BRIDGE WP05 Application Guidelines and Implementation Roadmap

3 downloads 389 Views 1MB Size Report
Building Radio frequency IDentification for the Global. Environment. Application Guidelines and. Implementation Roadmap. Authors: Mikko Lehtonen (ETH ...
Building Radio frequency IDentification for the Global Environment

Application Guidelines and Implementation Roadmap Authors: Mikko Lehtonen (ETH Zurich), Jasser AlKassab (SAP), Sebastian Lekies (SAP)

June 2009

This work has been partly funded by the European Commission contract No: IST-2005-033546

About the BRIDGE Project: BRIDGE (Building Radio frequency IDentification for the Global Environment) is a 13 million Euro RFID project running over 3 years and partly funded (€7,5 million) by the European Union. The objective of the BRIDGE project is to research, develop and implement tools to enable the deployment of EPCglobal applications in Europe. Thirty interdisciplinary partners from 12 countries (Europe and Asia) are working together on : Hardware development, Serial Look-up Service, Serial-Level Supply Chain Control, Security; Anti-counterfeiting, Drug Pedigree, Supply Chain Management, Manufacturing Process, Reusable Asset Management, Products in Service, Item Level Tagging for non-food items as well as Dissemination tools, Education material and Policy recommendations. For more information on the BRIDGE project: www.bridge-project.eu

This document results from work being done in the framework of the BRIDGE project. It does not represent an official deliverable formally approved by the European Commission.

This document: This document presents application guidelines and implementation roadmap for the technical anticounterfeiting measures developed in BRIDGE WP5. While various RFID implementation guidelines and checklists have been published, they do not cover the use of EPC/RFID in anti-counterfeiting. The purpose of this document is to help bridge this gap.

Disclaimer: Copyright 2009 by (ETH Zurich, SAP) All rights reserved. The information in this document is proprietary to these BRIDGE consortium members This document contains preliminary information and is not subject to any license agreement or any other agreement as between with respect to the above referenced consortium members. This document contains only intended strategies, developments, and/or functionalities and is not intended to be binding on any of the above referenced consortium members (either jointly or severally) with respect to any particular course of business, product strategy, and/or development of the above referenced consortium members. To the maximum extent allowed under applicable law, the above referenced consortium members assume no responsibility for errors or omissions in this document. The above referenced consortium members do not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, satisfactory quality, fitness for a particular purpose, or non-infringement. No licence to any underlying IPR is granted or to be implied from any use or reliance on the information contained within or accessed through this document. The above referenced consortium members shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation shall not apply in cases of intentional or gross negligence. Because some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. The statutory liability for personal injury and defective products is not affected. The above referenced consortium members have no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third-party Web pages nor provide any warranty whatsoever relating to third-party Web pages.

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

Executive Summary This document presents application guidelines and implementation roadmap for the technical anti-counterfeiting

measures

developed

in

BRIDGE

WP5.

While

various

RFID

implementation guidelines and checklists have been published, they do not cover the use of EPC/RFID in anti-counterfeiting. The purpose of this document is to help bridge this gap. The practical level of protection that a technical anti-counterfeiting system provides to a supply chain depends on two aspects: on detecting counterfeit products when they are checked (“intrinsic security”) and on checking the counterfeit products (“check rate”). The implementation roadmap presents how a high level of intrinsic security can be achieved with security measures available, now and in the future, for EPC-tagged products. Achieving a high check rate is addressed by applying the checks in the right supply chain locations and by integrating authenticity checks to processes where the products are anyhow identified. The implementation roadmap presents the available security measures for EPC-tagged products and provides guidance for selecting and updating security measures for an affected product. The roadmap starts from the basic measure which is reading the EPC number and verifying from a white list that such a product exists. The role of the security measures is to secure this scheme from adversaries. Three dimensions of security are considered: 1) prevention of tag cloning, 2) detection cloned tags, and 3) tag-product integrity. In general, there are eight possible supply chain locations (“usage scenarios”) for authenticity checks. These are analyzed in the report and they include: 1) distribution, 2) customs, 3) incoming goods at retail, 4) goods on retail shelves, 5) point of sales, 6) consumer / enduser, 7) after sales services and 8) reverse logistics. These cases are collected from existing usage scenarios and they address different dimensions of the problem. In particular, only checks in customs and checks of goods on retail shelves target the illicit supply chain. It is also shown which security measures are conceptually feasible in these locations. In addition to providing guidelines for the selection of security measures and check locations, an anti-counterfeiting project life-cycle model is presented. It serves companies affected by counterfeiting as a manual for deploying RFID and track-and-trace based anti-counterfeiting solutions and includes detailed description of four project phases: 1) initiation, 2) planning, 3) closing, and 4) operation and maintenance. Last, this life-cycle model is applied to an anonymized real-world company Akron to illustrate its application with tangible examples.

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

Table of Contents Executive Summary .............................................................................................................3 Table of Contents .................................................................................................................4 Table of Figures....................................................................................................................6 Table of Tables .....................................................................................................................7 1

2

3

4

Introduction ....................................................................................................................8 1.1

How Security Works ............................................................................................... 8

1.2

Organization of this Report ...................................................................................10

Implementation Roadmap ............................................................................................12 2.1

Basic Measure........................................................................................................13

2.2

Towards Strong Prevention of Tag Cloning.........................................................15

2.3

Towards Reliable Detection of Cloned Tags ........................................................17

2.4

Towards Strong Tag-Product Integrity .................................................................20

Supply Chain Locations for Product Authentication ................................................. 23 3.1

Different supply chain locations for product authentication ..............................23

3.2

Feasibility of different security measures............................................................29

Anti-Counterfeiting Project Life Cycle ........................................................................ 31 4.1

Selection of a Project Life Cycle Model................................................................31

4.2

Initiation phase ......................................................................................................32

4.2.1

Purpose of the Initiation phase ........................................................................32

4.2.2

Problem Analysis .............................................................................................32

4.2.3

Project Team ...................................................................................................34

4.2.4

Definition of Project Scope ..............................................................................36

4.2.5

Feasibility Study ..............................................................................................36

4.2.6

Cost-benefit analysis .......................................................................................38

4.3

Planning phase ......................................................................................................41

4.3.1

Purpose of the Planning Phase .......................................................................41

4.3.2

Organizational and Process Changes .............................................................41

4.3.3

Site Survey ......................................................................................................42

4.3.4

Selection of Hardware and Software ...............................................................43

4.3.5

Stakeholder Analysis .......................................................................................43

4.4

Implementation phase ...........................................................................................45

4.4.1

Purpose of the Implementation Phase .............................................................45

4.4.2

Pilot Study .......................................................................................................46

4.4.3

Administrative and Organizational Requirements and Changes ......................46

4.4.4

Technical Requirements and Changes ............................................................47

4.5

Closing phase ........................................................................................................47

4.6

Operation and Maintenance ..................................................................................47

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

5

Example Application ....................................................................................................50 5.1

Introduction............................................................................................................50

5.2

Akron Company Profile .........................................................................................50

5.3

Application .............................................................................................................51

5.3.1

Initiation phase ................................................................................................51

5.3.2

Planning phase................................................................................................53

5.3.3

Implementation phase .....................................................................................55

5.3.4

Closing phase..................................................................................................56

5.3.5

Operation and Maintenance ............................................................................56

References ..........................................................................................................................57 Appendix A: Hardware calculations..................................................................................60 Appendix B: Akron’s Stakeholder map.............................................................................61

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

Table of Figures Figure 1. The overall process of securing a supply chain from counterfeit products .............. 9 Figure 2. Direct effect of security ........................................................................................... 9 Figure 3. Indirect effect of security ........................................................................................10 Figure 4. Organization of this deliverable..............................................................................11 Figure 5. Roadmap towards secure authentication of EPC-tagged products ........................12 Figure 6. Protocol of the basic measure (white list) ..............................................................14 Figure 7. Authentication based on ACCESS passwords .......................................................15 Figure 8. Authentication based on unique TID numbers .......................................................16 Figure 9. Authentication based on cryptographic tags / PUF ................................................17 Figure 10. Authentication based on track and trace checks ..................................................19 Figure 11. Authentication based on synchronized secrets protocol ......................................19 Figure 12. Example of a commercial security seal (www.tesa.com)......................................20 Figure 13. Physical tag integration provides different possibilities depending on the product [34] .......................................................................................................................................21 Figure 14. Authentication based on object-specific features .................................................22 Figure 15. Possible supply chain locations for product authentication ..................................23 Figure 16: Project Life Cycle.................................................................................................31 Figure 17: Example for an RFID project team [6] ..................................................................34 Figure 18: Cost benefit model of investment in security ........................................................40 Figure 19: Exemplary RFID enabled Business Applications .................................................41 Figure 20: Site Survey Process [17] .....................................................................................42 Figure 21: Stakeholder groups [2] ........................................................................................44 Figure 22: Exemplary Stakeholder Matrix .............................................................................45 Figure 23: Akron's Supply Chain Network ............................................................................50 Figure 24: Akron's project team ............................................................................................52 Figure 25: Process manger and rule designer ......................................................................53 Figure 26: Factory layout ......................................................................................................54 Figure 27: Supplier matrix ....................................................................................................55

