Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Access This Premium Content

Options To Access This Article:

What Subscribers Are Saying

  • "Probably the best investment I've ever made."
    Steve Meizlish, President & CEO, MeizCorp Services, Inc.
  • "I have found that RFID Journal provides an objective viewpoint of RFID. It you are looking for a resource that provides insights as to the application and implications of deploying RFID, RFID Journal will meet your needs, It gives you a broad perspective of RFID, beyond the retail supply chain."
    Mike O'Shea, Director of Corporate AutoID/RFID Strategies & Technologies, Kimberly-Clark Corp.
  • "No other source provides the consistent value-added insight that Mark Robert and his staff do. In a world dominated by press release after press release, RFID Journal is developing as the one place to go to make the most sense out of the present and future of RFID in commerce."
    Bob Hurley, Project Leader for RFID, Bayer HealthCare's Consumer Care Division
  • "RFID Journal is the one go-to source for information on the latest in RFID technology."
    Bruce Keim, Director, Hewlett-Packard
  • "RFID Journal is the only source I need to keep up to the minute with the happenings in the RFID world."
    Blair Hawley, VP of Supply Chain, Remington Products Company

Encrypt Instead of 'Kill'

A dual-mode EPC RFID tag works in the supply chain and secures data after an item is purchased.
By Junyu Wang and Xi Tan
Jun 01, 2012—Many companies are using RFID tags with Electronic Product Codes to track goods for supply-chain management. Some businesses are also employing EPC RFID tags to thwart counterfeiting and for product authentication. But these tags do not use on-chip cryptography algorithms to enhance security, because cryptography algorithms would draw too much power, impeding the long read ranges and high read rates needed to track items in the supply chain.

EPC RFID tags can be disabled at the point of sale (POS) using a "kill" command, to protect consumers' privacy. But that means the tag can no longer be used to access information about the product, or to manage warranties, returns and end-of-life applications.

At the Auto-ID Lab at Fudan University, we have developed a dual-mode EPC tag that addresses both issues. It has an on-chip cryptography algorithm and can work in either normal EPC mode or secure mode. When a dual-mode EPC tag is used for supply-chain management, the on-chip crypto engine is shut down to save power and the tag behaves just like any other EPC tag. Then, at the POS, using a "crypto-en" command, the tag can be changed to secure mode, in which the crypto engine is enabled. Just like the kill command, the crypto-en command is not reversible. But in the secure mode, consumers can access information on the tag.

We implemented different crypto engines for RFID tags, including Tiny Encryption Algorithm, International Data Encryption Algorithm, Hummingbird 1 and 2, and Advanced Encryption Standard. Mutual authentication protocols and channel encryption methods are applied for secure tags. The secure tags have a much higher power consumption than conventional EPC tags, reducing read ranges to less than 10 centimeters (4 inches). Consumers can use handheld or mobile devices to read the tags at a relatively short range, making it unlikely that someone nearby could surreptitiously read the tag.

We also have developed a low-power, low-cost EPC reader system-on-chip that can be easily embedded in mobile phones, using a common serial communication interface. The highly integrated chip, manufactured using complementary metal-oxide semiconductor (CMOS) technology, includes a transceiver, protocol processor, microcontroller and power amplifier. EPC-enabled mobile phones can verify tags with the support of a trusted scalable service platform, which can be maintained by a third party.

Most mobile phones eventually will be equipped with Near-Field Communication (NFC) technology for payment and other short-range applications. The dual-mode EPC tag can coexist with NFC, so consumers will be able to use their mobile phones to access information about tagged products.

The prototype system is scheduled for demonstration in October, at the Internet of Things 2012 conference, in Wuxi, China.

Junyu Wang and Xi Tan are associate directors of the Auto-ID Lab at Fudan University, in Shanghai, China.
To continue reading this article, please log in or choose a purchase option.

Option 1: Become a Premium Member.

One-year subscription, unlimited access to Premium Content: $189

Gain access to all of our premium content and receive 10% off RFID Reports and RFID Events!

Option 2: Purchase access to this specific article.

This article contains 456 words and 1 page. Purchase Price: $19.99

Upgrade now, and you'll get immediate access to:

  • Case Studies

    Our in-dept case-study articles show you, step by step, how early adopters assessed the business case for an application, piloted it and rolled out the technology.

    Free Sample: How Cognizant Cut Costs by Deploying RFID to Track IT Assets

  • Best Practices

    The best way to avoid pitfalls is to know what best practices early adopters have already established. Our best practices have helped hundreds of companies do just that.

  • How-To Articles

    Don’t waste time trying to figure out how to RFID-enable a forklift, or deciding whether to use fixed or mobile readers. Our how-to articles provide practical advice and reliable answers to many implementation questions.

  • Features

    These informative articles focus on adoption issues, standards and other important trends in the RFID industry.

    Free Sample: Europe Is Rolling Out RFID

  • Magazine Articles

    All RFID Journal Premium Subscribers receive our bimonthly RFID Journal print magazine at no extra cost, and also have access to the complete online archive of magazine articles from past years.

Become a member today!

RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations