br />

(CSMA) protocol named ”Listen Be<strong>for</strong>e Talk” (LBT). In this protocol readers check<br />

if the channel is unoccupied be<strong>for</strong>e transmitting. However, collisions are possible<br />

when the gap between the start of two transmissions is small. The limited duty<br />

cycle provides all the RFID readers the opportunity to transmit.<br />

This protocol requires readers that are able to check if the channel is occupied.<br />

This can be considered the base ability which is now owned by all the readers that<br />

implement a reader-to-reader anti-collision protocols.<br />

3.2.2 Distributed Color System (DCS)<br />

In DCS [126] [125] each communication round is composed by time slots. Each RFID<br />

reader can communicate only during its time slot. When a transmission collides,<br />

each involved reader stops the communication <strong>and</strong> r<strong>and</strong>omly chooses a new timeslot<br />

that it reserves, sending a specific signal named kick. When the reserved slot is used<br />

by some neighbors, they choose a new slot <strong>and</strong> try at using it without reservation.<br />

The communications are divided in rounds. Each round is composed by µ timeslots.<br />

Each timeslot is composed by a kick phase <strong>and</strong> a transmission phase. The<br />

identification of a timeslot is called color. A color is assigned to a reader, <strong>and</strong> it<br />

works only during the corresponding time slot.<br />

93


3 – RFID Reader-to-Reader Anti-collision<br />

During the kick phase, each working reader that had collided at the previous<br />

transmission sends a kick. Each working reader that receives a kick changes immediately<br />

color.<br />

During the transmission phase, each working reader that has to read tags executes<br />

a transmission. If the transmission collides then the involved readers stop it<br />

<strong>and</strong> r<strong>and</strong>omly choose at a new color. At the subsequent round the colliding readers<br />

will send a kick, in order to reserve the timeslot.<br />

In the described protocol when more than one reader transmits a kick during<br />

the same slot, all the transmitting readers also receive the kick, <strong>and</strong> so they choose<br />

a new color.<br />

The kick does not transport any additional in<strong>for</strong>mation, but it is used only to<br />

communicate to neighbor readers that the channel is busy, so the readers do not need<br />

additional hardware in order to implement DCS. The only additional requirements<br />

with respect to LBT is represented by the synchronization.<br />

3.2.3 Colorwave<br />

Colorwave [126] [125] is a protocol based on DCS. This protocol introduces a variable<br />

quantity of timeslots that compose a round (µ), differently from DCS where the<br />

number of timeslots is fixed. The value is dynamically changed in order to increase<br />

the efficiency of the RFID network. When the number of collisions is high, the<br />

number of used colors <strong>for</strong> round rises, while when it is small the number of colors<br />

decreases. This protocol requires a special kick transmission, which states the change<br />

to a new quantity of colors. The kick phase is divided in two subphases, where<br />

normal kicks are sent during the first one, <strong>and</strong> color kicks during the second one.<br />

In order to manage changes in the number of colors <strong>for</strong> round, Colorwave introduces<br />

two couples of thresholds, one <strong>for</strong> the increases <strong>and</strong> the other <strong>for</strong> the decreases.<br />

Each reader counts its percentage of successful transmissions. When the percentage<br />

exceeds the second threshold of a couple the reader changes µ <strong>and</strong> communicated<br />

the change to its neighbors during the second kick subphases; if a reader has exceeded<br />

the first threshold of a couple <strong>and</strong> it receives color quantity kick compliant<br />

with the exceeded threshold, then it changes µ <strong>and</strong> communicates the change to its<br />

neighbors.<br />

The variable number of colors <strong>for</strong> round allows Colorwave to find autonomously a<br />

good configuration. However, in addition to the requirements of DCS, this protocol<br />

requires also to manage the color number kicks.<br />

3.2.4 <strong>Protocols</strong> with High Requirements<br />

Various protocols characterized by larger requirements have been proposed. Typically<br />

these protocols require an advanced communication system parallel to the<br />

94


3 – RFID Reader-to-Reader Anti-collision<br />

st<strong>and</strong>ard RFID network. There<strong>for</strong>e, they cannot be implemented with readers actually<br />

produced, <strong>and</strong> require additional costs.<br />

The main protocol in this group is HiQ [68], which is based on rein<strong>for</strong>cement<br />

learning, <strong>and</strong> which involves a hierarchical structure composed by three levels. The<br />

RFID readers, which represent the lowest level, require channel resources to the<br />

higher level. The elements of the second level require resources to the highest level,<br />

<strong>and</strong> distribute them to the readers. This system requires a communication system<br />

<strong>for</strong> the resources management.<br />

A recent protocol which overcomes HiQ per<strong>for</strong>mance is NFRA [47]. This protocol<br />

requires a central server, which communicate with the RFID readers through an<br />

additional channel at 433 MHz. This communication system requires that each<br />

reader owns an additional radio reception device <strong>for</strong> that frequency.<br />

3.2.5 <strong>Protocols</strong> based on Power Control<br />

An alternative system to avoid collisions is the Power Control [36] [83]. The power<br />

can be decreased in order to reduce the interference range. These protocols try to<br />

optimize the ratio between interference range <strong>and</strong> interrogation range. However,<br />

the reduction of the interrogation range affects the per<strong>for</strong>mance of the RFID network.<br />

According to ETSI EN 302 208-1 V1.2.1 [13], threshold level of the noise<br />

<strong>for</strong> transmitting without interferences shall be -35 dBm e.r.p. or less. Approximately,<br />

if a tag need -14 dBm in order to be in the interrogation range of the reader,<br />

the ratio between the interference range <strong>and</strong> the interrogation range is close to 20<br />

times. There<strong>for</strong>e, in order to avoid reader-to-reader collisions reducing the power,<br />

the interrogation area cannot be accurately covered.<br />

3.3 Probabilistic DCS (PDCS) Protocol<br />

In DCS, after sensing a collision, all the involved readers choose a new color <strong>and</strong><br />

reserve it. However, when a large part of the timeslots are just used, a change of<br />

color probably generates a second change without timeslot reservation, so a probable<br />

collision between two readers occurs. Furthermore, the kicked reader would not<br />

transmit during the reserved round, <strong>and</strong> during the subsequent collision round, so it<br />

would wait two rounds be<strong>for</strong>e transmitting. After a collision between two readers,<br />

all the involved nodes will change their color, so both the readers will reserve a<br />

new color. When the majority of the colors are used, both the new timeslots could<br />

be engaged, so two readers would change their color. There<strong>for</strong>e, this double color<br />

change could generate two second generation collisions.<br />

In [52], the authors state that the introduction of a new parameter P , which<br />

represents the probability of readers to change color after a collision, can increase<br />

95


3 – RFID Reader-to-Reader Anti-collision<br />

the per<strong>for</strong>mance, decreasing the number of collisions generated by the change of<br />

color due to a previous collision. According to [52], this section describes a new<br />

protocol named Probabilistic DCS (PDCS) which is based on the introduction of P<br />

in DCS. Differently by the probabilistic version of DCS presented in [52], PDCS is<br />

a multichannel protocol, which can manage an arbitrary number or frequency channels,<br />

according to the various regulations about RFID. There<strong>for</strong>e, after a collision<br />

in PDCS, readers choose both a new color, which represent the time slot, <strong>and</strong> a new<br />

channel. There<strong>for</strong>e, the total number of slots available each round is equal to the<br />

number of colors multiplied <strong>for</strong> the number of channels.<br />

The variables of the protocol are the following:<br />

ˆ color i , the index of the time slot that the i th reader can use <strong>for</strong> transmissions;<br />

ˆ channel i , the index of the frequency channel that the i th reader can use <strong>for</strong><br />

transmissions;<br />

ˆ prev channel i , the index of the previous channel that the i th reader used <strong>for</strong><br />

transmissions;<br />

ˆ µ, the number of time slots in a round;<br />

ˆ µc, the number of channels in a round;<br />

ˆ kickflag i , the boolean flag that is true when the i th reader requires a kick;<br />

ˆ transflag i , the boolean flag that is true when the i th reader requires a transmission;<br />

As in DCS, in PDCS the transmissions are organized in rounds divided in timeslots.<br />

Each slot is composed by the following phases <strong>and</strong> subroutines:<br />

ˆ Timeslot initialization, where the readers update the value of their variables;<br />

– New timeslot:<br />

∀i : color i = (color i + 1) mod (µ);<br />

if (the i th reader has to read tags)<br />

then transflag i = true;<br />

ˆ Kick phase, where the readers send the kicks in order to manage the slot<br />

reservation, <strong>and</strong> choses a new color if receives a kick.<br />

– Kick sending:<br />

if (kickflag i = true AND color i = 0)<br />

then the i th reader sends the kick;<br />

kickflag i = false;<br />

96


3 – RFID Reader-to-Reader Anti-collision<br />

– Kick resolution:<br />

if (the i th reader receives a kick<br />

on channel i AND color i = 0)<br />

then prev channel i = channel i ;<br />

while (color i = 0<br />

AND channel i = prev channel i )<br />

color i = r<strong>and</strong>om(µ);<br />

channel i = r<strong>and</strong>om(µc);<br />

ˆ Transmission phase, where the readers try to communicate with the tags, <strong>and</strong><br />

eventually choses a new color if collides.<br />

– Transmission:<br />

if (transflag i = true AND color i = 0)<br />

then the i th reader transmits<br />

transflag i = false;<br />

– Collision resolution:<br />

if (a transmission of the i th<br />

collides AND r<strong>and</strong>om(1) < P )<br />

then color i = r<strong>and</strong>om(µ);<br />

channel i = r<strong>and</strong>om(µc);<br />

kickflag i = true;<br />

transflag i = true;<br />

reader<br />

3.4 Theoretical analysis<br />

PDCS is characterized by the probability P . When P is equal to 1, PDCS corresponds<br />

to DCS, so DCS can be considered a particular case of PDCS with P = 1.<br />

The most relevant parameter <strong>for</strong> the evaluation of the time per<strong>for</strong>mance of an<br />

anti-collision protocol <strong>for</strong> RFID networks is WT. The difference between PDCS <strong>and</strong><br />

DCS is the collision resolution, so its effects on WT must be carefully analyzed.<br />

The first step of this theoretical analysis is focused on the behavior of PDCS<br />

after one collision between two readers. A reader involved in a collision changes its<br />

color with probability P , so after a collision between two readers three cases are<br />

possible:<br />

1. no reader changes its color, so at the subsequent round the involved readers<br />

will receive a kick <strong>and</strong> they will change the color without reservation;<br />

97


3 – RFID Reader-to-Reader Anti-collision<br />

2. one reader changes its color, so at the subsequent round one reader will transmit<br />

with the previous color, <strong>and</strong> the second reader will reserve a new color,<br />

maybe requiring another reader to change;<br />

3. both the readers change color, this case corresponds to the DCS collision resolution.<br />

Case 1 is worse than DCS, since the involved readers will lose a second round.<br />

Case 2 is better than DCS, since one reader probably will not produce second generation<br />

collisions. Case 3 corresponds to DCS. According to the value of P, each<br />

case has a characteristic probability, so a proper value of P maximizes the number<br />

of occurrences of Case 2. Figure 3.3 shows the probability of each case, according<br />

to P . Roughly analyzing the effects of P on the per<strong>for</strong>mance of the RFID reader<br />

network, it is possible to consider that Case 1 is negative, Case 2 is positive, <strong>and</strong><br />

that Case 3 is intermediate. Starting from P = 1, a short decrease of P corresponds<br />

to:<br />

ˆ a slight rise of Case 1 (negative case);<br />

ˆ a considerable grow of Case 2 (positive case);<br />

ˆ a sharp fall of Case 3 (intermediate case).<br />

There<strong>for</strong>e, since Case 1 improves the per<strong>for</strong>mance of the protocol, <strong>and</strong> Case 2<br />

decreases them, the values of P shown by the right part of the graph in Figure 3.3<br />

should bring positive results.<br />

Although WT is the best metric <strong>for</strong> RFID network evaluation, the effects of the<br />

different cases on the time per<strong>for</strong>mance of the protocol can be more clearly analyzed<br />

observing the number of second generation collisions (γ), which represents the<br />

average number of readers involved by second generation collisions produced by the<br />

first generation collisions (φ), which represents the number of colliding readers<br />

in a round.<br />

3.4.1 Second Generation Collisions<br />

The collisions affect the time per<strong>for</strong>mance of RFID networks, since the involved<br />

readers have to wait be<strong>for</strong>e transmitting. In DCS/PDCS, each collision generates<br />

possible new collisions. This behavior can produce a relevant number of collisions<br />

at each round, so it must be carefully analyzed. This section carefully analyzes<br />

the effects of a collision between two readers. In order to calculate γ, it can be<br />

partitioned in three γ i related to each case described in the previous section, so we<br />

have:<br />

98


3 – RFID Reader-to-Reader Anti-collision<br />

Figure 3.3.<br />

Color Change After a Collision Between Two Readers<br />

Each γ i is determined by the following <strong>for</strong>mula:<br />

γ = γ 1 + γ 2 + γ 3 . (3.1)<br />

γ i = γP i ∗ γc i . (3.2)<br />

Where γP i represents the probability of Case i, as reported in Fig. 3.3, <strong>and</strong> where<br />

γc i represents the number of second generation collision due to Case i. The <strong>for</strong>mulas<br />

to calculate each γ i are presented in the following, where γc i is determined by µ <strong>and</strong><br />

by the number of engaged color (ɛ),<br />

The probability of Case 1 is:<br />

γP 1 = (1 − P ) 2 . (3.3)<br />

This case involves a given double kick. After the kick each reader changes color<br />

without presentation, so the number of produced second generation collisions is<br />

related with the state of the new colors. If:<br />

ˆ both the colors are free, then no second generation collision is produced; the<br />

related contribution to γc 1 is null;<br />

ˆ one color is free <strong>and</strong> one color is engaged, then one second generation collision<br />

between two readers is produced; the related contribution to γc 1 is:<br />

99


3 – RFID Reader-to-Reader Anti-collision<br />

γc 1a = 2 ·<br />

ɛ<br />

µ − 1 · 1 − ɛ · 2; (3.4)<br />

µ − 1<br />

ˆ both the colors are engaged, then two second generation collisions between<br />

two couples of readers are produced; the related contribution to γc 1 is:<br />

γc 1b =<br />

ɛ<br />

µ − 1 · ɛ − 1 · 4; (3.5)<br />

µ − 1<br />

ˆ the same free color is selected, then one second generation collision between<br />

two readers is produced; the related contribution to γc 1 is:<br />

γc 1c = 1 − ɛ<br />

µ − 1 · 1 · 2; (3.6)<br />

µ − 1<br />

ˆ the same engaged color is selected, then one second generation collision between<br />

three readers is produced; the related contribution to γc 1 is:<br />

There<strong>for</strong>e, we have that:<br />

The probability of Case 2 is:<br />

γc 1d =<br />

ɛ<br />

µ − 1 · 1 · 3; (3.7)<br />

µ − 1<br />

γ 1 = (1 − P ) 2 ∗ (γc 1a + γc 1b + γc 1c + γc 1d ). (3.8)<br />

γP 2 = 2 · P · (1 − P ). (3.9)<br />

In this case the reader that does not change the color does not produce second<br />

generation collisions, but it can collide with the second reader, since it could choose<br />

again the same color. The second reader changes color, so the number of produced<br />

second generation collisions is related with the state of the new color. If:<br />

ˆ the color is free, then no second generation collision is produced; the related<br />

contribution to γc 2 is null;<br />

ˆ the color is engaged, then one reader changes color without reservation, so a<br />

collision between 2 readers has probability equal to the percentage of engaged<br />

colors; the related contribution to γc 2 is:<br />

γc 2a = ɛ µ ·<br />

100<br />

ɛ · 2; (3.10)<br />

µ − 1


3 – RFID Reader-to-Reader Anti-collision<br />

ˆ the color is the same of the previous collision, then there is a double kick<br />

between the two readers of the first collision; the related contribution to γc 2<br />

is:<br />

There<strong>for</strong>e, we have that:<br />

The probability of Case 3 is:<br />

γc 2b = 1 ɛ<br />

· (2 · · 1−ɛ · 2 + ɛ · ɛ−1 · 4+<br />

µ µ−1 µ−1 µ−1 µ−1<br />

1−ɛ · 1 · 2 + ɛ · 1 · 3). (3.11)<br />

µ−1 µ−1 µ−1 µ−1<br />

γ 2 = 2 · P · (1 − P ) · (γc 2a + γc 2b ). (3.12)<br />

γP 3 = P 2 . (3.13)<br />

In this case both the readers change color. Also in this case the number of<br />

produced second generation collisions is related with the state of the new colors. If:<br />

Figure 3.4. (a) γc 1 (b) γc 2 (c) γc 3 with µ = 20<br />

ˆ both the colors are free, then no second generation collision is produced; the<br />

related contribution to γc 3 is null;<br />

ˆ one color is free <strong>and</strong> one color is engaged, then one reader changes color without<br />

reservation, so a collision between 2 readers has probability equal to the<br />

percentage of engaged colors; the related contribution to γc 3 is:<br />

γc 3a = 2 · ɛ<br />

µ · 1 − ɛ<br />

µ · ɛ · 2; (3.14)<br />

µ − 1<br />

ˆ both the colors are engaged, then two readers change color without reservation,<br />

so they could produce:<br />

101


3 – RFID Reader-to-Reader Anti-collision<br />

– one collision between two readers,<br />

γc 3b1 = 2 · ɛ−1 ɛ−1 · (1 − ) · 2+<br />

µ−1 µ−1<br />

(1 − ɛ−1 ) · 1 · 2, (3.15)<br />

µ−1 µ−1<br />

– two collisions between two couples of readers,<br />

γc 3b2 = ɛ−2<br />

µ−1 · ɛ−2<br />

– one collision between three readers,<br />

1 · ɛ−1<br />

µ−1<br />

µ−1 · 4+<br />

µ−1 · 4, (3.16)<br />

– or no collision;<br />

γc 3b3 = ɛ − 1<br />

µ − 1 · 1 · 3, (3.17)<br />

µ − 1<br />

the related contribution to γc 3 is:<br />

γc 3 b = ɛ µ · ɛ − 1<br />

µ · (γc 3b1 + γc 3b2 + γc 3b3 ); (3.18)<br />

ˆ the same free color is selected, then there is a double kick between the two<br />

readers of the first collision; the related contribution to γc 3 is:<br />

γc 3c = (1 − ɛ ) · 1<br />

µ µ·<br />

ɛ<br />

(2 · · (1 − ɛ ) · 2+<br />

µ−1 µ−1<br />

ɛ · ɛ−1 · 4+<br />

µ−1 µ−1<br />

(3.19)<br />

(1 − ɛ ) · 1 · 2+<br />

µ−1 µ−1<br />

ɛ · 1 · 3); µ−1 µ−1<br />

ˆ the same engaged color is selected, then three readers change color without<br />

reservation, so they could produce:<br />

– one collision between two readers,<br />

γc 3d1 = 3 · ɛ−1 ɛ−1 · (1 − )·<br />

µ−1 µ−1<br />

(1 − ɛ ) · 2+<br />

µ−1<br />

(1 − ɛ−1 ) · (1 − ɛ )·<br />

(3.20)<br />

µ−1 µ−1<br />

2 · 2, µ−1<br />

102


3 – RFID Reader-to-Reader Anti-collision<br />

– two collisions between two couples of readers,<br />

γc 3d2 = 3 · ɛ−1<br />

µ−1 · ɛ−2<br />

µ−1<br />

3 · ɛ−1<br />

µ−1<br />

ɛ−1 · (1 − ) · 4+<br />

µ−1<br />

· (1 −<br />

ɛ−1<br />

µ−1 · 1<br />

– three collisions between three couples of readers,<br />

– one collision between three readers,<br />

µ−1 · 4, (3.21)<br />

γc 3d3 = ɛ − 1<br />

µ − 1 · ɛ − 2<br />

µ − 1 · ɛ − 3 · 6, (3.22)<br />

µ − 1<br />

γc 3d4 =<br />

( ) ( 2<br />

1 − ɛ−1 1<br />

·<br />

µ−1 µ−1)<br />

· 3+<br />

3 · ɛ−1 ɛ−1 · (1 − ) · 1<br />

µ−1 µ−1<br />

µ−1 · 3, (3.23)<br />

– one collision between three readers <strong>and</strong> one collision between two readers,<br />

– one collision between four readers,<br />

– or no collision.<br />

the related contribution to γc 3 is:<br />

There<strong>for</strong>e, we have that:<br />

γc 3d5 = ɛ − 1<br />

µ − 1 · ɛ − 2<br />

µ − 1 · 2 · 5, (3.24)<br />

µ − 1<br />

γc 3d6 = ɛ − 1 ( ) 2 1<br />

µ − 1 · · 4, (3.25)<br />

µ − 1<br />

γc 3d = ɛ µ · 1<br />

µ ·<br />

6∑<br />

γc 3di . (3.26)<br />

i=1<br />

γ 3 = P 2 · (γc 3a + γc 3b + γc 3c + γc 3d ). (3.27)<br />

Figure 3.4 shows the values of γc 1 , γc 2 , <strong>and</strong> γc 3 , <strong>and</strong> of their components, with<br />

µ equal to 20 <strong>and</strong> according to different values of ɛ. The component that mainly<br />

affects the value of γc 1 is γc 1b , which represents the number of second generation<br />

collisions due to the choice of two engaged new colors. γc 1 rises constantly, according<br />

to the grow of ɛ. The component that mainly affects the value of γc 2 is γc 2a ,<br />

which represents the number of second generation collisions due to a kick on an<br />

103


3 – RFID Reader-to-Reader Anti-collision<br />

engaged color, <strong>and</strong> to the subsequent change to a new engaged color. The component<br />

that mainly affects the value of γc 3 is γc 3b , which represents the number of second<br />

generation collisions due to two kicks on a engaged colors, <strong>and</strong> to the subsequent<br />

change to two new colors.<br />

Figure 3.5 compares the three γc i values according to max = 20 <strong>and</strong> to ɛ between<br />

0 <strong>and</strong> 19. As it was supposed at the beginning of this analysis, γc 1 , which corresponds<br />

to Case 1, produces the largest number of second generation collisions; γc 2 ,<br />

which corresponds to Case 2, produces the smallest number of second generation<br />

collisions; γc 3 , which corresponds to Case 3, produces a medium number of second<br />

generation collisions.<br />

Figure 3.5. γ i with max = 20<br />

Figure 3.6 shows γ according to various values of P , with max = 20, <strong>and</strong> ɛ<br />

between 0 <strong>and</strong> 19. The graph roughly highlights the effects of P on γ. With P<br />

equal to 0 <strong>and</strong> 1, γ is respectively equal to γc 1 <strong>and</strong> to γc 3 . Since γc 1 is always<br />

larger than γc 3 , the value of γ reached by P ′ < 0.50 is larger than γ reached by<br />

P ′′ = 1−P ′ , so the minimization of γ requires P >= 0.50. When ɛ is between 0 <strong>and</strong><br />

3 the smallest γ is reached by P = 1, when ɛ is between 4 <strong>and</strong> 12 the smallest γ is<br />

reached by P = 0.75, <strong>and</strong> when ɛ is between 15 <strong>and</strong> 19 the smallest γ is reached by<br />

P = 0.50. There<strong>for</strong>e, in order to minimize γ, at the rise of ɛ from 0 to µ − 1 should<br />

correspond the decrease of P from 1 to 0.50.<br />

104


3 – RFID Reader-to-Reader Anti-collision<br />

When a collision among some readers produces new collisions among a larger<br />

number of readers, the number of collisions increases, but the engaged colors decrease.<br />

The decrease of engaged colors produces a decline in γ, until the number<br />

of colliding readers is stable. Since γ is the average number of second generation<br />

collision produced by the collision of two readers, when γ is greater than 2, the<br />

number of collision rises, when γ is less than 2, the number of collision decreases,<br />

<strong>and</strong> when γ is about 2 the number of collision is stable.<br />

Figure 3.6.<br />

γ with max = 20, according to various P values.<br />

In order to find the optimal values of P that minimize γ, we can set the first<br />

derivative of Function (3.1) to 0 <strong>and</strong> solve <strong>for</strong> P . So we have:<br />

2γc 1 − γc 2<br />

P =<br />

. (3.28)<br />

2γc 1 − 2γc 2 + 2γc 3<br />

Figure 3.7 shows the values on P that minimize γ with µ equal to 20 <strong>and</strong> ɛ<br />

between 0 <strong>and</strong> 19.<br />

Figure 3.8 shows the comparison among the γ values reached by PDCS <strong>and</strong><br />

DCS. The comparison is per<strong>for</strong>med <strong>for</strong> values of ɛ between µ <strong>and</strong> µ − 1, since an<br />

2<br />

efficient protocol should work with a value of ɛ quite next to µ. Setting P to a<br />

value complaint with the value of ɛ, respect with DCS, PDCS reaches over 30% of<br />

reduction of the second generation collisions.<br />

105


3 – RFID Reader-to-Reader Anti-collision<br />

Figure 3.7. Values of P that minimize γ with µ = 20.<br />

3.4.2 DCS-Like Protocol Behavior<br />

In order to compare PDCS to DCS, it is required to analyze the behavior of DCS.<br />

At this purpose we can evaluate φ <strong>and</strong> γ. When<br />

ˆ γ<br />

φ > 1, ɛ decreases according to the larger number of colliding slots, so also γ φ<br />

decreases;<br />

ˆ γ<br />

φ<br />

= 1, the network is steady;<br />

ˆ γ<br />

φ < 1, ɛ increases, so also γ φ increases;<br />

There<strong>for</strong>e the network should approach a steady condition, where γ φ ∼ = 1. More<br />

in deep, the behavior of the protocols changes according to three classes of configuration:<br />

1. µ ≪ number of neighbors, in this class the number of colors is too low, so<br />

the network is characterized by several collisions, the network approaches to<br />

high γ <strong>and</strong> φ, <strong>and</strong> their values are greater when µ is lower; the provided WT<br />

should be not good, since the readers have often to wait <strong>for</strong> many rounds;<br />

106


3 – RFID Reader-to-Reader Anti-collision<br />

2. µ ≫ number of neighbors, this class is characterized by some starting r<strong>and</strong>om<br />

collisions, <strong>and</strong> γ ≫ 1, so the network approaches a steady condition, where<br />

φ<br />

there are no collision; however, WT converges to µ − 1, because each reader<br />

must wait one round less a slot between two transmissions;<br />

3. µ ∼ = number of neighbors, in this class there are the best configurations, since<br />

it contains the configuration with the lowest µ so that the network approaches<br />

a steady condition where there are no collision; apparently the best configuration<br />

should be µ = number of neighbors + 1, but according to the previous<br />

analysis, if γ > 1 then φ increases, so the effects of the starting r<strong>and</strong>om collisions<br />

<strong>and</strong> the collisions due to a change of slot generated by a neighbor with<br />

φ<br />

a different neighborhood together with the high ɛ can make the network approaches<br />

a steady condition with collisions; there<strong>for</strong>e the best configuration<br />

shall require a larger µ.<br />

The main effect of P < 1 is the reduction of γ <strong>for</strong> good configurations. This<br />

result decreases also the value of γ , so when the network is in the third class, where<br />

φ<br />

µ ∼ = number of neighbors, it shall approach to a steady condition where there are<br />

no collision with a lower µ.<br />

Figure 3.8.<br />

Percentage Difference of γ between PDCS with various P <strong>and</strong> DCS.<br />

107


3 – RFID Reader-to-Reader Anti-collision<br />

3.5 Experimental Simulations<br />

Simulations of DCS, of Colorwave, <strong>and</strong> PDCS were per<strong>for</strong>med on several kinds of<br />

RFID networks. The characteristics of the simulated networks are:<br />

ˆ total number of readers: 250;<br />

ˆ number of neighbors <strong>for</strong> readers: average (AN) <strong>and</strong> variance (NV);<br />

ˆ method of reader deployment: r<strong>and</strong>om deployment.<br />

Each protocol configuration was simulated 50 times <strong>for</strong> 2 · 10 5 timeslots. The<br />

simulator has been written in java language, <strong>and</strong> the simulations have been run on<br />

a DELL WorkStation Precision T7500, under Linux.<br />

3.5.1 PDCS Behavior According to µ<br />

The value of µ must be carefully selected, in order to reach good per<strong>for</strong>mance. When<br />

µ is too low, the percentage of colliding transmissions is high, so WT is high <strong>and</strong><br />

it is not steady. When µ is too high, WT is always similar to µ − 1 timeslots.<br />

According to the theoretical analysis the best value of µ is the lowest so that WT is<br />

steady. Furthermore, the theoretical analysis states that the introduction of P < 1<br />

decreases the best µ improving WT.<br />

Fig. 3.9 shows the AAWT provided by DCS <strong>and</strong> PDCS according to several µ<br />

<strong>and</strong> P , on a network with AN = 9.94, NV = 9.41, <strong>and</strong> r<strong>and</strong>om deployment. This<br />

graph is a good indicator of the time per<strong>for</strong>mance of the network. Fig. 3.10 shows<br />

the TWTV in the same conditions, which is an indicator of the steadiness of the<br />

network, VAWT, which is an indicator of the fairness of the network, <strong>and</strong> MWT.<br />

The graphs support the results of the theoretical analysis presented in Section 3.4.2:<br />

1. µ ≪ number of neighbors (µ ≪ 10), the provided WT is not good, since<br />

the readers collide many times; DCS provides better per<strong>for</strong>mance, <strong>and</strong> PDCS<br />

provides the best AAWT with P as close as possible to 1;<br />

2. µ ≫ number of neighbors (µ ≫ 10), the network is steady, since there are<br />

no collision; however, WT converges to µ − 1 timeslots, because each reader<br />

must wait one round less a slot between two transmissions; DCS <strong>and</strong> PDCS<br />

provide the same per<strong>for</strong>mance, independently by P ;<br />

3. µ ∼ = number of neighbors (µ ∼ = 10), in this class there are the best configurations,<br />

where the network approaches a steady condition without collisions<br />

at the lowest µ; the best configurations require µ > 10; <strong>for</strong> DCS <strong>and</strong> PDCS<br />

with a high probability (P ≥ 0.9), the best AAWT is provided with µ = 13;<br />

108


3 – RFID Reader-to-Reader Anti-collision<br />

Figure 3.9. AAWT provided by DCS <strong>and</strong> PDCS with AN = 9.94, NV =<br />

9.41, <strong>and</strong> r<strong>and</strong>om deployment<br />

Figure 3.10. TVWT (a), VAWT (b), <strong>and</strong> MWT provided by DCS <strong>and</strong> PDCS with<br />

AN = 9.94, NV = 9.41, <strong>and</strong> r<strong>and</strong>om deployment<br />

<strong>for</strong> PDCS with a low probability (P < 0.9), the best AAWT is provided with<br />

µ = 12; both these cases provide AAWT similar to µ − 1 timeslots, so PDCS<br />

with a low probability reaches the best time per<strong>for</strong>mance; the best AAWT is<br />

provided by PDCS with P = 0.72 <strong>and</strong> µ = 12, where AAWT= 5.08 s, <strong>and</strong> it<br />

is 21.87% better than AAWT provided by DCS with the same µ, <strong>and</strong> 8.69%<br />

better than the best DCS configuration; the provided TWTV approaching<br />

109


3 – RFID Reader-to-Reader Anti-collision<br />

the best configuration rapidly falls, according to the lower number of colliding<br />

transmissions; Tab. 3.1 shows the per<strong>for</strong>mance provided by PDCS <strong>and</strong> DCS<br />

with µ = 12, <strong>and</strong> Tab. 3.2 shows the difference between PDCS <strong>and</strong> DCS in<br />

percentage; all the indicators show that a low P provides good per<strong>for</strong>mance.<br />

Table 3.1. Per<strong>for</strong>mance of DCS <strong>and</strong> PDC with µ = 12, AN = 9.94, NV =<br />

9.41, <strong>and</strong> r<strong>and</strong>om deployment<br />

PDCS<br />

DCS<br />

P 0.5 0.6 0.7 0.9 1.0<br />

ST/s 44.31 44.46 44.85 41.11 37.13<br />

MWT 105.41 99.42 88.29 85.52 102.28<br />

TAWT 5.09 5.10 5.10 5.16 6.28<br />

TWTV 1.68 0.78 1.15 6.72 10.92<br />

VAWT 0.03 0.03 0.00 0.79 1.93<br />

AAWT 2.37 2.36 2.36 2.65 2.99<br />

Table 3.2. Percentage difference of the per<strong>for</strong>mance provided by PDCS<br />

with respect to st<strong>and</strong>ard DCS, with µ = 12, AN = 9.94, NV = 9.41, <strong>and</strong><br />

r<strong>and</strong>om deployment<br />

P = 0.5 P = 0.6 P = 0.7 P = 0.9<br />

ST/s +19.34% +19.75% +20.79% +10.73%<br />

MWT +3.06% -2.79% -13.68% -16.38%<br />

TAWT -18.98% -18.75% -18.82% -17.82%<br />

TWTV +243.27% -66.33% +135.67% +371.97%<br />

VAWT -98.35% -98.70% -99.85% -59.27%<br />

AAWT -20.78% -20.97% -20.99% -11.44%<br />

Observing Fig. 3.9, Fig. 3.10, Table 3.1, <strong>and</strong> Table 3.2, we can state that:<br />

ˆ PDCS with a low P <strong>and</strong> a proper µ is more efficient than DCS, since it provides<br />

shorter AAWT;<br />

ˆ with a too low µ the order of efficiency is inverted;<br />

ˆ with a too high µ all the protocols provide the same efficiency;<br />

110


3 – RFID Reader-to-Reader Anti-collision<br />

ˆ with a high µ, when all the configurations reach a steady network, all the<br />

protocols provide the same fairness, since VAWT is 0;<br />

ˆ when µ ∼ = number of neighbors, PDCS with low P is the fairest, since more<br />

readers are reaching a steady behavior;<br />

ˆ with a too low µ, DCS is the most fairest;<br />

ˆ the introduction of P reduces γ, decreasing the WT, but it increases the possibility<br />

of a single reader that collides several consecutive times, according to<br />

Case 1 described in Section 3.4, so the best MWT is normally provided by<br />

PDCS with a high P , since it decreases WT, with a low occurrence of Case 1.<br />

3.5.2 Best PDCS Configurations<br />

In order to find the best PDCS configuration, it is possible to observe which value<br />

of P provides the best AAWT. Fig. 3.11 shows the per<strong>for</strong>mance provided by DCS<br />

<strong>and</strong> PDCS in a network with AN = 9.94, NV = 9.41, <strong>and</strong> r<strong>and</strong>om deployment.<br />

The best results are provided from P = 0.5 to P = 0.78. In this interval AAWT<br />

fluctuates between 5.08 <strong>and</strong> 5.19.<br />

Figure 3.11. AAWT provided by DCS <strong>and</strong> PDCS with AN = 9.94, NV =<br />

9.41, <strong>and</strong> r<strong>and</strong>om deployment<br />

111


3 – RFID Reader-to-Reader Anti-collision<br />

Also Colorwave has been simulated with the same network deployment. The<br />

used thresholds are respectively 50%, 45%, 45%, <strong>and</strong> 30%. Colorwave provides a<br />

very good TAWT, since it allows the readers with few neighbors to transmits very<br />

fast, but readers with several neighbors can not reach a steady state, since their<br />

neighbor can have different µ i . The TAWT provided with the previous network is<br />

5.00 s, which is better than DCS <strong>and</strong> PDCS, but the AAWT is 24.46 s, which is the<br />

worst.<br />

Since several values of P provide good results with a proper µ, also their per<strong>for</strong>mance<br />

with a worse µ must be analyzed. When µ is too high, P does not affect the<br />

per<strong>for</strong>mance, <strong>and</strong> PDCS provides always the same result. However, when µ is too<br />

low P affects strongly the per<strong>for</strong>mance. Fig. 3.12 shows PDCS with 0.5 ≤ P ≤ 0.7,<br />

5 ≤ µ ≤ 7, <strong>and</strong> with the previous network. Although the values of P are similar,<br />

AAWT does not fluctuate, <strong>and</strong> the higher P provides always lower AAWT.<br />

Figure 3.12. AAWT provided by DCS <strong>and</strong> PDCS with AN = 9.94, NV =<br />

9.41, <strong>and</strong> r<strong>and</strong>om deployment<br />

There<strong>for</strong>e, P = 0.7 is an optimal configuration, since it provides good AAWT<br />

with a proper µ, <strong>and</strong> AAWT better than lower P with a low µ.<br />

112


3 – RFID Reader-to-Reader Anti-collision<br />

3.5.3 Multichannel Analysis<br />

In order to analyze the per<strong>for</strong>mance of PDCS in a multichannel network, it has been<br />

simulated with 10 channels, according to ETSI st<strong>and</strong>ard [13], on a network with<br />

AN = 15.00, NV = 15.58, <strong>and</strong> r<strong>and</strong>om deployment. PDCS with P = 0.7 provides<br />

the best AAWT when µ = 2, <strong>and</strong> AAWT is equal to 0.46 s. With P = 1, which is<br />

the equivalent of DCS, the best result is also reached when µ = 2, <strong>and</strong> AAWT is<br />

equal to 0.52 s. Also LBT, which is the protocol proposed by ETSI st<strong>and</strong>ard, has<br />

been simulated with the same network. LBT provides an AAWT equal to 0.59 s.<br />

3.5.4 Matrix Vs R<strong>and</strong>om Deployment<br />

In order to reach a selected number of neighbors, several r<strong>and</strong>om deployments have<br />

been considered, with the same number of readers but on areas with different sizes.<br />

However, in order to check how different deployments with similar AN affect the<br />

per<strong>for</strong>mance, also a network with matrix deployment has been simulated. The<br />

per<strong>for</strong>mance of PDC <strong>and</strong> DCS on a network with r<strong>and</strong>om deployment, AN = 9.94,<br />

<strong>and</strong> NV = 9.41, <strong>and</strong> on a network with matrix deployment, AN = 9.94, <strong>and</strong><br />

NV = 3.90 are be analyzed. Fig. 3.13 shows the provided AAWT. All the protocols<br />

provide better per<strong>for</strong>mance on the matrix deployment. However, matrix graphs are<br />

very similar to r<strong>and</strong>om ones, shifted on both the axes. The best AAWT is provided<br />

by PDCS with P = 0.5 <strong>and</strong> µ = 11, where AAWT= 4.68 s, <strong>and</strong> it is 22.92%<br />

better than AAWT provided with the same µ, <strong>and</strong> 8.17% better than the best DCS<br />

configuration.<br />

3.5.5 Mobile RFID Networks<br />

Real RFID applications can require networks composed by mobile readers mixed to<br />

static readers. The presence of mobile readers affects the per<strong>for</strong>mance of anticollision<br />

protocols, because when a reader changes location it finds new neighbors with new<br />

colors, <strong>and</strong> it represents the introduction of a new reader, maybe with a busy color,<br />

in a steady neighborhood.<br />

Fig. 3.14 shows the AAWT provided by PDCS <strong>and</strong> DCS in a network with<br />

AN = 9.94, NV = 9.41, r<strong>and</strong>om deployment, <strong>and</strong> 20% of mobile readers. Similarly<br />

to static network, the best results, at µ = 15 instead of µ = 12, are provided by<br />

PDCS with 50 ≤ P ≤ 70. For 12 ≤ µ ≤ 14, the best threshold are provided with<br />

P = 70, which is the best configuration.<br />

113


3 – RFID Reader-to-Reader Anti-collision<br />

Figure 3.13. AAWT provided by DCS <strong>and</strong> PDCS with AN = 9.94, NV = 9.41,<br />

r<strong>and</strong>om deployment <strong>and</strong> AN = 9.94, NV = 3.90, <strong>and</strong> matrix deployment<br />

3.5.6 Dense RFID Networks<br />

The results of the simulation of PDCS with dense RFID networks are similar to the<br />

results <strong>for</strong> networks with less neighbors, but the gap between PDCS <strong>and</strong> DCS time<br />

per<strong>for</strong>mance is larger. The simulations have been per<strong>for</strong>med <strong>for</strong> all the P values<br />

between 0.5 <strong>and</strong> 1, with a step of 0.1. In order to show the behavior of PDCS,<br />

this section presents the result of the simulations <strong>for</strong> a network with AN = 29.92,<br />

NV = 70.19, <strong>and</strong> r<strong>and</strong>om deployment.<br />

Figure 3.15 shows the AAWT provided by PDC with different values of P <strong>and</strong><br />

DCS, according to various µ. The lowest AAWT is provided by PDCS with P = 0.6,<br />

which reaches the best per<strong>for</strong>mance with µ, 3 units lower than DCS. For all the<br />

values of µ close to the best configuration, PDCS provides the best AAWT. With<br />

26 ≤ µ ≤ 33, the lowest AAWT is provided with P = 0.7. With 34 ≤ µ ≤ 37 the<br />

best AAWT is provided with P = 0.6. From µ = 34, AAWT provided by all the<br />

protocols starts to converge to µ − 1, at first the protocol with low P <strong>and</strong> then the<br />

protocols with high P . From µ = 41, all the protocols provide the same AAWT. The<br />

best AAWT is provided by PDCS with P = 0.6, which reaches the best per<strong>for</strong>mance<br />

with µ, 3 units lower than DCS. The best AAWT, with P = 0.6 <strong>and</strong> µ = 37 reaches<br />

18.75% time reduction with respect to the AAWT of DCS with the same µ, <strong>and</strong><br />

114


3 – RFID Reader-to-Reader Anti-collision<br />

Figure 3.14. AAWT provided by DCS <strong>and</strong> PDCS with starting AN = 9.94,<br />

NV = 9.41, r<strong>and</strong>om deployment, <strong>and</strong> 20% of mobile readers<br />

9.69% with respect to the best AAWT provided by DCS with µ = 40.<br />

Figure 3.16 shows the throughput provided by PDC with different values of P<br />

<strong>and</strong> DCS, according to various µ. The behavior is specular to the graph of AAWT.<br />

The best throughput is provided by PDCS with P = 0.6, which reaches it with<br />

µ = 37, 3 units lower than the best result of DCS. The best throughput provided by<br />

PDCS is 20.45% larger than the throughput of DCS with the same µ, <strong>and</strong> 10.38%<br />

larger than the best throughput provided by DCS with µ = 40.<br />

According to the topological analysis presented in [47], the best deployment<br />

method to fully cover an area minimizing the number of RFID readers is an hexagonal<br />

matrix. An hexagonal matrix deployment has been designed considering a ratio<br />

between the interference range <strong>and</strong> the interrogation range equal to 10. The PDCS<br />

configuration with P = 0.7 <strong>and</strong> DCS have been simulated with the network with<br />

711 readers, AN = 97.20, NV = 535.05 <strong>and</strong> hexagonal matrix deployment. The<br />

best AAWT has been provided by PDCS with µ = 125 <strong>and</strong> it is equal to 124.60 s.<br />

The best AAWT provided by DCS, with µ = 136, is 135.29 s.<br />

115


3 – RFID Reader-to-Reader Anti-collision<br />

Figure 3.15. Effects of P on AAWT with AN = 29.92, NV = 70.19,<br />

<strong>and</strong> r<strong>and</strong>om deployment<br />

3.6 Conclusion<br />

The paper proposes PDCS, a new reader-to-reader anticollision protocol. The proposed<br />

protocol is multichannel, according to the international regulation <strong>for</strong> UHF<br />

RFID. Thanks to the parameter p, representing the probability of changing color after<br />

a collision, the number of collision is lower, <strong>and</strong> PDCS reaches a steady network<br />

with a lower µ. A theoretical analysis demonstrates that the correct configuration<br />

of p can provide over 30% of reduction of second generation collision (γ).<br />

Several evaluation methods have been analyzed, <strong>and</strong> an evaluation approach<br />

based on the Waiting Time (WT) has been adopted. The Average Average Waiting<br />

Time (AAWT) has been chosen as the main parameter representing the network<br />

efficiency. The simulation analysis shows that PDCS can reach a time reduction<br />

just under 10%, with respect to the best DCS configuration. PDCS results also<br />

fairer than DCS, since all readers have more opportunities to transmit.<br />

The time per<strong>for</strong>mance provided by PDCS is better than Colorwave, DCS, <strong>and</strong><br />

LBT. A theoretical analysis justifies the improvement, <strong>and</strong> experimental simulations<br />

validate the theoretical analysis.<br />

116


3 – RFID Reader-to-Reader Anti-collision<br />

Figure 3.16. Effects of P on the Throughput with AN = 29.92, NV =<br />

70.19, <strong>and</strong> r<strong>and</strong>om deployment<br />

117


Chapter 4<br />

RFID <strong>for</strong> Agri-food Traceability<br />

Traceability is considered today a crucial factor <strong>for</strong> the Agri-food sector. An effective<br />

traceability system brings many benefits, such as increasing the security of<br />

customers, <strong>and</strong> so their confidence, <strong>and</strong> controlling the effects of commodity withdrawal.<br />

Furthermore, in many countries traceability is a m<strong>and</strong>atory requirement<br />

<strong>for</strong> the agri-food sector. In EU, The European Parliament And The Council establishes<br />

that “1. The traceability of food, feed, ... shall be established at all stages of<br />

production, processing <strong>and</strong> distribution. 2. Food <strong>and</strong> feed business operators shall<br />

be able to identify any person from whom they have been supplied with a food, ...<br />

To this end, such operators shall have in place systems <strong>and</strong> procedures which allow<br />

<strong>for</strong> this in<strong>for</strong>mation to be made available to the competent authorities on dem<strong>and</strong>.<br />

3. Food <strong>and</strong> feed business operators shall have in place systems <strong>and</strong> procedures<br />

to identify the other businesses to which their products have been supplied. This<br />

in<strong>for</strong>mation shall be made available to the competent authorities on dem<strong>and</strong>. 4.<br />

Food or feed which is placed on the market or is likely to be placed on the market in<br />

the Community shall be adequately labeled or identified to facilitate its traceability,<br />

through relevant documentation or in<strong>for</strong>mation in accordance with the relevant<br />

requirements of more specific provisions.” [4]<br />

The Traceability in the agri-food sector is often managed by systems that employ<br />

labels or barcodes <strong>for</strong> the commodity identification. However, the new requirements<br />

of accuracy <strong>and</strong> efficiency have promoted the research of more efficient <strong>and</strong> effective<br />

solutions <strong>for</strong> traceability management. One of the most promising alternatives to<br />

traditional solutions is represented by the Radio Frequency Identification (RFID)<br />

technology. RFID systems, constituted by passive low cost transponders, are currently<br />

being used in a variety of applications <strong>and</strong> environments as detailed in this<br />

book. Many research projects have been developed to evaluate if RFID technology<br />

can be properly exploited <strong>for</strong> agri-food traceability activities.<br />

The ISO 9001:2000 [3] st<strong>and</strong>ard defines traceability as the ”ability to trace the<br />

history, application or location of that which is under consideration”. The activities<br />

118


4 – RFID <strong>for</strong> Agri-food Traceability<br />

involved by Traceability Management (TM) are also strongly linked to Supply Chain<br />

Management (SCM). For The Council of Supply Chain Management Professionals<br />

”SCM encompasses the planning <strong>and</strong> management of all activities involved in sourcing<br />

<strong>and</strong> procurement, conversion, <strong>and</strong> all Logistics Management activities. Importantly,<br />

it also includes coordination <strong>and</strong> collaboration with channel partners, which<br />

can be suppliers, intermediaries, third-party service providers, <strong>and</strong> customers. In<br />

essence, SCM integrates supply <strong>and</strong> dem<strong>and</strong> management within <strong>and</strong> across companies”<br />

[60]. On the one h<strong>and</strong>, TM aims at detect <strong>and</strong> record the path <strong>and</strong> the history<br />

of items; on the other h<strong>and</strong>, SCM aims at improving the production chain, so SCM<br />

can manage the traceability of products, but it is only an optional intermediate<br />

step to reach business improvements. Furthermore there are issues that characterize<br />

agri-food sector, <strong>and</strong> that affect both TM <strong>and</strong> SCM: (a) the management of perishable<br />

products requires special solutions like controlled storages in refrigerating<br />

rooms; (b) The Out-of-Shelves problem [41] is a threat <strong>for</strong> all kind of br<strong>and</strong>s <strong>and</strong><br />

in particular <strong>for</strong> perishable products [85], producing direct losses to retailers <strong>and</strong><br />

manufacturers, such as lost sale, br<strong>and</strong> switch, <strong>and</strong> store switch. There<strong>for</strong>e many<br />

research projects provide data about SCM <strong>and</strong> Automatic Identification <strong>and</strong> Data<br />

Capture (AIDC) that concern activities comprised by TM.<br />

New traceability systems based on RFID technology are starting to be effectively<br />

employed, but small <strong>and</strong> medium companies, which represent a large part of the agrifood<br />

enterprises, are wayward to invest in technologies that are not conventional.<br />

Hence, it is evident the importance of studies that present the knowledge about<br />

features <strong>and</strong> properties of the RFID technology application.<br />

4.1 Agri-Food Sector<br />

The typical production chain in the agri-food sector is composed by the following<br />

entities:<br />

1. Producer: an entity that produces the agri-food raw materials, <strong>and</strong> sells them<br />

to a manufacturing enterprise, e.g., a farm that cultivates grain or a cattleman<br />

that breeds beefs.<br />

2. Manufacturer: an enterprise that treats <strong>and</strong> trans<strong>for</strong>ms the agri-food raw materials;<br />

the most elaborated products require the use of several agri-food raw<br />

products <strong>and</strong> a complex manufacturing, e.g., a company that produces biscuits<br />

needs many ingredients, such as sugar, flour, <strong>and</strong> butter, from different suppliers,<br />

<strong>and</strong> adopts many processes from cooking <strong>and</strong> leavening to packaging;<br />

also the products that are sold to customer apparently without manufacturing<br />

need several treatments, e.g., fruits need to be cleaned, divided by caliber,<br />

stored in refrigerating rooms, <strong>and</strong> packed.<br />

119


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Figure 4.1.<br />

The agri-food chain<br />

3. Distributor: an enterprise that moves alimentary commodities; some large<br />

enterprises have their own distribution centers; mainly distributors get commodities<br />

from manufacturing enterprises <strong>and</strong> they give the commodities to<br />

retailers; normally, in a distribution center commodities are not treated, but<br />

they are only stored under determined conditions <strong>and</strong> then shipped to their<br />

destination.<br />

4. Retailer: an enterprise that sells alimentary commodities directly to customers;<br />

this category includes many kind of enterprises, from little alimentary shops<br />

to large hypermarkets, that sell all kind of commodities.<br />

Figure 4.1 shows the agri-food production chain <strong>and</strong> the interactions among its<br />

members.<br />

4.2 Traceability Management<br />

Today, the businesses in the agri-food sector have to manage carefully the traceability<br />

of their commodities, in order to satisfy the expectations of customers <strong>and</strong> the<br />

law requirements. However, some years ago the dem<strong>and</strong> of security <strong>and</strong> transparency<br />

was limited, <strong>and</strong> several companies in the agri-food sector have not still completely<br />

120


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Figure 4.2.<br />

The traceability chain<br />

Table 4.1. The Traceability Activities<br />

Activity<br />

Description<br />

Internal Traceability (ITr) correct matching of input <strong>and</strong> output food in<strong>for</strong>mation<br />

inside a company; the internal traceability<br />

system has to follow the path of a specific unit<br />

within the company<br />

Business to Business Traceability<br />

(BtoBTr)<br />

business to the next one, throughout the produc-<br />

management of the in<strong>for</strong>mation exchange from a<br />

tion chain<br />

Business to Customer Trace-<br />

management of the transfer of in<strong>for</strong>mation from<br />

ability (BtoCTr)<br />

Whole Chain Traceability<br />

(WCTr)<br />

the retailer to the final customer<br />

management of the in<strong>for</strong>mation on the whole path<br />

of a commodity, from the producer to the final<br />

customer<br />

adjusted their processes. The gap between requirements <strong>and</strong> actual situation has<br />

motivated the research of innovative solutions <strong>for</strong> TM. In the meat sector DNAbased<br />

traceability can be used to check presence of genetic modification, <strong>and</strong> to<br />

overcome security problems of label-based systems [91]. However, the management<br />

of traceability inside the production flow requires the use of labels <strong>for</strong> an immediate<br />

identification of products.<br />

TM can be divided in four activities, which are described in Table 4.1. Each<br />

of these activities has its peculiarities, <strong>and</strong> so it needs to be managed by a specific<br />

system, but they have to be considered all together, since each activity affects the<br />

other ones. In Figure 4.2, an example of traceability chain in the agri-food sector is<br />

shown.<br />

121


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Internal Traceability.<br />

The ITr in an agri-food enterprise may require:<br />

1. the identification <strong>and</strong> the registration of food that enters in the enterprise;<br />

2. the registration of the food that is produced;<br />

3. the tracking of the food movements;<br />

4. the registration of the treatments that are executed on the food;<br />

5. the registration of the interactions among alimentary commodities; <strong>and</strong><br />

6. the registration of the exit from the enterprise of the food.<br />

The kind <strong>and</strong> the number of in<strong>for</strong>mation about every operation, treatment <strong>and</strong><br />

alimentary commodity, change according to the accuracy of the ITr system. ITr<br />

systems are typically based on the matching of labels to objects that must be identified.<br />

Alternatively, some systems tag containers of objects. The container tagging<br />

method requires less labels <strong>and</strong> work, but it is less accurate than the <strong>for</strong>mer. However,<br />

with both methods the obtained data must be gathered <strong>and</strong> recorded in a<br />

database.<br />

The ITr is often managed by systems based on paper labels or barcodes. Systems<br />

that employ paper labels are characterized by low automation <strong>and</strong> low costs <strong>for</strong> the<br />

infrastructures involved. Normally, these systems are slow, so they can treat only<br />

a limited number of in<strong>for</strong>mation. Systems based on barcodes are characterized by<br />

more automation than paper label-based systems, but the number of in<strong>for</strong>mation<br />

stored on a bar code is still limited. However some barcode-based systems employ<br />

the barcode like a link to a record in a central database, where all the in<strong>for</strong>mation<br />

are stored. In a ITr system based on RFID technology, the tags can be used to<br />

replace paper labels <strong>and</strong> barcodes. Every tag could be matched to a commodity,<br />

or to a bin of commodities; the tag could directly hold the in<strong>for</strong>mation about the<br />

commodities, or it could simply store a code that is used as a record in a database.<br />

The tag could be detected by portal readers, when it is moved through a portal or<br />

with h<strong>and</strong>-held RFID readers.<br />

Business to Business Traceability. The main scope of BtoBTr is so preserve<br />

the in<strong>for</strong>mation about the path of an alimentary commodity between two enterprises.<br />

The BtoBTr <strong>for</strong> agri-food enterprises may require:<br />

1. the registration of the food exit from the enterprise of provenance;<br />

2. the tracking of the food movements; <strong>and</strong><br />

3. the registration of the food entrance in the destination enterprise.<br />

122


4 – RFID <strong>for</strong> Agri-food Traceability<br />

The data collected <strong>for</strong> the BtoBTr should be stored by both the enterprises, or<br />

in a common database. Typically, the BtoBTr systems identifying the single alimentary<br />

commodities, match a barcode to the commodity. The number of recorded<br />

in<strong>for</strong>mation <strong>and</strong> precision of the identification, from item level to pallet level, change<br />

according to the accuracy of the BtoBTr system.<br />

RFID could be used <strong>for</strong> BtoBTr by matching an RFID tag to all the commodities<br />

that are moved between the two businesses. The tag could hold the in<strong>for</strong>mation<br />

about the commodity, or the identification code of the tag could be used to store<br />

a record in a common database, so a portal reader could identify the incoming<br />

commodity.<br />

Business to Customer Traceability. The BtoCTr is the connection between<br />

the traceability systems <strong>and</strong> the customer, transfering the obtained in<strong>for</strong>mation to<br />

the customer.<br />

Normally, the BtoCTr is based on labels <strong>and</strong> texts written on the package of<br />

alimentary commodities, but this method allows the transfer of limited in<strong>for</strong>mation.<br />

Currently the employment of RFID tags is applicable only <strong>for</strong> expensive commodities.<br />

The tag could hold the in<strong>for</strong>mation about the commodity, or the identification<br />

of the tag could be used to access, eventually through Internet, to in<strong>for</strong>mation stored<br />

in a database. In order to access to data in the tag memory, customers could use<br />

RFID readers available in the shops.<br />

Whole Chain Traceability. WCTr provides the in<strong>for</strong>mation on the whole path<br />

of the commodity; it should link all the stored data. The WCTr can be used by<br />

businesses in the chain, in order to manage also the BtoBTr, furthermore it can be<br />

used by a third part, like the food security competent authority, in order to check<br />

the path of commodities <strong>for</strong> food disease prevention.<br />

Typically, the WCTr is managed by searching the in<strong>for</strong>mation in the database of<br />

the single companies of the production chain, step by step, looking in each database<br />

<strong>for</strong> the enterprises that had supplied the alimentary commodity. Alternatively, all<br />

the in<strong>for</strong>mation are stored by the operators in the production chain in a common<br />

database, in order to allow a fast access to the required data.<br />

The RFID technology could be used <strong>for</strong> WCTr in different ways. These in<strong>for</strong>mation<br />

could be recorded on the tag memory, or the identification of the tag could<br />

allow the access to the in<strong>for</strong>mation stored in a distributed database composed by<br />

the databases of all the operators of the production chain. This is a very important<br />

activity <strong>for</strong> agri-food traceability, because its aim is to make accessible all the<br />

useful in<strong>for</strong>mation about food immediately, <strong>and</strong> the fast availability of traceability<br />

in<strong>for</strong>mation can be crucial in case of food security emergency.<br />

123


4 – RFID <strong>for</strong> Agri-food Traceability<br />

4.3 State-of-the-art Analysis<br />

In this section an overview of the state-of-the-art research studies on RFID <strong>for</strong> agrifood<br />

traceability is presented. In addition, some remarkable research projects about<br />

RFID, supply chain, <strong>and</strong> food traceability are reported in order to provide a deep<br />

comprehension of the treated topics. All the studies are analysed <strong>and</strong> compared<br />

with the model described in Section 4.2.<br />

This section is divided in the following parts: theoretical model, where some<br />

critical features useful <strong>for</strong> the design of a model of traceability systems are described;<br />

business impact analysis, where the influence of RFID adoption on business processes<br />

is evaluated; system proposals, where characteristics <strong>and</strong> per<strong>for</strong>mances of RFIDbased<br />

traceability systems are described; simulation analysis, where the effects of<br />

a real RFID application are simulated; <strong>and</strong> field studies, where the experimental<br />

results on the field are reported.<br />

4.3.1 Theoretical Model<br />

Traceability in the US Food Supply: Dead End or Superhighway [61]<br />

This paper, which is focused on traceability systems in US food supply <strong>and</strong> on the<br />

comparison of m<strong>and</strong>atory <strong>and</strong> voluntary systems, presents some interesting elements<br />

of food traceability systems that can be useful to be considered when analysing an<br />

RFID traceability system.<br />

The identified motivations of food suppliers to adopt traceability systems are:<br />

1. to improve supply-side management;<br />

2. to differentiate <strong>and</strong> introduce added value on food with subtle or undetectable<br />

quality attributes; <strong>and</strong><br />

3. to facilitate traceback <strong>for</strong> food safety <strong>and</strong> quality.<br />

The identified characteristics are:<br />

1. breadth, the quantity of recorded in<strong>for</strong>mation; the number of data about food<br />

is huge, so enterprises have to select the ones with the highest value;<br />

2. depth, the number of recorded members, back <strong>and</strong> <strong>for</strong>ward in the traceability<br />

chain; many enterprises record only direct suppliers <strong>and</strong> customers; <strong>and</strong><br />

3. precision, the degree of tracking assurance, that is composed by the acceptable<br />

error rate, which is the number of elements in a wrong group, <strong>and</strong> the unit of<br />

analysis, which is the dimension of tracking groups of elements.<br />

124


4 – RFID <strong>for</strong> Agri-food Traceability<br />

4.3.2 Business Impact Analysis<br />

The studies presented in this section are focused on the processes executed in the<br />

supply chain to manage the traceability. The adopted research methodology is based<br />

on interviews <strong>and</strong> field analysis. The main result of these study is the identification<br />

of changes in the processes due to RFID adoption.<br />

Figure 4.3.<br />

Use case traceability activities<br />

White Paper. Auto-ID Use Case: Food Manufacturing Company Distribution<br />

[82]<br />

This use case is focused on a generic auto-ID implementation in the food manufacturing<br />

company distribution, <strong>and</strong> especially on the operation of placing the products<br />

onto trailers <strong>for</strong> transportation. The use case does not analyse the technology characteristics,<br />

but only the impact of the auto-ID on a business.<br />

The use case describes the Auto-ID procedures <strong>and</strong> the gained benefits, it analyses<br />

the present situation, <strong>and</strong> it searches business benefits in order to justify the<br />

proposed solution.<br />

The barcode is identified as the only current technology available <strong>for</strong> identification<br />

but it is evaluated slow <strong>and</strong> expensive. Instead RFID technology can solve some<br />

typical problems, e.g., portal readers can avoid incoherence due to possible errors in<br />

the list of shipped pallets. A benefit of the auto-ID is the reduction of human labour<br />

applied to repetitive tasks. A problem <strong>for</strong> the implementation of an auto-ID system<br />

is the resistance by the work<strong>for</strong>ce to change the work processes. Pre-requirements<br />

to be guaranteed are the 100% of scanning accuracy <strong>and</strong> the scanning rate, since<br />

the system have to scan pallets with different rates, <strong>and</strong> maybe also simultaneously<br />

passing. Different possible implementations with different costs were identified; the<br />

low cost implementation involves fixed portal readers, pallet level tagging <strong>and</strong> a<br />

basic integration with the in<strong>for</strong>mation system (IS); instead the medium cost implementation<br />

involves also mobile readers <strong>and</strong> more integration with the IS; the high<br />

cost implementation involves also case level tagging, a higher number readers, <strong>and</strong><br />

a tight integration with the IS.<br />

125


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Authors conclude that basic implementations require only few changes to the<br />

IS <strong>and</strong> the introduction of auto-ID infrastructure, <strong>and</strong> that this kind of implementation<br />

brings benefits <strong>for</strong> organizations. High cost implementations can bring all<br />

described benefits of auto-ID, <strong>and</strong> they could be adopted by passing through basic<br />

implementations.<br />

Figure 4.3 shows the traceability activities managed in the use case. The main<br />

activity managed by the system is the ITr of the distributor, which is leaded at<br />

different levels according to the implemented version of the system. The BtoBTr is<br />

managed by using the tags, but the system considers the option in which suppliers<br />

had not tagged the pallets, <strong>and</strong> so they are tagged at their entrance in the distributor<br />

building.<br />

Figure 4.4.<br />

Enabler traceability activities<br />

RFID as an Enabler of B-to-B e-Commerce <strong>and</strong> its Impact on Business<br />

Processes: A Pilot Study on a Supply Chain in the Retail Industry [89]<br />

This paper presents empirical data collected by analysing four firms that are part<br />

of three layers of the same supply chain. The analysis is focused on the potential of<br />

RFID in a supply chain in the retail industry, <strong>and</strong> especially on open-loop supply<br />

chain applications, which involve multiple members of the chain together. The main<br />

research site is a distribution center; the other analysed firms are the two first-tier<br />

suppliers of the distribution center <strong>and</strong> one retailer. The paper does not treat<br />

directly agri-food traceability, but it explores general aspects of BtoBTr that are<br />

valid also <strong>for</strong> the agri-food sector.<br />

The research was devised in different steps, grouped in three macro phases: Opportunity<br />

Seeking; Scenario Building; <strong>and</strong> Scenario Validation. The data collection<br />

was based on:<br />

ˆ a focus group with 9 functional managers <strong>and</strong> IT experts;<br />

ˆ an on-site observations; <strong>and</strong><br />

ˆ a semi-structured interviews conducted in the four research sites.<br />

126


4 – RFID <strong>for</strong> Agri-food Traceability<br />

The identified motivations <strong>for</strong> RFID adoption are: to reach an agile supply chain,<br />

the reduction of cost <strong>for</strong> traceability activities, the reduction of incoherences between<br />

the inventory <strong>and</strong> the reality, <strong>and</strong> the reduction of lead times. The author<br />

identified the list of process executed in the distribution center. The four firms<br />

employ barcode-based systems, however the distributor employs some automatic<br />

in<strong>for</strong>mation management systems.<br />

The scenario obtained integrating RFID was validated with the focus group. The<br />

results are that:<br />

ˆ the RFID technology facilitates the emergence of a model named cross-docking,<br />

where products move through the distribution center without being stored,<br />

or with short stop, since the automation in traceability activities makes less<br />

relevant the putting-away <strong>and</strong> the picking; this model allows faster delivery of<br />

commodities, which is very relevant <strong>for</strong> short life products, which are a large<br />

part of agri-food products;<br />

ˆ many processes become automatic or disappear;<br />

ˆ the time consuming is reduced, the quantity <strong>and</strong> the integrity of in<strong>for</strong>mation<br />

are larger; (d) RFID-based system can bring additional value, <strong>and</strong> it includes<br />

intelligent processes managed by automatic decisions;<br />

ˆ the integration among supply chain members is increased, <strong>and</strong> each member<br />

can continuously get updated in<strong>for</strong>mation about products in the chain.<br />

Authors conclude that the application of RFID in supply chain requires:<br />

ˆ radical changes of the business processes, with significant reduction of human<br />

work <strong>for</strong> traceability;<br />

ˆ systems that can manage a large quantity of data;<br />

ˆ the authorization to share, between chain members, in<strong>for</strong>mation that were<br />

previously considered proprietary.<br />

The changing to the cross-docking model is considered the major changing. A<br />

problem <strong>for</strong> RFID large adoption is considered the lack of st<strong>and</strong>ards.<br />

Figure 4.4 shows the traceability activities analysed in the use case. The paper is<br />

focused on the impact on business processes in BtoBTr, which is managed by using<br />

the RFID tags.<br />

4.3.3 System Proposals<br />

In this section different kinds of studies are reported. All of them are characterized<br />

by the presentation of a traceability system <strong>and</strong> by its evaluation.<br />

127


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Figure 4.5.<br />

The food transportation traceability activities<br />

Spatial temperature profiling by semi-passive RFID loggers <strong>for</strong> perishable<br />

food transportation [74]<br />

The monitoring of the cold chain is very important <strong>for</strong> perishable food, so an accurate<br />

traceability system may manage this activity. The authors analyze the use<br />

of miniaturized RFID temperature loggers <strong>for</strong> monitoring of cold chain inside the<br />

transports.<br />

Some tests were per<strong>for</strong>med in a climatic chamber in order to compare three<br />

types of RFID miniaturized data loggers. The best type of data logger has been<br />

evaluated according to average <strong>and</strong> st<strong>and</strong>ard deviation <strong>for</strong> test temperatures. The<br />

analysis of variance per<strong>for</strong>med on the refrigerator unit internal temperature shows<br />

that the independent variables that affect the temperature are: location of RFID<br />

data-loggers, truck type, <strong>and</strong> ambient temperature. The one-by-one analysis of these<br />

factors shows that all of them are significant <strong>for</strong> temperature variation, <strong>and</strong> that the<br />

most important is the coordinate on the axis that better correspond to the distance<br />

from the cooling equipment.<br />

The number of loggers can be reduced in order to avoid inaccuracy by using<br />

interpolation. However, the interpolation can not calculate temperature spots.<br />

The data recorded by the system can be used with a shelf life food model in order<br />

to evaluate how much the temperature affected the products during a transport. In<br />

order to know immediately after the transport if products are safe, authors claim<br />

that an RFID implementation requires that RFID data loggers pre-process the data<br />

in order to communicate the checking result with a short message instead of a long<br />

list of data.<br />

Authors conclude that RFID can be useful <strong>for</strong> cold chain monitoring, but relevant<br />

drawbacks are the short reading range that require manual h<strong>and</strong>ling, <strong>and</strong> the huge<br />

volume of data, which can be difficult to manage. The number of data could not be<br />

efficiently transmitted by RIFDs, so they may have the computational capacity to<br />

pre-process the data.<br />

Figure 4.5 shows the traceability activities managed in the system. The analyzed<br />

128


4 – RFID <strong>for</strong> Agri-food Traceability<br />

cold chain monitoring system manages the ITr during the transportation. Furthermore,<br />

the paper states the BtoBTr is an open issue, since it requires semi-passive<br />

RFID tags with additional computation capacity, or different transition methods.<br />

Figure 4.6.<br />

Sushi management system activities<br />

Development of an RFID-based sushi management system: The case of<br />

a conveyor-belt sushi restaurant [98]<br />

The authors have designed <strong>and</strong> evaluated an RFID-based management system <strong>for</strong><br />

conveyor-belt sushi restaurants. The aim of the study is to analyze the benefits of<br />

RFID in the food industry.<br />

For the authors the main challenges of traditional conveyor-belt are:<br />

ˆ the waste of time due to manual billing calculation, which is per<strong>for</strong>med looking<br />

the colors of the sold plates which are matched to a price;<br />

ˆ potential errors in billing;<br />

ˆ potential food hazard due to the method of removing expired food from the<br />

belt, which is manually per<strong>for</strong>med by the chef only according to his opinion;<br />

ˆ inefficiency in the stock control on the belt, which is per<strong>for</strong>med by the chef<br />

without precise data.<br />

The design <strong>and</strong> development were organized in six stages. The first is the business<br />

process analysis, where observation <strong>and</strong> interviews with restaurant employers <strong>and</strong><br />

customers in some restaurants have shown business processes that can be redesigned,<br />

as the replenishment, the sushi-tracking, <strong>and</strong> the billing process. The subsequent<br />

steps are: requirements analysis <strong>and</strong> RF site survey; system architecture, system<br />

design, system implementation, system testing <strong>and</strong> evaluation. For the evaluation<br />

some chefs <strong>and</strong> managers have filled in a questionnaire, <strong>and</strong> they have rated highly<br />

both the effectiveness <strong>and</strong> the usability of the system.<br />

129


4 – RFID <strong>for</strong> Agri-food Traceability<br />

The authors have identified some benefits of RFID management system:<br />

ˆ electronic inventory of raw materials <strong>for</strong> sushi; real time inventory of food on<br />

the belt;<br />

ˆ enabling responsive replenishment;<br />

ˆ automatic detection of expired food;<br />

ˆ fast <strong>and</strong> accurate billing;<br />

ˆ <strong>and</strong> better communication with customers about food.<br />

The identified challenges are:<br />

ˆ lack of RFID expertise <strong>for</strong> deployment;<br />

ˆ cost;<br />

ˆ <strong>and</strong> lack of support.<br />

Figure 4.6 shows the traceability activities managed in the system: the ITr inside<br />

the restaurant, <strong>and</strong> the BtoC traceability, which is per<strong>for</strong>med by providing customers<br />

with detailed in<strong>for</strong>mation about food.<br />

Figure 4.7.<br />

Live fish traceability system activities<br />

A RFID-enabled traceability system <strong>for</strong> the supply chain of live fish [72]<br />

The authors present an RFID traceability system <strong>for</strong> live fish supply chain. The<br />

system is focused on live fish center, but it manages the whole chain. The RFID<br />

tags are put on live fish in order to link the fish logistic center, restaurants <strong>and</strong><br />

130


4 – RFID <strong>for</strong> Agri-food Traceability<br />

customers. The in<strong>for</strong>mation is exchanged from farmers to customers, by using a<br />

web-based system.<br />

Although live fish represent very high quality expensive products, in Taiwan their<br />

traceability is not complete, since some chain partners employ inadequate systems.<br />

The live fish chain involves the aqua-farm, the inspector center, the fish center, <strong>and</strong><br />

the restaurant. The proposed system is composed by a set of sub systems connected<br />

on internet: the legacy system <strong>and</strong> web service, which collects data from farmers; the<br />

water quality monitoring system, which automatically record data about the quality<br />

of the water; point of sales system, which manages the procurement, inventory,<br />

<strong>and</strong> sales activities; production resume inquiring <strong>and</strong> demonstration system, which<br />

checks the in<strong>for</strong>mation about fish. The authors have detected some challenges <strong>for</strong><br />

the adoption of RFID in live fish chain: how to attach the RFID on the live fish;<br />

<strong>and</strong> the water interference.<br />

Figure 4.7 shows the traceability activities managed by the presented system.<br />

The main activity managed by the system is the WCTr, but several other activities<br />

are managed.<br />

Figure 4.8.<br />

Food supervisor traceability activities<br />

Radio Frequency Identification in Food Supervision [134]<br />

This paper presents a food security supervision system that manages the food chain<br />

traceability. The paper is focused on the producer <strong>and</strong> the retailer, since these<br />

members of the chain are considered the most critical <strong>for</strong> food security threats.<br />

The supervision system is based on a Food <strong>and</strong> Drug Administrator (FDA),<br />

which supervises the chain, <strong>and</strong> which includes a food security database. UHF<br />

RFID-based systems of the members of the food chain interact with RFID tags; an<br />

RFID middleware elaborates the data <strong>and</strong> communicates with the FDA. The system<br />

architecture is based on the following steps:<br />

131


4 – RFID <strong>for</strong> Agri-food Traceability<br />

1. the producer stores on the tag memory in<strong>for</strong>mation concerning the food <strong>and</strong><br />

the producer himself;<br />

2. FDA checks the food <strong>and</strong> writes the relative in<strong>for</strong>mation on the tag;<br />

3. when the product is transported to a member of the chain the relative in<strong>for</strong>mation<br />

are sent to the FDA;<br />

4. each member of the chain records its own in<strong>for</strong>mation;<br />

5. the customer can check the food in the public database of the FDA;<br />

6. when problems occur the FDA sends a warning to all members of the chain.<br />

Authors found several issues that obstruct adoption of the RFID-based traceability<br />

systems:<br />

ˆ the recognition rate of liquid food is very low;<br />

ˆ the cost of tags is too high;<br />

ˆ the read rate must reach 100%;<br />

ˆ the enterprises want to adopt technology characterized by clear <strong>and</strong> sure st<strong>and</strong>ards.<br />

There<strong>for</strong>e the authors indicate that the development of an RFID simulator can allow<br />

to reach wider range of data about RFID systems.<br />

Figure 4.8 shows the traceability activities managed by the presented system.<br />

The main activity managed by the system is the WCTr, which is managed by communicating<br />

the in<strong>for</strong>mation about the food <strong>and</strong> its movements to the FDA. The<br />

system manages also the BtoCTr, by using the in<strong>for</strong>mation recorded in the tag<br />

memory <strong>and</strong> the Internet access to the database of the FDA. The BtoBTr is managed<br />

by writing the in<strong>for</strong>mation about the commodities directly in the tag memories<br />

<strong>and</strong> by querying the database of the FDA. It is assured that the ITr is managed by<br />

the RFID-based traceability system.<br />

Electronic Tracking <strong>and</strong> Tracing in Food <strong>and</strong> Feed Traceability [21]<br />

In this paper printed graphic identifiers, RFIDs <strong>and</strong> electronic data interchange protocols<br />

are presented. The description <strong>and</strong> the preliminary results of an experiment<br />

are reported aiming at evaluating UHF RFID application of modified atmosphere<br />

packaged meat.<br />

The experiment was conducted to evaluate if the readability of class 1 generation<br />

1 UHF RFID system as applied to beef <strong>and</strong> pork samples is affected by material<br />

132


4 – RFID <strong>for</strong> Agri-food Traceability<br />

properties inside <strong>and</strong> around the meat. The results of the experiment are that the<br />

linearly polarized type antennas yielded better reading rates over larger distances,<br />

but no significant differences between linearly <strong>and</strong> circularly polarized antennas are<br />

detected up to a distance of 0.5 m. Preliminary results show a better readability over<br />

longer distances with the presence of bone in meat samples; authors suggest that<br />

the bone causes less loss than meat. The paper presents some graphical examples<br />

of the preliminary results of the described test. The graphics show clearly that the<br />

system works effectively only with short distances, up to 0.7 m, or with high power,<br />

next to 2 W.<br />

Authors conclude that the adoption of RFID system <strong>for</strong> beef <strong>and</strong> pork items<br />

requires to improve per<strong>for</strong>mance in detection. The problems to operate in a wide<br />

high-attenuation environment <strong>and</strong> the high cost of the technology are considered an<br />

open issue <strong>for</strong> the large adoption of RFID.<br />

Figure 4.9.<br />

Traceability activities in the simulation<br />

4.3.4 Simulation Analysis<br />

Exploring the impact of RFID on supply chain dynamics [88]<br />

In this paper a quantitative analysis of impact of RFID technology on supply chain<br />

per<strong>for</strong>mance is presented. The analysis is based on a simulation model developed by<br />

the authors in order to quantify the indirect benefits of RFID. The model considers:<br />

ˆ the inventory accuracy, that is affected by problems like stock loss, transaction<br />

error, <strong>and</strong> incorrect product identification;<br />

ˆ the shelf replenishment policy, that thanks to RFID technology can be based<br />

on a real time inventory; <strong>and</strong><br />

ˆ the visibility of the inventory through out the entire supply chain.<br />

The model consists of a three layer supply chain that is composed by a manufacturer,<br />

a distribution center <strong>and</strong> a retail store. The RFID readers are placed<br />

133


4 – RFID <strong>for</strong> Agri-food Traceability<br />

at the receiving <strong>and</strong> shipping points, at the end of the production line, <strong>and</strong> in the<br />

backroom <strong>and</strong> at the shelves of the retail store. Tags are applied at the item level.<br />

The model is characterized by some parameters, <strong>and</strong> the most important ones are<br />

the reorder point, which is the number of products that requires a replacement, <strong>and</strong><br />

the target inventory, which is the number of products to reach by the replacement;<br />

these parameters are used <strong>for</strong> the replacement of both shelves <strong>and</strong> backroom. The<br />

physical inventory is per<strong>for</strong>med every 3 months. The simulations use metrics such<br />

as lost sales, surpluses <strong>and</strong> costs.<br />

Some simulations with different parameters are analysed in order to find the<br />

impact of RFID application. The simulations show some benefits due to RFID<br />

application:<br />

ˆ a reduction of 99% <strong>for</strong> the back order quantity, in cases with the same parameters;<br />

ˆ it is possible to reach a smaller inventory with a lower reduction;<br />

ˆ there is a reduction of 99% of the lost sales also with restricting parameters;<br />

ˆ the reached reduction of lost sales is of 84% with a lower backroom inventory<br />

target;<br />

ˆ both assuming that by means of RFID the manufacturer knows the inventory<br />

of the distribution center, <strong>and</strong> assuming that it knows also the inventory of the<br />

retailer, the back orders of the distribution center are deleted <strong>and</strong> the average<br />

quantity of products in the inventory is lower.<br />

Authors conclude that RFID technology can provide benefits to supply chain,<br />

but analysed scenarios are too simply <strong>and</strong> not completely realistic, so the results<br />

can not be directly used.<br />

Figure 4.9 shows the traceability activities managed in the model. The main<br />

activities managed by the system is the BtoBTr, which is managed by writing the<br />

in<strong>for</strong>mation about the commodities directly in the tag memories, <strong>and</strong> the WCTr.<br />

The producer <strong>and</strong> the distributor seemingly use the RFID traceability system only<br />

<strong>for</strong> BtoBTr <strong>and</strong> WCTr, instead, the retailer uses the system also <strong>for</strong> the ITr, indeed<br />

inside the shop the RFID system is used to detect the movement through <strong>and</strong> from<br />

the backroom <strong>and</strong> to detect the commodities in the shelves. The tagging level is the<br />

single commodity. The technological <strong>and</strong> practice aspects of the traceability system<br />

are not considered in deep by the model, which is focused on the business impact<br />

of AIDC, possibly RFID-based, so implementation problems <strong>and</strong> error rate are not<br />

evaluated.<br />

134


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Figure 4.10.<br />

The Sainsbury’s trial traceability activities<br />

4.3.5 Field Studies<br />

Increasing efficiency in the supply chain <strong>for</strong> short shelf life goods using<br />

RFID tagging [121]<br />

Karkkainen, in order to discuss the application of RFID technology in the supply<br />

chain of short shelf life products, analyses a trial conducted at Sainsbury’s, which<br />

is a chain of supermarkets in the UK that sells a large volume of different short<br />

shelf-life goods. The author discusses the impact of RFID <strong>for</strong> retailers <strong>and</strong> also <strong>for</strong><br />

other supply chain participants.<br />

Shelf life is the period when the defined quality of the goods remains acceptable.<br />

Short shelf-life goods are a large part of agri-food commodities, they are characterized<br />

by a high number of product variants, need of temperature control <strong>and</strong> all the<br />

traceability requirements of agri-food commodities. There<strong>for</strong>e short shelf-life food<br />

needs a strictly rotation monitoring.<br />

At Sainsbury’s short shelf-life commodities are packed on recyclable plastic transportation<br />

crates that are tagged by barcodes. The path of the crates starts from a<br />

producer, then they are moved to a distribution depot <strong>and</strong> finally to a store. The focus<br />

of the trial is the retail store, since it was considered the operator with the major<br />

difficulties due to the ef<strong>for</strong>t required <strong>for</strong> barcode-based traceability management.<br />

The trial, which started with one ready-meal supplier, one depot <strong>and</strong> one store,<br />

was designed as follows. RFID tags are applied to recyclable plastic crates; the<br />

in<strong>for</strong>mation stored in the tag memories are:<br />

ˆ the description <strong>and</strong> quantity of products in the crate,<br />

ˆ the use-by date of products, <strong>and</strong><br />

ˆ the ID number that identifies the crate.<br />

An RFID reader, which writes on the tag the in<strong>for</strong>mation related to the products in<br />

the crate, is located at the end of the production line. A gate reader at the depot<br />

detects the incoming of the products. At the store, another gate reader, between the<br />

chilled storage <strong>and</strong> the store areas, detects the incoming into the chilled storage of<br />

the products from the depot <strong>and</strong> the moving out through the store areas. After the<br />

135


4 – RFID <strong>for</strong> Agri-food Traceability<br />

first phase, the trial was scaled up. During the second trial phase, all the products<br />

<strong>for</strong> the store that come from any supplier are tagged, but the in<strong>for</strong>mation about the<br />

product from the suppliers out the trial are written by a gate reader that is located<br />

at the depot. The scaled-up phase took three months.<br />

The labour st<strong>and</strong>ards, which are work study timings <strong>for</strong> key activities in store<br />

processes, are used by Sainsbury’s to calculate the benefits of different store activities.<br />

Recalculating the st<strong>and</strong>ards <strong>for</strong> the RFID trial, the total benefits <strong>for</strong> Sainsbury’s,<br />

without the supplier participation, were estimated to be £8.5 million a year;<br />

the largest origins of the savings are the stock loss reduction, stock check saving,<br />

<strong>and</strong> replenishment productivity improvement. The requested investment to adopt<br />

the system was calculated to be between £18 million <strong>and</strong> £24 million. The payback<br />

period was estimated to be between two <strong>and</strong> three years. With the participation of<br />

suppliers the benefits are estimated to be notably larger, despite the higher investment<br />

costs.<br />

The analysis of the trial focused on retailers concludes that a traceability system<br />

based on RFID applied to recyclable transports offers possibilities with a large return<br />

of investment. The system is evaluated useful also <strong>for</strong> suppliers, mainly <strong>for</strong> the<br />

reduction of out-of-stock rate, since short life products are highly subject to br<strong>and</strong><br />

switching <strong>for</strong> stock-outs <strong>and</strong> the difficulties in their management bring to a high<br />

stock-out rate. During the trial it was evaluated that the used RFID tag memories<br />

can store additional in<strong>for</strong>mation to get added value.<br />

Figure 4.10 shows the traceability activities managed in the presented system.<br />

The main activity managed by the system is the BtoBTr, that is managed by writing<br />

the in<strong>for</strong>mation about the commodities directly in the tag memories. The producer<br />

<strong>and</strong> the distributor seemingly use the RFID traceability system only <strong>for</strong> the BtoBTr,<br />

instead the retailer uses the system also <strong>for</strong> the ITr, indeed inside the shop the RFID<br />

system is used to detect the movement through <strong>and</strong> from the chilled storage.<br />

Figure 4.11.<br />

The Wal-Mart traceability activities<br />

136


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Does RFID Reduce Out of Stocks? A Preliminary Analysis [66]<br />

This paper presents the preliminary results of a trial conducted between February 14<br />

to September 12 2005 in 24 stores at Wal-Mart, which is the world’s largest public<br />

corporation by revenue <strong>and</strong> which runs a chain of large, discount department store.<br />

The aim of the study is to assess the impact of RFID technology on out of stocks,<br />

which generate a huge economic lost, especially <strong>for</strong> agri-food firms [85].<br />

In the implemented system the commodity cases were labeled by RFID tags; a<br />

set of RFID readers detect the tags that pass in their field <strong>and</strong> record their data.<br />

In the distribution center there are: receiving door readers, conveyor readers <strong>and</strong><br />

shipping door readers; these three reader points allow to detect the entrance, the<br />

sorting phase, <strong>and</strong> the exit of each case, however when cases are in a pallet it is not<br />

possible to read all the tags, so the reading can be completed only after the cases are<br />

put out of the pallet. In the retailers there are: receiving door readers, backroom<br />

shelf readers, sales floor door readers, <strong>and</strong> box crusher readers; these three reader<br />

points allow to detect the entrance in the backroom storage area, the movement into<br />

the sale area, <strong>and</strong> the crashing of cases.<br />

A method used at Wal-Mart <strong>for</strong> the replenish stock on the shelves is based on a<br />

picklist; employers put a new element to be replenished in the list, maybe by using a<br />

h<strong>and</strong>-held barcode scanner, when they see a shelf near to out of stock. This method<br />

is laborious <strong>and</strong> the replenishment is slow. By using point of sale RFID readers is<br />

possible to generate an automatic picklist, based on the number of cases moved in<br />

the sale area, <strong>and</strong> on the number of sold commodities.<br />

The trial was executed in 12 “test” stores; other 12 stores with similar characteristics<br />

were chosen to compare the results. Along the 29 weeks of the trial, the test<br />

<strong>and</strong> the control stores were scanned daily at the same time along the same path, in<br />

order to detect Out-Of-Stock, empty shelf spaces, in the majority of the sections of<br />

the stores. The trial in the test stores evolved through three phases:<br />

1. no RFID,<br />

2. partial RFID on some selected products, <strong>and</strong><br />

3. full RFID.<br />

The results of the trial are:<br />

ˆ a reduction of 13% of Out-Of-Stock from no RFID phase to partial RFID<br />

phase <strong>and</strong> a reduction of 26% of Out-Of-Stock from no RFID phase to full<br />

RFID phase;<br />

ˆ also in control stores there was a reduction of Out-Of-Stock, which was probably<br />

due to the other Wal Mart supply chain improvement initiatives <strong>and</strong> to<br />

137


4 – RFID <strong>for</strong> Agri-food Traceability<br />

influence of evaluation on employers, however in the test stores the reduction<br />

is 63% higher than in control stores;<br />

ˆ a comparison among Out-Of-Stock of tagged products <strong>and</strong> non tagged products<br />

in the same stores, shows that the reduction of Out-Of-Stock <strong>for</strong> non<br />

tagged ones is very lower;<br />

ˆ the adoption of automatic picklist in parallel to traditional picklist, shows that<br />

a variable amount of Out-Of-Stock was found by the automatic picklist.<br />

Authors conclude that the adoption of RFID technology can reduce consistently<br />

the Out-Of-Stock without large changes of the work processes. However a better<br />

isolation of RFID effect is considered existential to determinate its contribution.<br />

Figure 4.11 shows the traceability activities managed in the Wal-Mart trial. The<br />

main activity of the trial is the ITr in retailers, this activity allows to manage the<br />

Out-Of-Stocks problem, by utilizing the in<strong>for</strong>mation about the number of products<br />

in the retailer, <strong>and</strong> their approximative collocation. The tagging is at case level,<br />

however the authors think that a tagging at item level can bring better improvements.<br />

The only variable stored on a tag is the EPC code, the other in<strong>for</strong>mation<br />

are recorded in a database. The system manages also the BtoBTr <strong>and</strong> the ITr in<br />

the distribution centers, but the analysis in focused on the ITr in the retailers.<br />

Figure 4.12.<br />

The Future Store traceability activities<br />

RFID Technology <strong>and</strong> Applications in the Retail Supply Chain:<br />

Early Metro Group Pilot [90]<br />

The<br />

This paper provides the results of the trial conducted at Metro Group’s Future Store.<br />

The Metro Group is one of the most globalised retail <strong>and</strong> wholesale corporations.<br />

The trial is conducted in the Future Store that was build in one of the Metro Group’s<br />

supermarkets in Germany.<br />

In the trial the tagging is exploited at item level, on three products, among<br />

which a cream cheese; the tags are prepared by suppliers <strong>and</strong> then attached in the<br />

Future Store. The shelves of these products were equipped with RFID readers, that<br />

can detect the tags of the commodities on the shelves. In addition to the st<strong>and</strong>ard<br />

138


4 – RFID <strong>for</strong> Agri-food Traceability<br />

traceability system activities, a specific application is tested on each product: antitheft<br />

protection, marketing improvement, <strong>and</strong>, on the cream cheese, the management<br />

of expiration dates.<br />

The trial underlined benefits <strong>and</strong> drawbacks of RFID application <strong>for</strong> traceability<br />

systems. The main advantages are:<br />

ˆ better inventory monitoring, <strong>and</strong> consequent improvement of replenishment<br />

management;<br />

ˆ reduction of out-of stock due to the better monitoring of shelves;<br />

ˆ better knowledge of the dem<strong>and</strong> that improves production planning;<br />

ˆ better knowledge of the conditions under which goods are sold;<br />

ˆ reduction of storage space;<br />

ˆ reduction of labor time due to automation.<br />

On the other h<strong>and</strong> the trial underlined also some challenges:<br />

ˆ need of st<strong>and</strong>ardisation among company processes;<br />

ˆ problems due to products material;<br />

ˆ management of a huge number of in<strong>for</strong>mation;<br />

ˆ privacy issues.<br />

Authors conclude that RFID technology can bring many benefits but its adoption<br />

in supply chain management <strong>and</strong> traceability requires a stronger roll-out <strong>for</strong><br />

achieving necessary economies of scale <strong>and</strong> quantitative insights.<br />

Figure 4.12 shows the traceability activities managed in the Metro Group’s Future<br />

Shop trial. The trial is focused on the ITr in a retailer, this activity allows to<br />

manage problems such as Out-Of-Stocks <strong>and</strong> expiration date, thanks to the tagging<br />

at item level. The system potentially manages also the BtoBTr but the study treats<br />

only the ITr.<br />

4.3.6 Discussion<br />

By analyzing the described studies it is possible to highlight the main opportunities<br />

<strong>and</strong> drawbacks of RFID technology application to agri-food traceability.<br />

Several studies identify obstacles to the RFID large adoption such as:<br />

ˆ the lack of universal technology st<strong>and</strong>ards;<br />

139


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Figure 4.13.<br />

RFID Traceability Drawbacks<br />

ˆ the need of changes in process st<strong>and</strong>ard;<br />

ˆ the low detection rate due to problems such as interferences with product <strong>and</strong><br />

package materials;<br />

ˆ lack of computation capacity to per<strong>for</strong>m data preprocessing;<br />

ˆ the need to deal with a huge number of data;<br />

ˆ the need of cooperation, cost division, <strong>and</strong> sharing of in<strong>for</strong>mation between the<br />

chain members;<br />

ˆ the lack of final system suppliers, expertises, <strong>and</strong> support;<br />

ˆ the privacy problems;<br />

ˆ the high costs <strong>and</strong> doubts about return of investment.<br />

140


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Figure 4.14.<br />

RFID Traceability Benefits<br />

Figure 4.13 shows the quantity of papers that highlight each specific drawback of<br />

RFID application, in order to indicate how much each one is evaluated relevant.<br />

The drawback identified by the greatest number of studies as relevant obstacle to<br />

RFID diffusion is the low range detection. Several studies recognize also the lack of<br />

st<strong>and</strong>ard <strong>and</strong> the high cost of the technology as key constraints.<br />

Some studies underline the opportunity <strong>for</strong> an enterprise to implement low cost<br />

systems, in order to evaluate their effectiveness, <strong>and</strong> then eventually to adopt a more<br />

advanced system.<br />

The described studies identify some key benefits of RFID-based traceability system<br />

adoption:<br />

ˆ improvement of the production planning along the whole chain;<br />

ˆ reduction of storage space;<br />

ˆ improvement of replenishment management <strong>and</strong> reduction of out-of-stock;<br />

ˆ reduction of human labor <strong>and</strong> relative precision improvement;<br />

ˆ reduced investment with reusable case tagging level;<br />

141


4 – RFID <strong>for</strong> Agri-food Traceability<br />

ˆ efficient management of WCTr, <strong>for</strong> food hazard prevention.<br />

There<strong>for</strong>e RFID can improve the traceability management in terms of efficiency,<br />

accuracy, human labor, <strong>and</strong> used area; however this improvements require cooperation<br />

among the chain companies. Figure 4.14 shows the quantity of studies that<br />

highlight each specific benefit of RFID application, in order to indicate how much<br />

each one is evaluated relevant. The most widely recognized benefit <strong>for</strong> RFID in<br />

agri-food is the high precision due to automation.<br />

The described research projects examine RFID-based traceability systems from<br />

different points of view. The studies in the business impact analysis section are<br />

focused on the effects of RFID <strong>and</strong> auto-ID business processes, <strong>and</strong> their results<br />

are mainly based on field analysis <strong>and</strong> discussions. These studies conclude that an<br />

advanced auto-ID system implementation requires radical changes in the company<br />

processes. The studies described in system proposals section present different traceability<br />

systems <strong>and</strong> evaluate practical problems. The simulation paper shows the<br />

opportunity of analysis that comes from the use of simulators. The field studies describe<br />

the results of trials executed in real-life conditions; these studies demonstrate<br />

the economic <strong>and</strong> technological feasibility of RFID-based traceability systems.<br />

On the one h<strong>and</strong>, the most appealing motivations that are allowing the wide<br />

adoption of RFID technology in agri-food traceability management are the improvements<br />

in precision <strong>and</strong> accuracy due to elimination of human labor, <strong>and</strong> the space<br />

saving inside the supply chain, due to the better SCM. On the other h<strong>and</strong>, the growing<br />

requirements of food security, commodity quality, <strong>and</strong> food origin certification,<br />

are making better traceability systems necessary in the agri-food market. However,<br />

the diffidence on the possibility to solve technological problems, <strong>and</strong> on the ratio<br />

between the cost of the technology <strong>and</strong> the economic benefits that RFID technology<br />

brings, are slowing the diffusion of RFID-based traceability systems. Nevertheless,<br />

several agri-food companies, especially in perishable food sector, where an efficient<br />

supply chain management can avoid consistent waste, <strong>and</strong> in the high cost food<br />

sector, where the price of a single product allows the use of RFID tags <strong>for</strong> reaching<br />

added value after the point-of-sell, have adopted with success RFID, demonstrating<br />

the benefits of this technology.<br />

4.4 Framework <strong>for</strong> Traceability Analysis<br />

RFID technology, widely adopted <strong>for</strong> supply chain management, can be used effectively<br />

<strong>for</strong> the traceability management. In this section, a framework <strong>for</strong> the<br />

evaluation of a traceability system <strong>for</strong> the agri-food industry is presented <strong>and</strong> the<br />

automation level in an RFID-based traceability system is analyzed <strong>and</strong> compared<br />

with respect to traditional ones.<br />

142


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Internal <strong>and</strong> external traceability are both considered <strong>and</strong> <strong>for</strong>malized, in order<br />

to classify different environments, according to their automation level.<br />

The characteristics of a traceability system, <strong>and</strong> mainly its automation level,<br />

strongly affect the traceability cost <strong>and</strong> accuracy. Automation is defined as the<br />

execution by a machine agent of a function that was previously carried out by a<br />

human being; the provided economic benefits are known in many domains, from<br />

aviation to medicine [103].<br />

Although food sector is characterized by technologically advanced innovations,<br />

e.g. new sterilization methods [121] <strong>and</strong> food evaluation [129], its companies typically<br />

have not an advanced level of automation, because of lack of assets of small<br />

enterprises, the extensive condition of agricultural fields, <strong>and</strong> the “historic distance”<br />

between rural life style <strong>and</strong> technology. However, in large enterprises, there are examples<br />

of high automation. In the most technologically advanced countries, there<br />

is an advanced agriculture that uses st<strong>and</strong>ardized technology <strong>and</strong> that is subject to<br />

rapid changes [32, 109].<br />

The most advanced agricultural enterprises are characterized by a tightly aligned<br />

food supply chain <strong>and</strong> by the important role of in<strong>for</strong>mation <strong>and</strong> communication technology<br />

(ICT) [32]. Usually, these enterprises use spontaneously a traceability system,<br />

which typically is very efficient <strong>and</strong> fully automated. Instead, small enterprises that<br />

have an efficient traceability system often add the traceability management to their<br />

normal operations, decreasing the efficiency <strong>and</strong> increasing the costs. The lack of<br />

assets <strong>and</strong> the difficulties to see the benefits due to the use of an effective traceability<br />

system, bring them to implement the traceability management in the most<br />

simple way, often manual or semiautomatic. Presently one considerable challenge<br />

in the agri-food business is the developing of appropriate traceability technology <strong>for</strong><br />

small-scale farmers [102].<br />

According to the technological novelties <strong>and</strong> opportunities introduced by the<br />

application of ICT in the agri-food sector, the main contributions presented in this<br />

section are the analysis of the automation characteristics of traceability systems used<br />

in the agri-food sector <strong>and</strong> the evaluation of the automation improvement achievable<br />

by RFID technology.<br />

4.4.1 Internal Traceability System Features<br />

The main operation executed by an internal traceability system is the identification/registration,<br />

which is repeated every time that a product is subjected to an<br />

action.<br />

In this paragraph the main features of internal traceability systems are illustrated.<br />

ˆ Data storage. Data must be stored during the permanence of the commodity<br />

143


4 – RFID <strong>for</strong> Agri-food Traceability<br />

in the enterprise <strong>and</strong> after its exit. When the commodity exits, data must be<br />

maintained, in order to manage the external traceability. The elements that<br />

characterize the data storage are:<br />

– data location<br />

* totally distributed, data are stored on commodities by using labels;<br />

* compressed <strong>and</strong> distributed, data are stored on commodity labels in<br />

a compressed <strong>for</strong>m -e.g. short codes-, <strong>and</strong> it is possible to read the<br />

in<strong>for</strong>mation from the object by using reference tables;<br />

* centralized, commodities are matched with an ID that is stored on<br />

commodity label; the ID is used as a link to a record in a central<br />

database;<br />

– the type of database<br />

* paper database, requires a manual transcription <strong>and</strong> a large amount<br />

of work;<br />

* computer database, can be updated by a manual transcription or by<br />

an automatic transcription.<br />

ˆ Tagged objects. Labels are used in order to identify <strong>and</strong> store data. There<br />

are two alternative methods of tagging, which is the activity of labeling objects:<br />

– commodity tagging method, the tagged objects are the commodities themselves;<br />

the tag is uniquely matched to the commodity <strong>and</strong> it is not<br />

reusable.<br />

– container tagging method, the tagged objects are the containers of commodities;<br />

in this way each tag is matched to one container, <strong>and</strong> the tag<br />

could be potentially used <strong>for</strong> the whole life of the container.<br />

ˆ Kind of data. Kind <strong>and</strong> number of data can differ according to precision <strong>and</strong><br />

effectiveness aims; the quantity of data affects the size <strong>and</strong> the time used to<br />

manage them. The stored data are divided in three groups:<br />

– identification code, this code identifies the object;<br />

– commodity characteristics, these data are used to identify the commodities<br />

<strong>and</strong> to save additional in<strong>for</strong>mation that can be useful <strong>for</strong> activities<br />

such as value adding, supply chain management or quality certification;<br />

– operation data, they describe the history of the object, the operations<br />

executed on it, its movements, <strong>and</strong> its timetable.<br />

144


4 – RFID <strong>for</strong> Agri-food Traceability<br />

ˆ Data <strong>for</strong>mat. Data can be represented in different <strong>for</strong>mats, which differ <strong>for</strong><br />

technological levels; more than one <strong>for</strong>mat can be used simultaneously. There<br />

is a tight coupling between the adopted <strong>for</strong>mat <strong>and</strong> the automation of the<br />

operation that manages the data, so the choice of the data <strong>for</strong>mat depends on<br />

the required automation. The main choices are:<br />

– written words, data are written directly by human operators;<br />

– alphanumerical code, data are contracted <strong>and</strong> conveyed by an alphanumerical<br />

written code;<br />

– barcode, data are contracted <strong>and</strong> conveyed by a barcode that needs to be<br />

read by an appropriate device;<br />

– electronic code, normally through RFID tags; the number of recordable<br />

data is limited by the size of the tag memory, but it is the largest among<br />

the analyzed <strong>for</strong>mats.<br />

4.4.2 Writing/Reading <strong>and</strong> Tagging Automation<br />

The identification/registration (IR) activity (see Table 4.2 <strong>for</strong> the list of symbols),<br />

which is composed by the reading <strong>and</strong>, if needed, by the writing <strong>and</strong> the tagging,<br />

is the core of the internal traceability system. Since these actions are iterated<br />

continuously, they get large resources, so enterprises have to execute them in an<br />

optimized way.<br />

The traceability system of each company requires a set of specific IR operations,<br />

each of them is composed by a specific number of reading, writing <strong>and</strong> tagging<br />

operations.<br />

In a system that employs the commodity tagging method normally the same<br />

IR operations are per<strong>for</strong>med on each product, <strong>and</strong> so the total time requested <strong>for</strong><br />

IR, T IR, is a function of IT , which is the number of single items: T IR = f(IT ).<br />

An execution of the i th type of IR operation, among the n IR operations applied,<br />

requires an average time IR i , <strong>and</strong> it is executed o i times on each commodity. T IR is<br />

also affected by the error management; according to the kind of errors, the execution<br />

of corrective operations (e.g., the repetition of the faulty operations) is required, so<br />

T IR = IT<br />

n∑<br />

(o i · (1 + e i ) · IR i ).<br />

i=0<br />

where, e i is the error occurrence probability. In a system adopting the container<br />

tagging method, a set of IR operations are per<strong>for</strong>med on each container. IT must<br />

145


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Symbol<br />

T IR<br />

IR i<br />

IT<br />

IT CN<br />

CN<br />

n<br />

AR<br />

AW<br />

AT<br />

DBC<br />

DBQ<br />

C i<br />

CC i<br />

HC i<br />

MV i<br />

o i<br />

e i<br />

r i<br />

IDr i<br />

Mr i<br />

w i<br />

t i<br />

d i<br />

T T<br />

RF ID ARID<br />

RF ID ARM<br />

RF ID<br />

T raditional<br />

i<br />

Table 4.2. Framework List of Symbols<br />

Description<br />

Total time requested by IR operations<br />

average time requested by the i th IR operation<br />

number of ITems<br />

Number of ITems in a Container<br />

Number of Containers<br />

Number of the kinds of IR operations<br />

Average time <strong>for</strong> a Reading<br />

Average time <strong>for</strong> a Writing<br />

Average time <strong>for</strong> a Tagging<br />

average time <strong>for</strong> a Database Connection<br />

average time <strong>for</strong> a Database Query<br />

average time <strong>for</strong> Computation in the i th IR op.<br />

av. time <strong>for</strong> Computer Comput. in the i th IR op.<br />

av. time <strong>for</strong> Human Computation in the i th IR op.<br />

average time <strong>for</strong> MoVement in the i th IR op.<br />

Occurrences of the i th IR operation<br />

Error occurrence probability<br />

number of Readings in the i th IR operation<br />

number of tag ID Readings in the i th IR operation<br />

number of tag Memory Readings in the i th IR op.<br />

number of Writings in the i th IR operation<br />

number of Taggings in the i th IR operation<br />

number of Database queries in the i th IR operation<br />

Total time <strong>for</strong> Tagging<br />

Average time <strong>for</strong> an RFID Reading of a tag ID<br />

Average time <strong>for</strong> a Memory RFID Reading<br />

prefix <strong>for</strong> systems with RFID<br />

prefix <strong>for</strong> systems without RFID<br />

subscript <strong>for</strong> the i th IR operation<br />

be divided by the number of items per container (IT CN), <strong>and</strong><br />

T IR =<br />

IT<br />

IT CN<br />

n∑<br />

(o i · (1 + e i ) · IR i )<br />

i=0<br />

In each traceability system IR i is dependent on the type of employed technology.<br />

The time requested by one single operation is mainly dependent on the automation<br />

of the employed technology. IR i corresponds to the sum of the time required by<br />

146


4 – RFID <strong>for</strong> Agri-food Traceability<br />

each operation that composes the i th IR operation; these operations are:<br />

ˆ the reading that requires an average time AR <strong>and</strong> that is executed r i times,<br />

ˆ the writing that requires an average time AW <strong>and</strong> it is executed w i times,<br />

ˆ the tagging that requires an average time AT <strong>and</strong> that is executed t i times,<br />

ˆ the access to a database that requires an average time DBC <strong>and</strong> that is executed<br />

one or zero times,<br />

ˆ the elaboration in the database that requires an average time DBQ <strong>and</strong> that<br />

is executed d i times,<br />

ˆ the elaboration of the i th operation that requires the average time C i , <strong>and</strong><br />

ˆ the movement of the entity that executes the i th operation that requires the<br />

average time MV i .<br />

There<strong>for</strong>e, the <strong>for</strong>mula <strong>for</strong> calculating IR i is:<br />

IR i = r i · AR + w i · AW + t i · AT +<br />

+ min(d i ,1) · DBC + d i · DBQ + C i + MV i .<br />

Each operation involved in an internal traceability system is executed with different<br />

automation levels. The automation levels, according to the classification used<br />

by [111], are:<br />

ˆ manual, the activities are executed directly by a human operator; the C i <strong>and</strong><br />

the MV i are respectively used by the human operator to analyze the operation,<br />

<strong>and</strong> to move in the right position <strong>for</strong> the execution of an action;<br />

ˆ semi-automatic, an operator uses a h<strong>and</strong>-device to improve the efficiency of<br />

the work; the time MV i is used by the human operator to bring the device<br />

in the correct position; the time C i is composed by the time used by the tool<br />

to elaborate the data (CC i ), <strong>and</strong> the time needed by the human operator to<br />

analyze the operation (HC i ):<br />

C i = CC i + HC i ;<br />

ˆ automatic, human operators only control the activities, which are done by<br />

a mechatronic device; C i corresponds to the time needed by the device to<br />

elaborate data; normally in an automatic system MV i is null.<br />

The automation level is closely tied to the adopted data <strong>for</strong>mat; in the following the<br />

different operations are detailed.<br />

147


4 – RFID <strong>for</strong> Agri-food Traceability<br />

ˆ Reading. The reading of the labels has the purpose to identify commodities<br />

<strong>and</strong> to get the commodity data, which can be used <strong>for</strong> other operations. The<br />

reading is the core part of IR activity, since each IR operation requires at least<br />

one reading: r i > 1; ∀i. The average time of a reading (AR) is dependent on<br />

the automation of the action.<br />

– The manual reading is per<strong>for</strong>med directly by human operators <strong>and</strong> it is<br />

characterized by a low value of r i <strong>and</strong> a high value of AR.<br />

– The semi-automatic reading is per<strong>for</strong>med by human operators that use<br />

h<strong>and</strong> device <strong>and</strong> it is characterized by a high value of r i , <strong>and</strong> a low value<br />

of AR.<br />

– Usually, the automatic reading is per<strong>for</strong>med by fixed readers, or by mobile<br />

readers. Like the semi-automatic one, it is characterized by a high value<br />

of r i , <strong>and</strong> a low value of AR.<br />

ˆ Writing. The writing operation changes the data on the labels, so this operation<br />

is required only by some IR operations. In order to write data on the<br />

labels, the data must be in a suitable <strong>for</strong>m <strong>for</strong> the used method of writing.<br />

The average time of a writing (AW ) is dependent on the automation of the<br />

action (manual, semi-automatic, or automatic).<br />

ˆ Tagging. These operations can take a long time; the total time requested by<br />

the tagging actions (T T ) mainly depends on the employed tagging method.<br />

In a system that employs the commodity tagging method every item must<br />

normally be tagged at every writing, so T T is a function of the number of<br />

items: T T = f(IT ).<br />

In a system that employs the container tagging method, if the labels are not<br />

rewritable, every container must be tagged every time that a writing is required,<br />

<strong>and</strong> IT must be divided by IT CN. If the labels are rewritable <strong>and</strong><br />

the containers are reusable, each container can be tagged only once, since all<br />

the writing operations can be executed on the same label. Furthermore, the<br />

tagging operation can be per<strong>for</strong>med off-line. The T T is a function of CN,<br />

which is the number of containers: T T = f(CN). The average time required<br />

<strong>for</strong> each tagging action (AT ) is mainly dependent on the automation level.<br />

4.4.3 Established Internal Traceability Systems<br />

The list that follows contains a representative sample of traceability systems adopted<br />

by agri-food enterprises.<br />

148


4 – RFID <strong>for</strong> Agri-food Traceability<br />

ˆ Fully manual tag system. In this system there is no automation. The<br />

commodities are not identified singly, but they are organized in groups with<br />

common characteristics.<br />

ˆ Stamp system. The automation is almost absent. The commodities are<br />

identified only as part of a group with the same characteristics. This system<br />

uses labels with an alphanumeric code. The labels are tagged <strong>and</strong> written in<br />

a semi-automatic way by human operators that use h<strong>and</strong> labelers <strong>and</strong> stamps.<br />

Operators manually read the labels.<br />

ˆ Printed tag system. Only some traceability operations are executed in an<br />

automatic way. This system uses labels with written words. The labels are<br />

tagged, in a semi-automatic way, by human operators that use h<strong>and</strong> labelers;<br />

human operators read the labels. The data about the set of commodities <strong>and</strong><br />

about the operations are stored in the central database.<br />

ˆ Fully automatic barcode system. All the traceability operations are executed<br />

in a fully automatic way. The recorded data are the ID of the single<br />

commodity, a set of characteristics, <strong>and</strong> the time of the operations. The ID<br />

<strong>and</strong> the commodity characteristics are located both on the commodity <strong>and</strong> in<br />

the central database, while the time of the operation is recorded only in the<br />

database.<br />

4.5 Case Study<br />

The internal traceability systems used in the fruit sector are experimentally analyzed,<br />

showing that by using RFID technology, agri-food enterprises increase their<br />

automation level <strong>and</strong> also their efficiency, in a sustainable way.<br />

In order to evaluate the automation improvement achievable by RFID technology,<br />

a fruit warehouse was selected as a case study. In this section the selection of the<br />

fruit warehouse is motivated <strong>and</strong> the case of study is analyzed.<br />

A new traceability system based on RFID technology has been designed <strong>and</strong><br />

evaluated. Different case studies have been considered, tacking into account various<br />

scenarios, in order to evaluate the effectiveness of the proposed approach, underlining<br />

the benefits <strong>and</strong> losses; aspects as efficiency, costs, added values <strong>and</strong> speed are<br />

analyzed, without missing out the usability. The main benefit of the RFID adoption<br />

is the opportunity to match traceability <strong>and</strong> other activities, such as supply chain<br />

management.<br />

In this section it is described a traceability system, based on RFID technology<br />

<strong>and</strong> designed <strong>for</strong> fruit warehouse. In this kind of warehouse, fruit comes in from<br />

different farmers, it is treated <strong>and</strong> stoked <strong>and</strong> then it is sold to distributors. This<br />

149


4 – RFID <strong>for</strong> Agri-food Traceability<br />

business is a good model <strong>for</strong> all the element of the fruit chain, since it involve all<br />

the problem that can be found in the whole chain.<br />

The proposed traceability system implements the internal traceability, <strong>and</strong> it<br />

matches inside in<strong>for</strong>mation to data about origin <strong>and</strong> destination of fruit. RFID<br />

tags, due to the storing opportunities from the memory size, hold directly the data<br />

about fruit. The pervasive presence of data is a strategic factor; in fact it allows<br />

the continuous working of the system even where the installation of a wireless net<br />

is unfeasible. Different levels of automation are available, according to the specific<br />

requirements of the operator. The aim of the system is ensure an easy <strong>and</strong> thorough<br />

data capture, integration <strong>and</strong> management.<br />

The proposed traceability system is compared with a traditional system. The experimental<br />

results show that the adoption of an RFID system increases the efficiency<br />

of traceability management <strong>and</strong> reduces the labor costs.<br />

Figure 4.15.<br />

Warehouse organization<br />

4.5.1 Fruit warehouse<br />

In order to test RFID-based traceability systems, we selected the fruit sector, since<br />

it presents interesting characteristics, such as the high numbers of direct relations<br />

among companies in the chain, of total companies in the same chain, of different<br />

products <strong>and</strong> of product characteristics. Different RFID traceability systems were<br />

150


4 – RFID <strong>for</strong> Agri-food Traceability<br />

examined, then a system based on RFID was put on trial in a fruit company, in<br />

order to compare its characteristics with respect to the ones of traditional systems.<br />

Agri-food sector presents particular features that affect the design of a traceability<br />

system. In this section, in order to explain the relevant needs of fruit sector <strong>and</strong><br />

traceability management are introduced, <strong>and</strong> properties of traceability systems are<br />

detailed.<br />

The operators in the typical fruit chain are:<br />

1. the farmer, he/she sells fruit to one or more warehouses;<br />

2. the warehouse, it gets fruit from some farmers, treats <strong>and</strong> stores the fruit, <strong>and</strong><br />

sells the fruit to some distributors;<br />

3. the distributor, it gets fruit from several warehouses, transports the fruit, <strong>and</strong><br />

sells the fruit to several retailers;<br />

4. the retailer, it gets fruit from a distributor, <strong>and</strong> sells the fruit to customers.<br />

A fruit warehouse buys fruit from many producers <strong>and</strong> sells it to different distributors;<br />

in a warehouse the fruit is treated <strong>and</strong> products from different groups are<br />

merged, so the internal traceability is not a trivial operation.<br />

In order to detect the characteristics of fruit warehouses <strong>and</strong> in particular of<br />

their traceability systems, 10 small/medium fruit warehouses companies <strong>and</strong> one<br />

big fruit warehouse company were analyzed, then the collected data were evaluated<br />

in collaboration with 2 companies that supply consulting to agri-food companies. In<br />

the following fruit warehouse characteristics, achieved by our survey, are described.<br />

Fruit warehouses are mainly differentiated by production size <strong>and</strong> destination<br />

market. In the warehouse the fruit is held in containers called bins, which can<br />

usually hold 250-300 kilograms of fruit, <strong>and</strong> which are moved by <strong>for</strong>k lifts. The<br />

dimension of a fruit warehouse usually is measured in bins: a medium warehouse<br />

disposes of a number of bins between 1000 <strong>and</strong> 100000; each calibration line can<br />

treat 50 bins/hour.<br />

A warehouse uses treatments <strong>and</strong> its own image presentation methods according<br />

to its destination market. A fruit warehouse needs a premium br<strong>and</strong> <strong>and</strong> high<br />

quality treatments in order to access to markets with high quality st<strong>and</strong>ards.<br />

Regardless of differences among different warehouses, operations that take place<br />

in warehouses can be modeled as in Fig. 4.15. The main operations that they have<br />

to exploit are the same:<br />

ˆ storing in refrigerating room; its aim is preserving fruit; this can be executed<br />

more than once, or not executed at all; in the refrigerating room the fruit is<br />

held in bins;<br />

151


4 – RFID <strong>for</strong> Agri-food Traceability<br />

ˆ calibration; its aim is to separate fruit according to its caliber; fruit bins are<br />

loaded in the calibrator machine, a queue of other empty bins is filled by one<br />

of the output lines of the calibrator, one <strong>for</strong> each caliber;<br />

ˆ fruit packing; this operation is often required be<strong>for</strong>e fruit departure; the filled<br />

bins are emptied into the packer.<br />

The operations can be executed in any order, <strong>and</strong> some of them could be not executed,<br />

according to characteristics of the fruit. In addition, other operations, such as<br />

quality selection, fruit cleaning <strong>and</strong> color selection, are often matched to calibration<br />

or packing.<br />

In Italy the majority of fruit warehouses are small <strong>and</strong> medium companies. This<br />

kind of companies is often characterized by a low automation. The calibration<br />

<strong>and</strong> the packing are usually executed by automatic machines. The management of<br />

refrigerating rooms is per<strong>for</strong>med by an automatic system. Inside the warehouse, the<br />

movement of bins is per<strong>for</strong>med by using a <strong>for</strong>k lift; in big companies some highly<br />

utilized paths can be constituted by conveyor belt. The quality selection in small<br />

<strong>and</strong> medium companies is executed manually by workers that visually examine the<br />

fruits in a production line. In some big companies there are video cameras that<br />

detect some characteristics of the fruits.<br />

These traceability management systems are composed by two macro-activities:<br />

the identification of the fruit in the bins <strong>and</strong> the recording of the in<strong>for</strong>mation about<br />

the fruit in a central database. The identification, which aims at matching bins<br />

with the data that identify the contained fruit, involves tagging, reading <strong>and</strong> writing<br />

tags. Instead, the automation of the data recording in the central database usually<br />

depends on the kind of the identification activities: if the identification is highly<br />

automatic, hardly the company employs a paper database, because it would nullify<br />

the benefits of automatic identification; only if the identification system manages<br />

digital data, these can be automatically recorded in the database, otherwise a manual<br />

transcription is needed.<br />

Table 4.3 shows the analyzed traceability systems, which can be classified according<br />

to the general models shown in Section 4.4.3. Additionally, the printed/manual<br />

tag system column represents an hybrid case, where the print of labels is joined or<br />

alternated to manual writing.<br />

The majority of the analyzed warehouses employ a “Printed Tag” traceability<br />

system. Two warehouses utilize printed tags, but they utilize also written labels<br />

when it is more useful, e.g., when the number of labels is small. Only one warehouse<br />

employs the “Stamp system”. The “Fully automatic barcode system” is employed<br />

only by the large company.<br />

152


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Table 4.3.<br />

Analyzed Traceability Systems<br />

Enterprise dimension<br />

Stamp<br />

system<br />

Printed<br />

tag<br />

system<br />

Printed/<br />

Manual<br />

tag system<br />

Large 0 0 0 0 1<br />

Small/Medium 0 1 7 2 0<br />

Fully manual<br />

tag system<br />

Fully automatic<br />

barcode<br />

system<br />

RFID <strong>for</strong> Fruit Warehouses<br />

The RFID technology can be used <strong>for</strong> many activities in the agri-food traceability.<br />

Using RFIDs <strong>for</strong> internal traceability, reading <strong>and</strong> writing operations are managed<br />

by RFID tags <strong>and</strong> readers. All the data are digital, so they can be used <strong>for</strong> an easy<br />

automatic update of the central database.<br />

The memory of every RFID tag holds an ID that can uniquely identify the<br />

tagged object, furthermore some tags have a rewritable memory that can contain<br />

data about the object. The data in the memory can directly describe the object,<br />

alternatively they can hold short codes that are used like links to reference tables,<br />

which are stored in a central database, or located on distributed devices. There<strong>for</strong>e,<br />

an RFID-based internal traceability system can employ any data location described<br />

in Section 4.4.1. An RFID-based traceability system normally uses a computer<br />

database, in order to get advantage from the digital <strong>for</strong>m of in<strong>for</strong>mation.<br />

RFID can be used both <strong>for</strong> commodity tagging method <strong>and</strong> <strong>for</strong> container tagging<br />

method. The systems based on written labels or barcodes, by using the container<br />

method, have to tag containers every time the contained products change. So <strong>for</strong><br />

those systems tagging the containers in comparison to tag commodities does not<br />

bring real benefits, except the labels saving <strong>and</strong> the tagging time saving. Barcodebased<br />

system could match one ID to a container <strong>for</strong> its whole life, <strong>and</strong> they could<br />

use it like a link to a database, but normally fruit warehouse operators prefer to use<br />

codes that describe the commodity, where each part of the code has its own meaning,<br />

<strong>and</strong> the use of this kind of code requires the change of the barcode every time the<br />

commodities in the container are changed. Instead RFID-based systems allow to<br />

rewrite data on tags every time the commodities in the container are changed, so<br />

they can reach the full saving due to container tagging method.<br />

The high number of produced fruits makes the commodity tagging method unfeasible;<br />

in fact, also traditional methods employ the container tagging method. For<br />

an RFID-based system the inadequacy of the direct tagging method is increased by<br />

the higher cost of RFID tags, so it must employ the container tagging method. In<br />

a warehouse the fruits with different characteristics are often merged, <strong>and</strong> the data<br />

153


4 – RFID <strong>for</strong> Agri-food Traceability<br />

system must manage this situation. The container tagging method, applied in a<br />

fruit warehouse, can be used with all the described identification methods:<br />

ˆ Totally distributed. The in<strong>for</strong>mation about the fruit is directly written in the<br />

tag memory, <strong>and</strong> the ID identifies the fruit bin. The in<strong>for</strong>mation must be<br />

updated, according to the changes of the fruit in the bin.<br />

ˆ Compressed <strong>and</strong> distributed. Short codes that describe the fruit are stored in<br />

the tag memory, <strong>and</strong> also in this case the ID identifies the fruit bin, since the<br />

tag <strong>and</strong> the bin are uniquely matched. The codes must be updated, according<br />

to the changes of the fruit in the bin. The system needs to manage the reference<br />

tables to get the codes.<br />

ˆ Centralized. The ID of the tag identifies a fruit bin. The ID is used to access<br />

to the in<strong>for</strong>mation about the fruit in the bin, which are stored in the central<br />

database. The in<strong>for</strong>mation has to change according to the changes of the fruit<br />

in the bin.<br />

An RFID system can manage many data, both when the ID of the tag is used like a<br />

link to the database <strong>and</strong> when the tag memory holds some codes that describe the<br />

commodity. If the in<strong>for</strong>mation is stored in the database, the size could be considered<br />

as unlimited; if the in<strong>for</strong>mation is described by codes or it is directly written in the<br />

tag memory, the memory size represents a strict limit.<br />

Table 4.4. IR Operations. The underlined words represent the data that every<br />

traceability system must record.<br />

i Operation Characteristics Data on the<br />

of the fruit operation<br />

0 Entrance into the warehouse Culture, variety, Date <strong>and</strong> time<br />

producer, weight<br />

1 Entrance into the refrigerating room None Date <strong>and</strong> time,<br />

room number<br />

2 Exit from the refrigerating room None Date <strong>and</strong> time<br />

3 Calibrator emptying None Date <strong>and</strong> time<br />

4 Calibrator filling Caliber Date <strong>and</strong> time<br />

5 Packing Pack ID Date <strong>and</strong> time<br />

6 Exit from the warehouse None Date <strong>and</strong> time<br />

Another critical point is the required time. The identification of a commodity requires<br />

an RFID transmission <strong>and</strong> optionally a query to the central database. These<br />

154


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Table 4.5. IR Operations <strong>and</strong> their Parameters <strong>for</strong> Centralized (Cen) <strong>and</strong> Distributed<br />

(Dis) Implementations.<br />

i o i r i w i t i<br />

All Cen Dis Cen Dis Cen Dis<br />

0 1 1 1..14 0 8..12 2..7 off line<br />

1 0..3 1 2..8 0 5..7 1 off line<br />

2 0..3 1 2..8 0 5..7 1 off line<br />

3 0..1 1 1..11 0 5..7 2 off line<br />

4 0..1 1 4..11 0 9..13 1..2 off line<br />

5 1 1 1..11 0 5..7 2 off line<br />

6 1 1 1..11 0 0 2 off line<br />

Central<br />

Computing System<br />

PDA/<br />

Portal Processor<br />

RFID<br />

Reader<br />

RFID<br />

Tag<br />

Send tag ID<br />

<strong>and</strong> operation data<br />

Ask ID<br />

Send ID<br />

Ask ID<br />

Send ID<br />

Update<br />

database<br />

Send fruit data<br />

Show<br />

results<br />

Only Semi-automatic<br />

Systems<br />

(a)<br />

PDA/<br />

Portal Processor<br />

RFID<br />

Reader<br />

RFID<br />

Tag<br />

Ask ID <strong>and</strong> Data<br />

Send ID <strong>and</strong> Data<br />

Write New Data<br />

Ask ID <strong>and</strong> Data<br />

Send ID <strong>and</strong> Data<br />

Write New Data<br />

Show<br />

results<br />

Only Semi-automatic<br />

Systems<br />

(b)<br />

Figure 4.16. Automatic <strong>and</strong> semi-automatic IR interactions with centralized (a)<br />

<strong>and</strong> distributed (b) data location<br />

communications require some time, but they are often faster than traditional identification<br />

system. Furthermore the management of detailed in<strong>for</strong>mation can increase<br />

the frequency of identifications <strong>and</strong> so the employed time, <strong>for</strong> example the additional<br />

155


4 – RFID <strong>for</strong> Agri-food Traceability<br />

registration of an operation could require an additional brief stop, according to the<br />

modalities of the identification. The managed in<strong>for</strong>mation must be carefully chosen,<br />

according to the time saving <strong>and</strong> the accuracy targets of the system.<br />

In a fruit warehouse, the typically treated data are the producer, the caliber,<br />

the variety, the culture of the fruit, <strong>and</strong> the operations executed on fruit. Manual<br />

systems try to treat the minimum possible number of in<strong>for</strong>mation, but producer,<br />

caliber, variety <strong>and</strong> culture are required <strong>for</strong> identification.<br />

The most important characteristic <strong>for</strong> a company that is evaluating the adoption<br />

of an RFID based internal traceability system is the automation of the system. In a<br />

fruit warehouse, which adopts an RFID based traceability system <strong>and</strong> the container<br />

tagging method with centralized data or rewritable tags with any kind of data<br />

location, every bin has to be tagged only once, since bins <strong>and</strong> tags are both reusable;<br />

this activity is not embedded in the production flow, <strong>and</strong> it can be per<strong>for</strong>med off<br />

line. So the T T required by RFID based systems (RF ID T T ), differently from T T<br />

required by traditional systems (T raditional T T ), is not function of the quantity<br />

of treated fruit, but it is a function of the number of bins owned by the warehouse.<br />

Furthermore, according to the <strong>for</strong>mulas described in Section 4.4.2, the number of<br />

tagging actions RF ID t i that contribute to the average time required by each i th<br />

IR operation in an RFID-based system (RF ID IR i ) is RF ID t i = 0, so<br />

RF ID t i ≤ T raditional t i .<br />

The tagging can be manually, semi-automatically or automatically executed, as described<br />

in Section 4.4.2. The implementation of this activity, can be chosen without<br />

considering the production flow, but only evaluating the number of bins, the required<br />

work hours <strong>and</strong> the device cost.<br />

Reading <strong>and</strong> writing operations can be semi-automatic or automatic. The RFID<br />

technology allows executing both these operations by a digital communication. The<br />

IR activity, that is composed by the reading <strong>and</strong> if needed by the writing, is the<br />

core of the internal traceability system. The T IR required by RFID based system<br />

(RF ID T IR) is a function of the number of treated fruits IT . There<strong>for</strong>e, to optimize<br />

the internal traceability system firstly the IR activity must be optimized. According<br />

to Section 4.4.2, the complete <strong>for</strong>mulas to calculate RF ID T IR are:<br />

RF ID T IR =<br />

IT<br />

IT CN<br />

n∑<br />

(o i · (1 + e i ) · RF ID IR i );<br />

i=0<br />

RF ID IR i = r i · RF ID AR + w i · RF ID AW +<br />

+ min (d i ,1) · DBC + d i · DBQ + CC i + HC i + MV i .<br />

However, normally it is not possible to use a single RF ID AR, since the average<br />

time that is required by a reading of the tag ID (RF ID ARID), which is per<strong>for</strong>med<br />

156


4 – RFID <strong>for</strong> Agri-food Traceability<br />

IDr i times, is usually several times larger than the time <strong>for</strong> a reading of a normal<br />

area of the tag memory (RF ID ARM), which is per<strong>for</strong>med Mr i times. There<strong>for</strong>e,<br />

RF ID IR i = IDr i · RF ID ARID+<br />

+ Mr i · RF ID ARM + w i · RF ID AW + MV i<br />

+ min (d i ,1) · DBC + d i · DBQ + CC i + HC i<br />

(4.1)<br />

The IR operations that can be executed in a fruit warehouse are shown in Table 4.4.<br />

The underlined words represent the data that every traceability system must record.<br />

Each operation involves also the error checking, i.e., coherence comparison with<br />

previous operations. Furthermore, there is also an additional error management<br />

operation (i = 7). The characteristics of this operation are strictly related to the<br />

employed traceability system. o 7 represents the average number of wrong data<br />

insertions per<strong>for</strong>med <strong>for</strong> each filled bin.<br />

Fig. 4.16 shows the interaction diagrams of automatic <strong>and</strong> semi-automatic IR<br />

implementations with centralized (a) <strong>and</strong> distributed (b) data location<br />

In a semi-automatic system the reading <strong>and</strong> writing actions are executed by<br />

using mobile devices, like a Personal Digital Assistant (PDA). Human operators, <strong>for</strong><br />

every described operation that is supported by the implementation, have to move the<br />

mobile reader next to the tag <strong>and</strong> to type the in<strong>for</strong>mation needed by the operation.<br />

When an error affects a writing or a reading (e i ), the whole operation is repeated.<br />

This kind of error is mainly due to the incorrect use of the devices. Furthermore,<br />

when the system detects the introduction of possible wrong data (o 7 ), it requires<br />

that a human operator confirms the operation.<br />

In an automatic system based on RFID portal gates the reading <strong>and</strong> writing<br />

actions are automatically executed by the portals. Human operators normally do<br />

not need special devices, but <strong>for</strong> some operations, like the entrance of the fruit in<br />

the warehouse, they have to type the data about the fruit. However, this kind of<br />

system must allow RFID reading by using manual devices, in order to allow operators<br />

to supervise the system. Differently from a semi-automatic system, an automatic<br />

system can interact with tags <strong>for</strong> a strictly limited time, <strong>and</strong> the use of multiple<br />

RFID reading <strong>and</strong> writing operations can be a problem. In an automatic system<br />

the highest threat is the missed detection of a tag. The system may use devices like<br />

infrared sensors in order to detect the correct number of bins, <strong>and</strong> so to alert human<br />

operators of the missed detection of a bin.<br />

By analyzing the practical implementations of the described RFID based traceability<br />

systems, we identified the ranges of possible values of constants in (4.1) that<br />

are shown in Table 4.5.<br />

157


4 – RFID <strong>for</strong> Agri-food Traceability<br />

4.5.2 Implementation of the RFID Traceability System<br />

Several fruit warehouses were examined in order to detect their needs <strong>for</strong> an internal<br />

traceability system. The requirements considered at the design step are:<br />

ˆ reliability increase, as protection against legal problems;<br />

ˆ granularity precision increase, in order to limit withdrawal effects;<br />

ˆ integration with the productive process, to avoid re-engineering;<br />

ˆ time saving, to increase the effectiveness;<br />

ˆ low costs, according to the resources of a small enterprise;<br />

ˆ high usability, in order to allow the use of the system to seasonal manual<br />

workers with low technological background;<br />

ˆ br<strong>and</strong> prestige enhancement, to acces to new markets, with higher expectations.<br />

Proposed Internal Traceability System<br />

The proposed system was designed according to needs <strong>and</strong> resources of small <strong>and</strong><br />

medium agri-food companies. The aim of the system is to manage internal traceability<br />

of fruit warehouses in an effective <strong>and</strong> inexpensive way.<br />

The proposed system tries to accomplish the described requirements through the<br />

RFID technology. The main features of the system are described in the following.<br />

Every bin in the warehouse is tagged with an RFID tag. The bin life lasts several<br />

years, like the theoretical RFID tag life; so the specific tag is matched with a specific<br />

bin <strong>for</strong> their whole lifetime.<br />

The data about fruit <strong>and</strong> treatments are recorded directly on tag memories <strong>and</strong> in<br />

a central database. Operators use a PDA RFID reader. According to the activities<br />

they are per<strong>for</strong>ming, operators read <strong>and</strong> update data on tags by using the tool on<br />

the PDA. The tool records a copy of the data on the PDA.<br />

The warehouse is modeled by four key zones: entrance, refrigerating room, calibrator<br />

<strong>and</strong> fruit packer. On PDAs there is a specific <strong>and</strong> appropriate interface <strong>for</strong><br />

each key zone. Operators have to enter the key data, while the tool manages other<br />

in<strong>for</strong>mation.<br />

Periodically (e.g., each day), the data that are stored on the PDA are used to<br />

update the central database.<br />

The system is based on a cheap RFID implementation, with PDA RFID readers<br />

<strong>and</strong> without a wireless network. However the system upgrade is quickly achievable,<br />

158


4 – RFID <strong>for</strong> Agri-food Traceability<br />

by the installation of RFID gate <strong>and</strong> the change of the data management tool,<br />

without database alterations.<br />

The data system is designed in a modular way. Optional data, useful to improve<br />

traceability <strong>and</strong> to achieve added values, are joined to the central part of the data<br />

system, which includes the data necessary to the system operation. An enterprise<br />

could initially use only the essential part of the data system, <strong>and</strong> then could increase<br />

the quantity of used data, according to its needs.<br />

The macro targets of the proposed system are the following:<br />

ˆ to facilitate the global traceability, surpassing law requirements;<br />

ˆ to join traceability management with other complementary activities;<br />

ˆ to reach a structure that is easy to upgrade;<br />

ˆ to fulfill fruit warehouse needs.<br />

In order to facilitate the global traceability, the system can easily manage detailed<br />

in<strong>for</strong>mation about fruit origin. This in<strong>for</strong>mation could be used to immediately detect<br />

the source of a problem from the enterprise database, or they could be directly<br />

recorded on the output commodities. In addition the system univocally identifies<br />

commodities, with a fine granularity of number of fruits, so precision <strong>and</strong> security<br />

are increased, <strong>and</strong> frauds require more ef<strong>for</strong>t.<br />

In order to join traceability with other activities, the system records with precision,<br />

in addition to other in<strong>for</strong>mation, the time of the main operations. Recorded<br />

data allow tracking a specific commodity <strong>for</strong> its whole stay in the warehouse <strong>and</strong><br />

allow a thorough check of the production rate. So, one complementary activity is<br />

the production flow control. Another activity is listing, in fact the system records<br />

all the commodities present in the warehouse at any instant.<br />

In order to reach an easy to upgrade structure, the database is modular, in fact<br />

some entities could be unused, according to warehouse needs. PDA implementation<br />

can be changed with a higher automation level, without changing the database <strong>and</strong><br />

tagged RFID tags.<br />

Warehouse requirements are fulfilled as follows.<br />

To increase reliability the system is managed by h<strong>and</strong> devices, so operators can<br />

continually monitor its correct working; the univocal identification number of an<br />

RFID tag allows discriminating every fruit bin load; the proposed system tracks<br />

fruits, along their movements through different bins, with the best possible granularity<br />

precision. The system was adapted to the typical process flow of a fruit<br />

warehouse, so as to reach a good integration.<br />

The activity of traceability management is executed by few fast actions, which<br />

need short time. Each operation that concerns the fruit must be recorded; the<br />

159


4 – RFID <strong>for</strong> Agri-food Traceability<br />

recording is made by an operator by means of a PDA RFID reader; the staff that<br />

treats the fruit has to manage this activity concurrently; anyway each enterprise has<br />

its working processes, so the best way to match traceability management activities<br />

with daily operations may change.<br />

The lack of a comprehensive wireless network, the use of PDA RFID reader<br />

instead of gate readers, <strong>and</strong> the time saving, reduce costs.<br />

The low number of actions involved to manage the system, allows a high usability.<br />

The great quantity of recorded in<strong>for</strong>mation can be used <strong>for</strong> br<strong>and</strong> management,<br />

<strong>for</strong> instance data could be shown on a website, so the accuracy <strong>and</strong> precision demonstration<br />

will enhance the br<strong>and</strong> prestige.<br />

Figure 4.17.<br />

Data about warehouse treatments ER diagram<br />

In<strong>for</strong>mation System<br />

The database is divided in “static” data that are fixed <strong>and</strong> independent on the fruit<br />

arrival, “dynamic” data that are related to warehouse treatments, <strong>and</strong> mixed data.<br />

Static data can be recorded be<strong>for</strong>e fruit picking. They describe the fruit that<br />

will be treated, <strong>and</strong> the fruit origin. The most part of entities in this group are<br />

”static”, their values could remain unchanged <strong>for</strong> long periods, <strong>and</strong> mainly through<br />

one picking time.<br />

These entities are:<br />

160


4 – RFID <strong>for</strong> Agri-food Traceability<br />

ˆ culture, which represents the list of treated cultures;<br />

ˆ variety, which represents the list of treated varieties;<br />

ˆ producer, which represents the list of producers that are suppliers of the warehouse,<br />

<strong>and</strong> their related in<strong>for</strong>mation;<br />

ˆ action name, which represents the list of actions that are managed by the<br />

system;<br />

ˆ field, which represents the list of plots of ground from which the treated fruits<br />

arrive; the field is an entity that is used by farmers, <strong>and</strong> it isn’t cadastral;<br />

ˆ particle, which represents the list of cadastral particles from which treated<br />

fruits arrive;<br />

ˆ particles <strong>for</strong> field, which represents the links between particles <strong>and</strong> fields; a<br />

field contains some particles, but a particle can belong to more than one field;<br />

ˆ cultivations <strong>for</strong> superblock, which represents the links between cultivations<br />

<strong>and</strong> superblocks; see later in this section <strong>for</strong> explanations.<br />

The Entity-Relationship (ER) diagram of data that are related to warehouse<br />

treatments is shown in figure 3. These data are recorded while the fruit is treated.<br />

They track fruits <strong>and</strong> they describe fruit treatments. The most part of entities in<br />

this diagram are ”dynamic”, their values change continuously.<br />

These entities are:<br />

ˆ action, which represents the list of fruit treatment kinds; block, which represents<br />

the list of fruit blocks in the warehouse; a fruit block st<strong>and</strong>s <strong>for</strong> a group<br />

of fruits in one bin, <strong>and</strong> it is used as fruit base unit by the traceability system;<br />

ˆ superblock, which represents the list of superblocks in the warehouse; a fruit<br />

superblock st<strong>and</strong>s <strong>for</strong> a set of fruits that aren’t in bins; <strong>for</strong> instance when fruits<br />

of some bins are put in the calibrator they <strong>for</strong>m a superblock;<br />

ˆ superblock origin, which represents the links between two origin superblocks<br />

<strong>and</strong> one destination superblock; the aim of this entity is to manage fruit merging,<br />

which could often occur, especially in the calibrator;<br />

ˆ cultivations <strong>for</strong> superblocks, which represents the links between superblocks<br />

<strong>and</strong> their cultivations; see later in this section <strong>for</strong> explanations about cultivations.<br />

The entity cultivation represents the connection between the two parts of the<br />

database. The aim of this entity is describing the features of fruit superblocks, such<br />

as culture, variety, producer <strong>and</strong> origin particles.<br />

161


4 – RFID <strong>for</strong> Agri-food Traceability<br />

Table 4.6. Operation Occurrences of the Tested RFID System (RF) <strong>and</strong><br />

Traditional System (T)<br />

Para- RF T RF T RF T RF T RF T RF T<br />

meter i = 0 i = 1 i = 2 i = 3 i = 4 i = 5/6<br />

o i 1 1 2 2 2 2 1 1 1 1 1 1<br />

IDr i 2 0 1 0 1 0 2 0 2 0 2 0<br />

Mr i 12 1 7 0 7 0 9 0 9 1 9 0<br />

w i 9 1 4 0 4 0 1 0 8 1 1 0<br />

t i 0 1 0 0 0 0 0 0 0 1 0 0<br />

4.5.3 RFID-Based Traceability System Per<strong>for</strong>mance<br />

The proposed semiautomatic RFID-based traceability system was tested in a working<br />

fruit warehouse in order to evaluate the automation improvements. The testing<br />

was conducted in a single calibration line warehouse in Italy; sets of bins were tagged<br />

<strong>and</strong> tracked along the normal production flow.<br />

The used hardware included RFID passive tags SRIX4K from STMicroelectronics,<br />

compliant with ISO14443, with an EEPROM of 4 kbits; <strong>and</strong> an RFID reader<br />

ACG Dual ISO CF Card Reader Module, compliant with ISO14443, at frequency<br />

13.56 Mhz. The test tool was programmed in C# language by using Microsoft Visual<br />

Studio 2005, <strong>and</strong> it requires just 70 Kbytes on PDAs <strong>and</strong> 200 Kbytes on a central<br />

PC. The operators can interact with the tool by using a graphical interface on the<br />

PDA. The tool on the PDA manages the communications between the PDA reader<br />

<strong>and</strong> the tags, <strong>and</strong> it sends the resulting in<strong>for</strong>mation to the central PC. The tool on<br />

the PC receives the in<strong>for</strong>mation <strong>and</strong> it interacts with a Microsoft SQL Server 2005<br />

database in order to record them.<br />

The employed readers cost about 260e, the PDAs cost 180eeach; one RFID tag<br />

unit costs up to 0.7e. There<strong>for</strong>e, the hardware <strong>for</strong> a system that involves 10 readers<br />

<strong>and</strong> 10000 tags costs less than 11000¿. The software development has required about<br />

20 developer-months. The estimated cost of the software, including customization,<br />

<strong>for</strong> a small-medium company is lower than 5000e.<br />

The characteristics of the RFID system are:<br />

ˆ Data storage: compressed <strong>and</strong> distributed, computer database.<br />

ˆ Tagged object: container tagging method.<br />

ˆ Kind of data: ID, commodity characteristics, operation data.<br />

ˆ Data <strong>for</strong>mat: electronic code.<br />

162


4 – RFID <strong>for</strong> Agri-food Traceability<br />

ˆ Writing/reading automation: semiautomatic.<br />

ˆ Tagging: off line.<br />

According to the specific production flow of the warehouse used <strong>for</strong> the testing, the<br />

packing (i = 5) <strong>and</strong> the exit (i = 6) are managed as a unique activity. The average<br />

occurrences of the operations are shown in Table 4.6. The tagging is per<strong>for</strong>med<br />

off line, so ti is always null. The number of readings <strong>and</strong> writings is high, since it<br />

represents the call to a reading method of the RFID reader. In a manual system,<br />

as shown in Table 4.6, the number of reading is lower, but the time required by<br />

each reading operation is quite longer. The average time required by the system to<br />

execute the operations is:<br />

RF ID ARID = 205ms; RF ID ARM = 21ms;<br />

RF ID AW = 37ms;<br />

CC i = {30ms; 25ms; 25ms; 94ms; 85ms; 94ms}.<br />

For i = 0...5 .<br />

e i is inversely proportional to the experience of the operators with the tool.<br />

Considering a pessimistic case, let assume that e i is under 0.01 <strong>for</strong> each type of<br />

operation. o 7 is partially due to the low experience with the tool, <strong>and</strong> to normal<br />

errors, so its value in a semi-automatic system approaches the same value of a<br />

traditional system. However, <strong>for</strong> a traditional system the effects of wrong data<br />

insertion is negligible on T IR, so o 7 is close to 0. The time MV i depends on how the<br />

production flow is organized. However the MV i of a semiautomatic system is similar<br />

to the manual one. When the traceability IR activity is per<strong>for</strong>med by a suitable<br />

operator the MV i will be quite low, approximately 2 s; however, when this activity is<br />

per<strong>for</strong>med by the operator that drives the <strong>for</strong>klift, the MV i is larger, approximately<br />

10 s. Let assume that an efficient organization requires that an operator is in charge<br />

of the execution of traceability operations. At the entrance of a bin the operator<br />

sets its characteristics, so HC 0 is similar to the C 0 of a manual system. For all the<br />

other activities HC i is very low, approximately 200 ms, since the evaluated semiautomatic<br />

tool manages all the data, <strong>and</strong> the operator does not need to know <strong>and</strong><br />

to analyze them. The resulting RF ID IR i <strong>and</strong> RF ID T IR are:<br />

RF ID IR 0 = 3025ms + HC 0 ,RF ID IR 1 = 2725ms,<br />

RF ID IR 2 = 2725ms,RF ID IR 3 = 2930ms,<br />

RF ID IR 4 = 3170ms,RF ID IR 5 = 2930ms;<br />

RF ID T IR =<br />

IT n∑<br />

(o i · 1.01 · RF ID IR i ) =<br />

IT CN<br />

i=0<br />

= (IT/IT CN) · (23185ms + 1.01 · HC 0 ).<br />

The characteristics of the traditional traceability system employed by the warehouse<br />

are:<br />

163


4 – RFID <strong>for</strong> Agri-food Traceability<br />

ˆ Data storage: distributed, computer database.<br />

ˆ Tagged object: container tagging method.<br />

ˆ Kind of data: ID, commodity characteristics.<br />

ˆ Data <strong>for</strong>mat: written words.<br />

ˆ Reading automation: manual.<br />

ˆ Writing automation: automatic.<br />

ˆ Tagging automation: manual.<br />

The second <strong>and</strong> third steps (i = 1 <strong>and</strong> 2) are not supported. The data about the<br />

treatments are not recorded <strong>for</strong> any bin, so only the exit from the calibrator <strong>and</strong><br />

the entrance in the warehouse require writing operations, but each writing involves<br />

also a tagging operation. The reading is used <strong>for</strong> the traceability management only<br />

be<strong>for</strong>e calibration <strong>and</strong> packing. The approximate average time required to execute<br />

the operations is:<br />

T raditional AR = 2s; T raditional AW = 2s;<br />

T raditional AT = 5s.<br />

e i = 0, since it is negligible <strong>for</strong> manual systems. C i = HC i , so C i is steady <strong>for</strong> all<br />

the steps, <strong>and</strong> it is similar to the HC 0 of the RFID tool. MV i is longer <strong>for</strong> the steps<br />

that involve a tagging operation, where it requires about 5 s, since this operation<br />

requires that the operator gets the labels; <strong>for</strong> the other operations MV i is similar to<br />

the MV i of the RFID system. The resulting traditional IR i are:<br />

IR 0 = 12s + C i ,IR 1 = 0,IR 2 = 0,IR 3 = 4s + C i ,<br />

IR 4 = 12s + C i ,IR 5 = 4s + C i ;<br />

T raditional T IR = (IT/IT CN) · (32s + 4C i ).<br />

In order to evaluate the feasibility of the RFID traceability system we need<br />

to compare it to the printed tag system. According to the previously specified<br />

characteristics we can state that:<br />

IT<br />

IT CN (23.18s + 1.01HC 0) <<br />

IT<br />

IT CN (32s + 4C i);<br />

by simplifying (IT/IT CN), <strong>and</strong> since HC 0 is almost equal to C i , we have:<br />

RF ID T IR < traditional T IR.<br />

There<strong>for</strong>e, with an efficient organization of the work we can state that the RFID<br />

system manages more detailed data, in a shorter time than the printed tag system.<br />

The time saving allows increasing the production flow of the company. The RFID<br />

164


4 – RFID <strong>for</strong> Agri-food Traceability<br />

semi-automatic systems require a larger starting cost than traditional systems, but<br />

the maintenance of both the systems is mainly due to labor cost. According to the<br />

time analysis <strong>and</strong> to the described costs, <strong>for</strong> small/medium companies that spend<br />

the equivalent of 1 full time employer <strong>for</strong> traceability management, the estimated<br />

payback period is about 2 years. This result is also compatible with a previous<br />

analysis on an RFID trial [121].<br />

4.5.4 Conclusion<br />

The traceability in agri-food sector is a key factor, <strong>and</strong> its management has a great<br />

impact on the production flow of a company. For this reason an effective traceability<br />

system is fundamental <strong>for</strong> avoiding large waste of resources. Automation is regarded<br />

as the key factor to realize an effective internal traceability system, since manual<br />

activities require more time. Furthermore, a high automation brings warranties of<br />

accuracy, completeness, <strong>and</strong> reliability. There<strong>for</strong>e, to implement traceability without<br />

carefully considering all the automation options could entail the wastage of human<br />

<strong>and</strong> economic resources.<br />

In order to analyze the traceability management, a precise definition of traceability,<br />

<strong>and</strong> a classification of the automation levels of the agri-food company have been<br />

presented <strong>and</strong> described. The proposed framework may allow both researchers <strong>and</strong><br />

practitioners to per<strong>for</strong>m deterministic analysis on the per<strong>for</strong>mance of traceability<br />

systems.<br />

An RFID-based traceability system can treat several data in short time. The analyzed<br />

system, which is based on a semiautomatic implementation, can reach good<br />

benefits: it is inexpensive, it requires a larger starting cost than traditional systems,<br />

but its maintenance is smaller; it manages detailed in<strong>for</strong>mation about products <strong>and</strong><br />

treatments, <strong>and</strong> it requires lower execution time than traditional systems. The<br />

analysis has shown that the majority of the reached time saving is due first to the<br />

tagging operation, which in RFID system can be per<strong>for</strong>med off line, <strong>and</strong> second to<br />

the differences between the time required by semiautomatic reading/writing operations,<br />

<strong>and</strong> manual reading/writing operations. Furthermore, the analysis has shown<br />

that manual systems require more time in order to allow employers to analyze the<br />

operations <strong>and</strong> to make decisions.<br />

165


Chapter 5<br />

Conclusion<br />

<strong>Pervasive</strong> technologies represent a good opportunity to improve the majority of<br />

human activities. However, they involve great problems <strong>for</strong> in<strong>for</strong>mation security<br />

<strong>and</strong> efficiency. This study has deeply analyzed RFID technology, which represents<br />

one of the more promising <strong>and</strong> widely employed pervasive technology. Both the<br />

security <strong>and</strong> the communications topics have been studied.<br />

The security problems involved by RFID are discussed. Data-tampering is deeply<br />

analyzed; tamper-evident <strong>and</strong> tamper-resistant approaches <strong>for</strong> RFID have been surveyed,<br />

classified <strong>and</strong> compared, highlighting their benefits <strong>and</strong> drawbacks. The application<br />

of public key cryptography to RFID context is analyzed, highlighting the<br />

strength <strong>and</strong> weakness points. New approaches based on public key cryptography<br />

have been presented. The first proposal is to use st<strong>and</strong>ard RFID tags to implement<br />

an anti-counterfeit mechanism in selected wine production environments. Then,<br />

some security protocols <strong>for</strong> traceability <strong>and</strong> SCM have been proposed. These approaches,<br />

which are based on RFID tags without cryptographic capability, protect<br />

the privacy, <strong>and</strong> provide additional security features. The last approach implements<br />

an anti-counterfeit mechanism thanks to additional cryptographic hardware<br />

designed <strong>for</strong> UHF RFID tags.<br />

The efficiency problems due to RFID reader-to-reader collision, which represents<br />

the mutual interference generated by RFID readers in the same area, have been described.<br />

An evaluation method is proposed, <strong>and</strong> then, a new multichannel protocol,<br />

which improves previous approaches, has been presented <strong>and</strong> evaluated.<br />

Finally, the agri-food sector has been analyzed, <strong>and</strong> a tool <strong>for</strong> traceability management<br />

based on RFID has been developed, in order to verify on the field the<br />

technological characteristics of RFID. Furthermore, a precise definition of traceability,<br />

<strong>and</strong> a classification of the automation levels of agri-food companies have been<br />

presented <strong>and</strong> described. The proposed framework may allow both researchers <strong>and</strong><br />

practitioners to per<strong>for</strong>m deterministic analysis on the per<strong>for</strong>mance of traceability<br />

systems.<br />

166


Bibliography<br />

[1] Annual report to parliament 2005 - report on the personal in<strong>for</strong>mation protection<br />

<strong>and</strong> electronic documents act.<br />

[2] Combating counterfeit drugs: A report of the food <strong>and</strong> drug administration.<br />

[3] Iso 9001-2000.<br />

[4] Laying down the general principles <strong>and</strong> requirements of food law, establishing<br />

the European Food Safety Authority <strong>and</strong> laying down procedures in matters<br />

of food safety. REGULATION (EC) No 178/2002 OF THE EUROPEAN<br />

PARLIAMENT AND OF THE COUNCIL of 28 January 2002.<br />

[5] Ntru. genuid.<br />

[6] Rfid position statement of consumer privacy <strong>and</strong> civil liberties organizations,<br />

Nov 2003.<br />

[7] Traceability implementation, 2003.<br />

[8] EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol<br />

<strong>for</strong> communications at 860 MHz – 960 MHz, 2004.<br />

[9] RSA-200 is factored!, 2005. available at http://www.rsa.com/rsalabs/<br />

node.asp?id=2879.<br />

[10] Smart (rfid) tags: Safeguards applying to their use, March 2005. Bollettino<br />

del n. 59.<br />

[11] Working document on data protection issues related to rfid technology, Nov<br />

2005. Article 29.<br />

[12] ETSI 4.2.1-Telecommunications <strong>and</strong> internet converged services <strong>and</strong> protocols<br />

<strong>for</strong> advanced networking (TISPAN); methods <strong>and</strong> protocols; part 1: Method<br />

<strong>and</strong> pro<strong>for</strong>ma <strong>for</strong> threat, risk, vulnerability analysis, 12 2006. Technical Specification.<br />

[13] Electromagnetic compatibility <strong>and</strong> radio spectrum matters (erm); radio frequency<br />

identification equipment operating in the b<strong>and</strong> 865 mhz to 868 mhz<br />

with power levels up to 2 w; part 1: Technical requirements <strong>and</strong> methods of<br />

measurement, 2008.<br />

[14] MF3ICD21, MF3ICD41, MF3ICD81 - MIFARE DESFire EV1 contactless<br />

multi-application IC. Product short data sheet, March 2009. Rev. 02.<br />

167


Bibliography<br />

[15] S. Agarwal, A. Joshi, T. Finin, Y. Yesha, <strong>and</strong> T. Ganous. A pervasive computing<br />

system <strong>for</strong> the operating room of the future. Mobile Networks <strong>and</strong><br />

Applications, 12(2):215–228, 2007.<br />

[16] Syed A. Ahson <strong>and</strong> Mohammad Ilyas, editors. RFID H<strong>and</strong>book : Applications,<br />

Technology, <strong>Security</strong>, <strong>and</strong> Privacy. CRC Press, 2008.<br />

[17] Giuseppe Ateniese, Jan Camenisch, <strong>and</strong> Breno de Medeiros. Untraceable<br />

RFID tags via insubvertible encryption. In CCS ’05: Proceedings of the 12th<br />

ACM conference on Computer <strong>and</strong> communications security, pages 92–101,<br />

New York, NY, USA, 2005. ACM.<br />

[18] C. Atock. Where’s my stuff? Manufacturing Engineer, 82(2):24–27, April<br />

2003.<br />

[19] Gildas Avoine. Adversarial model <strong>for</strong> radio frequency identification. Cryptology<br />

ePrint Archive, Report 2005/049, 2005. http://eprint.iacr.org/.<br />

[20] Gildas Avoine <strong>and</strong> Philippe Oechslin. A scalable <strong>and</strong> provably secure hashbased<br />

RFID protocol. In PERCOMW ’05: Proceedings of the Third IEEE International<br />

Conference on <strong>Pervasive</strong> Computing <strong>and</strong> <strong>Communications</strong> Workshops,<br />

pages 110–114, Washington, DC, USA, 2005. IEEE Computer Society.<br />

[21] G. Ayalew, U. McCarthy, K. McDonnell, F. Butler, P. B. McNulty, <strong>and</strong> S. M.<br />

Ward. Electronic tracking <strong>and</strong> tracing in food <strong>and</strong> feed traceability. LogForum,<br />

2(2):1–17, 2006.<br />

[22] L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, <strong>and</strong> I. Verbauwhede.<br />

An elliptic curve processor suitable <strong>for</strong> rfid-tags, 2006.<br />

[23] L. Batina, N. Mentens, K. Sakiyama, B. Preneel, <strong>and</strong> I. Verbauwhede. Lowcost<br />

elliptic curve cryptography <strong>for</strong> wireless sensor networks. In <strong>Security</strong> <strong>and</strong><br />

Privacy in Ad-Hoc <strong>and</strong> Sensor Networks, LNCS, pages 6–17. Springer Berlin<br />

/ Heidelberg, 2006.<br />

[24] M. Bellare, A. Boldreva, A. Desai, <strong>and</strong> D. Pointcheval. Key-privacy in publickey<br />

encryption. In Advances in Cryptology — ASIACRYPT 2001, LNCS,<br />

pages 566–582. Springer Berlin / Heidelberg, 2001.<br />

[25] Mihir Bellare, Ran Canetti, <strong>and</strong> Hugo Krawczyk. Keying hash functions <strong>for</strong><br />

message authentication. In Advances in Cryptology — CRYPTO ’96, LNCS,<br />

pages 1–15. Springer Berlin / Heidelberg, 2005.<br />

[26] A.R. Beres<strong>for</strong>d <strong>and</strong> F. Stajano. Location privacy in pervasive computing.<br />

<strong>Pervasive</strong> Computing, IEEE, 2(1):46–55, jan-mar 2003.<br />

[27] P. Bernardi, C. Demartini, F. G<strong>and</strong>ino, B. Montrucchio, M. Rebaudengo, <strong>and</strong><br />

E.R. Sanchez. Agri-food traceability management using a RFID system with<br />

privacy protection. In Advanced In<strong>for</strong>mation Networking <strong>and</strong> Applications,<br />

2007. AINA ’07. 21st International Conference on, pages 68–75, May 2007.<br />

[28] P. Bernardi, F. G<strong>and</strong>ino, F. Lamberti, B. Montrucchio, M. Rebaudengo, <strong>and</strong><br />

E.R. Sanchez. An anti-counterfeit mechanism <strong>for</strong> the application layer in<br />

168


Bibliography<br />

low-cost RFID devices. In Circuits <strong>and</strong> Systems <strong>for</strong> <strong>Communications</strong>, 2008.<br />

ECCSC 2008. 4th European Conference on, pages 227–231, July 2008.<br />

[29] Paolo Bernardi, Filippo G<strong>and</strong>ino, Bartolomeo Montrucchio, Maurizio Rebaudengo,<br />

<strong>and</strong> Erwing Ricardo Sanchez. Design of an uhf rfid transponder <strong>for</strong><br />

secure authentication. In GLSVLSI ’07: Proceedings of the 17th ACM Great<br />

Lakes symposium on VLSI, pages 387–392, New York, NY, USA, 2007. ACM.<br />

[30] S.M. Birari <strong>and</strong> S. Iyer. Mitigating the reader collision problem in RFID<br />

networks with mobile readers. In Networks, 2005. Jointly held with the 2005<br />

IEEE 7th Malaysia International Conference on Communication., 2005 13th<br />

IEEE International Conference on, volume 1, page 6 pp., Nov. 2005.<br />

[31] S.M. Birari <strong>and</strong> S. Iyer. PULSE: A MAC protocol <strong>for</strong> RFID networks. In<br />

Embedded <strong>and</strong> Ubiquitous Computing, volume 1 of LNCS, pages 1036–1046.<br />

2005.<br />

[32] Michael Boehlje <strong>and</strong> Otto Doering. Farm policy in an industrialized agriculture.<br />

Journal of Agribusiness, 18(1):53–60, March 2000.<br />

[33] Dan Boneh. The decision diffie-hellman problem. In Algorithmic Number<br />

Theory, LNCS, pages 48–63. Springer Berlin / Heidelberg, 1998.<br />

[34] R. W Boss. RFID technology <strong>for</strong> libraries. Library Technology Reports, 39(6),<br />

2003.<br />

[35] Jan Camenisch <strong>and</strong> Anna Lysyanskaya. Signature schemes <strong>and</strong> anonymous<br />

credentials from bilinear maps. In Advances in Cryptology – CRYPTO 2004,<br />

LNCS, pages 56–72. Springer Berlin / Heidelberg, 2004.<br />

[36] Kainan Cha, S. Jagannathan, <strong>and</strong> D. Pommerenke. Adaptive power control<br />

protocol with hardware implementation <strong>for</strong> wireless sensor <strong>and</strong> rfid reader<br />

networks. Systems Journal, IEEE, 1(2):145–159, Dec. 2007.<br />

[37] David L. Chaum. Untraceable electronic mail, return addresses, <strong>and</strong> digital<br />

pseudonyms. Commun. ACM, 24(2):84–90, 1981.<br />

[38] Shuo Chen„, Jun Xu, Emre C. Sezer, Prachi Gauriar, <strong>and</strong> Ravishankar K.<br />

Iyer„. Non-control-data attacks are realistic threats. In SSYM’05: Proceedings<br />

of the 14th conference on USENIX <strong>Security</strong> Symposium, pages 12–12, Berkeley,<br />

CA, USA, 2005. USENIX Association.<br />

[39] B. Chor <strong>and</strong> R.L. Rivest. A knapsack-type public key cryptosystem based<br />

on arithmetic in finite fields. In<strong>for</strong>mation Theory, IEEE Transactions on,<br />

34(5):901–909, sep 1988.<br />

[40] C.S. Collberg <strong>and</strong> C. Thomborson. Watermarking, tamper-proofing, <strong>and</strong> obfuscation<br />

- tools <strong>for</strong> software protection. Software Engineering, IEEE Transactions<br />

on, 28(8):735–746, Aug 2002.<br />

[41] D. Corsten <strong>and</strong> T.W. Gruen. Stock-outs cause walkouts. Harvard Business<br />

Review, pages 26–28, 2004.<br />

[42] D. Boneh, B. Lynn, <strong>and</strong> H. Shacham. Short signatures from the weil pairing.<br />

Journal of Cryptology, 17(4):297–319, Sep. 2004.<br />

169


Bibliography<br />

[43] W. Diffie <strong>and</strong> M. Hellman. New directions in cryptography. In<strong>for</strong>mation<br />

Theory, IEEE Transactions on, 22(6):644–654, nov 1976.<br />

[44] Tassos Dimitriou. A secure <strong>and</strong> efficient rfid protocol that could make big<br />

brother (partially) obsolete. In PERCOM ’06: Proceedings of the Fourth<br />

Annual IEEE International Conference on <strong>Pervasive</strong> Computing <strong>and</strong> <strong>Communications</strong>,<br />

pages 269–275, Washington, DC, USA, 2006. IEEE Computer<br />

Society.<br />

[45] T. Elgamal. A public key cryptosystem <strong>and</strong> a signature scheme based on<br />

discrete logarithms. In<strong>for</strong>mation Theory, IEEE Transactions on, 31(4):469–<br />

472, Jul 1985.<br />

[46] D.W. Engels <strong>and</strong> S.E. Sarma. The reader collision problem. In Systems, Man<br />

<strong>and</strong> Cybernetics, 2002 IEEE International Conference on, volume 3, pages 6<br />

pp. vol.3–, Oct. 2002.<br />

[47] Jun-Bong Eom, Soon-Bin Yim, <strong>and</strong> Tae-Jin Lee. An efficient reader anticollision<br />

algorithm in dense RFID networks with mobile RFID readers. Industrial<br />

Electronics, IEEE Transactions on, 56(7):2326–2336, July 2009.<br />

[48] Martin Feldhofer. An authentication protocol in a security layer <strong>for</strong> rfid smart<br />

tags. In Stiftung Secure In<strong>for</strong>mation <strong>and</strong> Communication <strong>Technologies</strong> SIC,<br />

pages 759–762. IEEE, 2004.<br />

[49] Klaus Finkenzeller. RFID H<strong>and</strong>book: Fundamentals <strong>and</strong> Applications in Contactless<br />

Smart Cards <strong>and</strong> Identification. John Wiley & Sons, Inc., New York,<br />

NY, USA, 2003.<br />

[50] Caroline Fontaine <strong>and</strong> Fabien Gal<strong>and</strong>. A survey of homomorphic encryption<br />

<strong>for</strong> nonspecialists. EURASIP Journal on In<strong>for</strong>mation <strong>Security</strong>, 24(2), 2007.<br />

[51] Eiichiro Fujisaki <strong>and</strong> Tatsuaki Okamoto. Secure integration of asymmetric<br />

<strong>and</strong> symmetric encryption schemes. In CRYPTO ’99: Proceedings of the 19th<br />

Annual International Cryptology Conference on Advances in Cryptology, pages<br />

537–554, London, UK, 1999. Springer-Verlag.<br />

[52] F. G<strong>and</strong>ino, R. Ferrero, B. Montrucchio, <strong>and</strong> M. Rebaudengo. Introducing<br />

probability in RFID reader-to-reader anti-collision. In Network Computing<br />

<strong>and</strong> Applications, 2009. NCA 2009. Eighth IEEE International Symposium<br />

on, pages 250–257, July 2009.<br />

[53] F. G<strong>and</strong>ino, B. Montrucchio, M. Rebaudengo, <strong>and</strong> E. R. Sanchez. On improving<br />

automation by integrating RFID in the traceability management of the<br />

agri-food sector. Industrial Electronics, IEEE Transactions on, 56(7):2357–<br />

2365, July 2009.<br />

[54] F. G<strong>and</strong>ino, B. Montrucchio, M. Rebaudengo, <strong>and</strong> E.R. Sanchez. Analysis of<br />

an RFID-based in<strong>for</strong>mation system <strong>for</strong> tracking <strong>and</strong> tracing in an agri-food<br />

chain. In RFID Eurasia, 2007 1st Annual, pages 1–6, Sept. 2007.<br />

[55] J. Garcia-Alfaro, M. Barbeau, <strong>and</strong> E. Kranakis. Analysis of threats to the<br />

security of EPC networks. In Communication Networks <strong>and</strong> Services Research<br />

170


Bibliography<br />

Conference, 2008. CNSR 2008. 6th Annual, pages 67–74, May 2008.<br />

[56] J. Garcia-Alfaro, M. Barbeau, <strong>and</strong> E. Kranakis. <strong>Security</strong> threats on EPC<br />

based RFID systems. In In<strong>for</strong>mation Technology: New Generations, 2008.<br />

ITNG 2008. Fifth International Conference on, pages 1242–1244, April 2008.<br />

[57] S.L. Garfinkel, A. Juels, <strong>and</strong> R. Pappu. RFID privacy: an overview of problems<br />

<strong>and</strong> proposed solutions. <strong>Security</strong> & Privacy, IEEE, 3(3):34–43, May-June<br />

2005.<br />

[58] Blaise Gassend, Dwaine Clarke, Marten van Dijk, <strong>and</strong> Srinivas Devadas. Silicon<br />

physical r<strong>and</strong>om functions. In CCS ’02: Proceedings of the 9th ACM<br />

conference on Computer <strong>and</strong> communications security, pages 148–160, New<br />

York, NY, USA, 2002. ACM.<br />

[59] G. Gaubatz, J.-P. Kaps, E. Ozturk, <strong>and</strong> B. Sunar. State of the art in ultra-low<br />

power public key cryptography <strong>for</strong> wireless sensor networks. pages 146–150,<br />

march 2005.<br />

[60] B J Gibson, J T Mentzer, <strong>and</strong> R L Cook. Supply chain management: the<br />

pursuit of a consensus definition. Journal of Business Logistics, 26(2):17–25,<br />

2005.<br />

[61] E. Golan, B. Krissoff, F. Kuchler, K. Nelson, G. Price, <strong>and</strong> L. Calvin. Traceability<br />

in the US food supply: Dead end or superhighway? Choices, 18(2):17–<br />

20, 2003.<br />

[62] S. Goldwasser <strong>and</strong> S. Micali. Probabilistic encryption. Journal of Computer<br />

<strong>and</strong> System Sciences, 2:270–299, apr 1984.<br />

[63] Philippe Golle, Markus Jakobsson, Ari Juels, <strong>and</strong> Paul Syverson. Universal<br />

re-encryption <strong>for</strong> mixnets. In Topics in Cryptology – CT-RSA 2004, LNCS.<br />

Springer Berlin / Heidelberg, 2004.<br />

[64] Sung Won Kim Gyanendra Prasad Joshi. Survey, nomenclature <strong>and</strong> comparison<br />

of reader anti-collision protocols in RFID. IETE Technical Review,<br />

25(5):285–292, 2008.<br />

[65] Soonshin Han, HyungSoo Lim, <strong>and</strong> JangMyung Lee. An efficient localization<br />

scheme <strong>for</strong> a differential-driving mobile robot based on RFID system. Industrial<br />

Electronics, IEEE Transactions on, 54(6):3362–3369, Dec. 2007.<br />

[66] B.C. Hardgrave, M. Waller, <strong>and</strong> R. Miller. Does rfid reduce out of stocks? a<br />

preliminary analysis, 2005. Tech. report.<br />

[67] H. Hartenstein <strong>and</strong> K.P. Laberteaux. Topics in ad hoc <strong>and</strong> sensor networks -<br />

a tutorial survey on vehicular ad hoc networks. <strong>Communications</strong> Magazine,<br />

IEEE, 46(6):164–171, June 2008.<br />

[68] Junius Ho, Daniel W. Engels, <strong>and</strong> Sanjay E. Sarma. HiQ: A hierarchical<br />

q-learning algorithm to solve the reader collision problem. In SAINT-W<br />

’06: Proceedings of the International Symposium on Applications on Internet<br />

Workshops, pages 88–91, Washington, DC, USA, 2006. IEEE Computer<br />

Society.<br />

171


Bibliography<br />

[69] Jeffrey Hoffstein, Jill Pipher, <strong>and</strong> Joseph H. Silverman. Ntru: A ring-based<br />

public key cryptosystem. In Algorithmic Number Theory, LNCS, pages 267–<br />

288. Springer Berlin / Heidelberg, 1998.<br />

[70] Jeffrey Hoffstein <strong>and</strong> Joseph Silverman. Optimizations <strong>for</strong> ntru. In In Publickey<br />

Cryptography <strong>and</strong> Computational Number Theory., pages 11–15, 2000.<br />

[71] Michael Howard <strong>and</strong> David Leblanc. Writing Secure Code. Microsoft Press,<br />

Redmond, WA, USA, 2001. Foreword By-Valentine,, Brian.<br />

[72] Yu-Chia Hsu, An-Pin Chen, <strong>and</strong> Chun-Hung Wang. A RFID-enabled traceability<br />

system <strong>for</strong> the supply chain of live fish. pages 81–86, sept. 2008.<br />

[73] International Organization <strong>for</strong> St<strong>and</strong>ardization, Geneva, Switzerl<strong>and</strong>.<br />

ISO/IEC 9798-2 - In<strong>for</strong>mation technology - <strong>Security</strong> techniques - Entity authentication<br />

- Part 2: Mechanisms using symmetric encipherment algorithms,<br />

1994.<br />

[74] Reiner Jedermann, Luis Ruiz-Garcia, <strong>and</strong> Walter Lang. Spatial temperature<br />

profiling by semi-passive rfid loggers <strong>for</strong> perishable food transportation. Comput.<br />

Electron. Agric., 65(2):145–154, 2009.<br />

[75] N J Jeon, C S Leem, M H Kim, <strong>and</strong> H G Shin. A taxonomy of ubiquitous computing<br />

applications. Wireless Personal <strong>Communications</strong>, 43(4):1229–1239,<br />

2007.<br />

[76] Wen-Shenq Juang, Sian-Teng Chen, <strong>and</strong> Horng-Twu Liaw. Robust <strong>and</strong> efficient<br />

password-authenticated key agreement using smart cards. Industrial<br />

Electronics, IEEE Transactions on, 55(6):2551–2556, June 2008.<br />

[77] A. Juels. RFID security <strong>and</strong> privacy: a research survey. Selected Areas in<br />

<strong>Communications</strong>, IEEE Journal on, 24(2):381–394, Feb. 2006.<br />

[78] Ari Juels. Minimalist cryptography <strong>for</strong> low-cost rfid tags. pages 149–164.<br />

Springer-Verlag, 2003.<br />

[79] Ari Juels <strong>and</strong> Ravikanth Pappu. Squealing euros: Privacy protection in<br />

RFID-enabled banknotes. In Financial Cryptography, LNCS, pages 103–121.<br />

Springer Berlin / Heidelberg, 2003.<br />

[80] Ari Juels, Ronald L. Rivest, <strong>and</strong> Michael Szydlo. The blocker tag: Selective<br />

blocking of RFID tags <strong>for</strong> consumer privacy. In 8th ACM Conference on<br />

Computer <strong>and</strong> <strong>Communications</strong> <strong>Security</strong>, pages 103–111. ACM Press, 2003.<br />

[81] B. Kalisk. PKCS #1: RSA Encryption. RSA Laboratories East, 1998. available<br />

at http://www.ietf.org/rfc/rfc2313.txt.<br />

[82] Karl Prince, Humberto Morán, <strong>and</strong> Duncan McFarlane. Auto-ID use case:<br />

Food manufacturing company distribution, 2003.<br />

[83] Joongheon Kim, Wonjun Lee, Eunkyo Kim, Dongshin Kim, <strong>and</strong> Kyoungwon<br />

Suh. Optimized transmission power control of interrogators <strong>for</strong> collision arbitration<br />

in uhf rfid systems. <strong>Communications</strong> Letters, IEEE, 11(1):22–24, Jan.<br />

2007.<br />

172


Bibliography<br />

[84] Paris Kitsos <strong>and</strong> Yan Zhang, editors. RFID <strong>Security</strong>: Techniques, <strong>Protocols</strong><br />

<strong>and</strong> System-On-Chip Design. Springer Publishing Company, Incorporated,<br />

2008.<br />

[85] A. Kranendonk <strong>and</strong> S. Rackebr<strong>and</strong>t. Optimising availability - getting products<br />

on the shelf! In Official ECR Europe Conference, 2002.<br />

[86] S. Kumar <strong>and</strong> C. Paar. Are st<strong>and</strong>ards compliant elliptic curve cryptosystems<br />

feasible on rfid? In Workshop on RFID <strong>Security</strong>, pages 11–15, Jul 2006.<br />

[87] RSA LABS. available at http://www.rsa.com/rsalabs/.<br />

[88] Young M. Lee, Feng Cheng, <strong>and</strong> Ying Tat Leung. Exploring the impact of<br />

RFID on supply chain dynamics. In WSC ’04: Proceedings of the 36th conference<br />

on Winter simulation, pages 1145–1152. Winter Simulation Conference,<br />

2004.<br />

[89] Louis A. Lefebvre, Elisabeth Lefebvre, Ygal Bendavid, Samuel Fosso Wamba,<br />

<strong>and</strong> Harold Boeck. Rfid as an enabler of b-to-b e-commerce <strong>and</strong> its impact on<br />

business processes: A pilot study of a supply chain in the retail industry. In<br />

HICSS ’06: Proceedings of the 39th Annual Hawaii International Conference<br />

on System Sciences, page 104.1, Washington, DC, USA, 2006. IEEE Computer<br />

Society.<br />

[90] C. Loebbecke. RFID technology <strong>and</strong> applications in the retail supply chain:<br />

The early metro group pilot. In 18th Bled conference on eIntegration in action,<br />

2005.<br />

[91] R. Loftus. Traceability of biotech-derived animals: application of DNA<br />

technology. Scientific <strong>and</strong> Technical Review - The Office International des<br />

épizooties, 24(1):231–242, 2005.<br />

[92] Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, <strong>and</strong> Stefan Wolf.<br />

Pseudonym systems. In Selected Areas in Cryptography, LNCS, pages 184–<br />

199. Springer Berlin / Heidelberg, 2000.<br />

[93] R. Martí, S. Robles, A. Martin-Campillo, <strong>and</strong> J. Cucurull. Providing early<br />

resource allocation during emergencies: The mobile triage tag. Journal of<br />

Network <strong>and</strong> Computer Applications, 32(6):1167–1182, 2009.<br />

[94] Alfred J. Menezes, Scott A. Vanstone, <strong>and</strong> Paul C. Van Oorschot. H<strong>and</strong>book<br />

of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA, 1996.<br />

[95] Gerome Miklau <strong>and</strong> Dan Suciu. Implementing a tamper-evident database<br />

system. In Advances in Computer Science – ASIAN 2005, LNCS, pages 28–<br />

48. Springer Berlin / Heidelberg, 2005.<br />

[96] M.-L. Ming-Ling Chuang <strong>and</strong> W.H. Shaw. RFID: Integration stages in supply<br />

chain management. Engineering Management Review, IEEE, 35(2):80–87,<br />

Quarter 2007.<br />

[97] M. Mohan, V. Potdar, <strong>and</strong> E. Chang. Recovering <strong>and</strong> restoring tampered<br />

RFID data using steganographic principles. In Industrial Technology, 2006.<br />

ICIT 2006. IEEE International Conference on, pages 2853–2859, Dec. 2006.<br />

173


Bibliography<br />

[98] E.W.T. Ngai, F.F.C. Suk, <strong>and</strong> S.Y.Y. Lo. Development of an rfid-based sushi<br />

management system: The case of a conveyor-belt sushi restaurant. International<br />

Journal of Production Economics, 112(2):630–645, 2008. Special Section<br />

on RFID: Technology, Applications, <strong>and</strong> Impact on Business Operations.<br />

[99] Obi Obowoware. <strong>Security</strong> issues in mobile ad-hoc networks: A survey. The<br />

17th White House Papers Graduate Research In In<strong>for</strong>matics at Sussex, pages<br />

40–44, June 2004.<br />

[100] Akihiro Ogino, Sae-Ueng Somkiat, <strong>and</strong> Toshikazu Kato. The inspiring store:<br />

Decision support system <strong>for</strong> shopping based on individual interests. In G. Salvendy<br />

M.J. Smith, editor, Human Interface <strong>and</strong> the Management of In<strong>for</strong>mation.<br />

Interacting in In<strong>for</strong>mation Environments, LNCS, pages 948–954.<br />

Springer-Verlag, 2007.<br />

[101] M. Ohkubo, K. Suzuki, <strong>and</strong> S. Kinoshita. Efficient hash-chain based RFID<br />

privacy protection scheme. In International Conference on Ubiquitous Computing<br />

– Ubicomp, Workshop Privacy: Current Status <strong>and</strong> Future Directions,<br />

2004.<br />

[102] L. U. Opara. Traceability in agriculture <strong>and</strong> food supply chain: a review of<br />

basic concepts, technological implications, <strong>and</strong> future prospects. Journal of<br />

Food, Agriculture <strong>and</strong> Environment, 1(1):101–106, 2003.<br />

[103] Raja Parasuraman <strong>and</strong> Victor Riley. Humans <strong>and</strong> automation: Use, misuse,<br />

disuse, abuse. Human Factors, 39(2):230–253, June 1997.<br />

[104] S. Park <strong>and</strong> S. Hashimoto. Autonomous mobile robot navigation using passive<br />

RFID in indoor environment. Industrial Electronics, IEEE Transactions on,<br />

56(7):2366–2373, July 2009.<br />

[105] M. Potdar, E. Chang, <strong>and</strong> V. Potdar. Applications of RFID in pharmaceutical<br />

industry. In Industrial Technology, 2006. ICIT 2006. IEEE International<br />

Conference on, pages 2860–2865, Dec. 2006.<br />

[106] V. Potdar <strong>and</strong> E. Chang. Tamper detection in RFID tags using fragile watermarking.<br />

In Industrial Technology, 2006. ICIT 2006. IEEE International<br />

Conference on, pages 2846–2852, Dec. 2006.<br />

[107] Vidyasagar Potdar, Chen Wu, <strong>and</strong> Elizabeth Chang. Tamper detection <strong>for</strong><br />

ubiquitous RFID-enabled supply chain. In Computational Intelligence <strong>and</strong><br />

<strong>Security</strong> - CIS 2005, LNCS, pages 273–278. Springer Berlin / Heidelberg,<br />

2005.<br />

[108] Damith C. Ranasinghe, Daniel W. Engels, <strong>and</strong> Peter H. Cole. Low-cost RFID<br />

systems: Confronting security <strong>and</strong> privacy. In Auto-ID Labs Research Workshop,<br />

2005.<br />

[109] John F. Reid, Qin Zhang, Noboru Noguchi, <strong>and</strong> Monte Dickson. Agricultural<br />

automatic guidance research in north america. Computers <strong>and</strong> Electronics in<br />

Agriculture, 25(1-2):155–167, 2000.<br />

174


Bibliography<br />

[110] R. L. Rivest, A. Shamir, <strong>and</strong> L. Adleman. A method <strong>for</strong> obtaining digital signatures<br />

<strong>and</strong> public-key cryptosystems. Commun. ACM, 21(2):120–126, 1978.<br />

[111] E. Sahin, Y. Dallery, <strong>and</strong> S. Gershwin. Per<strong>for</strong>mance evaluation of a traceability<br />

system. an application to the radio frequency identification technology.<br />

In Systems, Man <strong>and</strong> Cybernetics, 2002 IEEE International Conference on,<br />

volume 3, pages 6 pp. vol.3–, Oct. 2002.<br />

[112] Junichiro Saito, Junichiro Saito, Jae-Cheol Ryou, <strong>and</strong> Kouichi Sakurai. Enhancing<br />

privacy of universal re-encryption scheme <strong>for</strong> rfid tags. In Embedded<br />

<strong>and</strong> Ubiquitous Computing, LNCS, pages 55–84. Springer Berlin / Heidelberg,<br />

2000.<br />

[113] E.R. Sanchez, F. G<strong>and</strong>ino, B. Montrucchio, <strong>and</strong> M. Rebaudengo. Public-key<br />

in RFIDs: Appeal <strong>for</strong> asymmetry. In Y. Zhang <strong>and</strong> P. Kitsos, editors, <strong>Security</strong><br />

in RFID <strong>and</strong> Sensor Networks. Auerbach Publications, TaylorFrancis Group,<br />

2009.<br />

[114] Q.Z. Sheng, Xue Li, <strong>and</strong> S. Zeadally. Enabling next-generation RFID applications:<br />

Solutions <strong>and</strong> challenges. Computer, 41(9):21–28, Sept. 2008.<br />

[115] Dong-Her Shih, Po-Ling Sun, David C. Yen, <strong>and</strong> Shi-Ming Huang. Taxonomy<br />

<strong>and</strong> survey of RFID anti-collision protocols. Computer <strong>Communications</strong>,<br />

29(11):2150–2166, 2006.<br />

[116] A. Soylemezoglu, M. J. Zawodniok, <strong>and</strong> S. Jagannathan. RFID-based smart<br />

freezer. Industrial Electronics, IEEE Transactions on, 56(7):2347–2356, July<br />

2009.<br />

[117] Sarah Spiekermann. RFID <strong>and</strong> privacy: what consumers really want <strong>and</strong> fear.<br />

Personal <strong>and</strong> Ubiquitous Computing, 13(6):423–434, 08 2009.<br />

[118] Sarah Spiekermann <strong>and</strong> Sergei Evdokimov. Critical RFID privacy-enhancing<br />

technologies. <strong>Security</strong> & Privacy, IEEE, 7(2):56–62, March-April 2009.<br />

[119] Douglas R. Stinson. Cryptography: theory <strong>and</strong> practice. CRC Press, 1995.<br />

[120] D.-Z. Sun, J.-P. Huai, J.-Z. Sun, J.-X. Li, J.-W. Zhang, <strong>and</strong> Z.-Y. Feng. Improvements<br />

of Juang’s password-authenticated key agreement scheme using<br />

smart cards. Industrial Electronics, IEEE Transactions on, 56(6):2284–2291,<br />

June 2009.<br />

[121] Sheng-Yu Tseng, Tsai-Fu Wu, <strong>and</strong> Yaow-Ming Chen. Wide pulse combined<br />

with narrow-pulse generator <strong>for</strong> food sterilization. Industrial Electronics,<br />

IEEE Transactions on, 55(2):741–748, Feb. 2008.<br />

[122] Yiannis Tsiounis <strong>and</strong> Moti Yung. On the security of elgamal based encryption.<br />

In Public Key Cryptography, LNCS, pages 117–134. Springer Berlin /<br />

Heidelberg, 1998.<br />

[123] Gene Tsudik. YA-TRAP: Yet another trivial RFID authentication protocol.<br />

In PERCOMW ’06: Proceedings of the 4th annual IEEE international conference<br />

on <strong>Pervasive</strong> Computing <strong>and</strong> <strong>Communications</strong> Workshops, page 640,<br />

2006.<br />

175


Bibliography<br />

[124] Pim Tuyls <strong>and</strong> Lejla Batina. Rfid-tags <strong>for</strong> anti-counterfeiting. In Topics in<br />

Cryptology – CT-RSA 2006, LNCS, pages 115–131. Springer Berlin / Heidelberg,<br />

2006.<br />

[125] J. Waldrop, D.W. Engels, <strong>and</strong> S.E. Sarma. Colorwave: a MAC <strong>for</strong> RFID<br />

reader networks. In Wireless <strong>Communications</strong> <strong>and</strong> Networking, 2003. WCNC<br />

2003. 2003 IEEE, volume 3, pages 1701–1704, March 2003.<br />

[126] J. Waldrop, D.W. Engels, <strong>and</strong> S.E. Sarma. Colorwave: an anticollision algorithm<br />

<strong>for</strong> the reader collision problem. In <strong>Communications</strong>, 2003. ICC ’03.<br />

IEEE International Conference on, volume 2, pages 1206–1210, May 2003.<br />

[127] S. A. Weis, S. E. Sarma, R. L. Rivest, <strong>and</strong> D. W. Engels. <strong>Security</strong> <strong>and</strong><br />

privacy aspects of low-cost radio frequency identification systems. In <strong>Security</strong><br />

in <strong>Pervasive</strong> Computing, LNCS, pages 50–59. Springer Berlin / Heidelberg,<br />

2004.<br />

[128] J. Wolkerstorfer. Scaling ecc hardware to a minimum. In ECRYPT workshop<br />

- Cryptographic Advances in Secure Hardware - CRASH 2005, pages 11–15,<br />

Sep 2005.<br />

[129] W.L. Xu, J.D. Torrance, B.Q. Chen, J. Potgieter, J.E. Bronlund, <strong>and</strong> J.-<br />

S. Pap. Kinematics <strong>and</strong> experiments of a life-sized masticatory robot <strong>for</strong><br />

characterizing food texture. Industrial Electronics, IEEE Transactions on,<br />

55(5):2121–2132, May 2008.<br />

[130] A. Yamamoto, S. Suzuki, H. Hada, J. Mitsugi, F. Teraoka, <strong>and</strong> O. Nakamura.<br />

A tamper detection method <strong>for</strong> RFID tag data. In RFID, 2008 IEEE<br />

International Conference on, pages 51–57, April 2008.<br />

[131] T Yamazaki. Beyond the smart home. In International Conference on Hybrid<br />

In<strong>for</strong>mation Technology, 2006. ICHIT ’06, volume 2, pages 350–355, 2006.<br />

[132] J. Zachary <strong>and</strong> R. Brooks. Bidirectional mobile code trust management using<br />

tamper resistant hardware. Mobile Networks <strong>and</strong> Applications, 8(2):137–143,<br />

2003.<br />

[133] Kun Zhang, Tao Zhang, <strong>and</strong> Santosh P<strong>and</strong>e. Memory protection through<br />

dynamic access control. In Microarchitecture, 2006. MICRO-39. 39th Annual<br />

IEEE/ACM International Symposium on, pages 123–134, Dec. 2006.<br />

[134] D. Zhen-hua, L. Jin-tao, <strong>and</strong> F. Bo. Radio frequency identification in food<br />

supervision. volume 10, pages 529–536, 2007.<br />

[135] S. Zhong <strong>and</strong> Y. R. Yang. Verifiable distributed oblivious transfer <strong>and</strong> mobile<br />

agent security. Mobile Networks <strong>and</strong> Applications, 11(2):201–210, 2006.<br />

176

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!