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

Table of Tables Table 1. Threat levels and needed countermeasures ...........................................................12 Table 2. Prerequisite for product authentication: the basic measure .....................................15 Table 3. Summary of preventive security measures on EPC tags ........................................17 Table 4. Summary of detective security measures ...............................................................20 Table 5. Summary of security measures for tag-product integrity .........................................22 Table 6. Conceptual feasibility of RFID-based product authentication measures in different supply chain locations (see Section 2 and BRIDGE D5.4 for technical details). ....................30 Table 7: Decision making tool for evaluating the overall risk of counterfeiting .......................33 Table 8: Required hardware and software ............................................................................43 Table 9: Exemplary Table of Stakeholders ...........................................................................44 Table 10: Calculation of hardware expenses ........................................................................60 Table 11: Akron's stakeholder map ......................................................................................61

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

1 Introduction Brand owners of various kinds of physical goods have an increasing need to protect their supply chains against product counterfeiting. To support brand owners across industries, BRIDGE WP5 has investigated and developed EPC/RFID-based countermeasures to counter counterfeit trade. Based on this work, this document presents application guidelines and an implementation roadmap for EPC/RFID based anti-counterfeiting measures. These application guidelines cover deployment and usage of an anti-counterfeiting system based on EPC technology. More precisely, the guidelines cover steering an anticounterfeiting system deployment project and selecting an effective and efficient way to use the authenticity checks to counter counterfeit trade. While various general RFID implementation guidelines and checklists are published by practitioners 1,2, these do not cover the use of RFID in anti-counterfeiting. Therefore the major contribution of this document is to provide the anti-counterfeiting-specific knowledge to the general guidelines. Different products need different amounts of protection. While simple verification of EPC numbers might be secure enough for some inexpensive consumer goods, for instance, authentication of luxury goods that are brought to after-sales service might require much more security. To answer the varying needs of different products, EPC technology provides a rich platform for different security measures. To assist brand owners in choosing right security measures, the implementation roadmap presents the way from identification to highly secure authentication of EPC-tagged products. This roadmap presents the possible security measures and their requirements to guarantee secure authentication of EPC-tagged products in a long term. The material benefits of a technical anti-counterfeiting system are hard to evaluate and present in one dimension, with only one criterion, but overall they can be characterized by security. Therefore the provided application guidelines are structured around concepts of security.

1.1 How Security Works This subsection presents the conceptual framework of security in anti-counterfeiting that structures the provided application guidelines. In general terms, security refers to protecting assets against certain threats and it is provided by a process of prevention, detection and response [36]. The overall process of securing a supply chain against counterfeit products presents the different preventive, detective and responsive countermeasures that companies can implement. Figure 1 illustrates this process by showing what the counterfeiter attempts to do and what the affected company or 1 2

http://www.rfid-in-action.eu/public/results/guidelines/rfid-implementation-checklist http://epsfiles.intermec.com/eps_files/eps_brochure/RFIDChecklist_brochure_web.pdf

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

companies can do to counter the counterfeiting. In particular, the illustration shows that product authentication is only one element in this overall process of securing the supply chain against counterfeits – but it is a particularly important one.

Counterfeiter (illicit actors)

Prevent § Do not disclose blueprints § Audit manufacturers

Detect § Private investigations

3. Sell counterfeit products to the licit supply chain

2. Obtain RFID tags with valid, copied serial numbers

1. Obtain counterfeit products

Respond § Confiscate illicit products § Prosecute infringers § End business relationships

Prevent § Use random IDs § Upkeep list of valid IDs § Secure data base of IDs § Waste mngt.

Detect § Monitor clandestine scanning § Detect use of copied IDs

Respond § Discard copied IDs

Prevent § Secure legitimate inputs

Detect § Authenticate products

Respond § Confiscate illicit products § Prosecute infringers § End business relationships § Strict liabilities

Brand owner (licit actors)

Figure 1. The overall process of securing a supply chain from counterfeit products

The security provided by a technical product authentication system has two major effects on the protected supply chain. First, the direct effect of security is that counterfeit products in the secured channel are detected. This is illustrated in Figure 2. Detection of counterfeit products depends on two factors: on verification of counterfeit products (check rate) and on detecting counterfeit products that are verified (intrinsic level of security of the security measure). The former is provided by the way the technology is used and the latter by the technology itself. In other words, the achieved level of security in practice depends on the security measure and how it is used. This is a simple finding but it is very helpful in organizing the application guidelines: On the one hand the goal is to maximize the probability that a counterfeit is verified, and on the other hand the goal is to maximize the probability that a counterfeit is detected when checked.

Counterfeits are verified (check rate) Counterfeits are detected (direct security) Counterfeits are detected when verified (intrinsic security)

Figure 2. Direct effect of security

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

When counterfeit products are detected in a supply chain with a sufficient success rate, the expected profit of selling counterfeit products to the protected supply chain decrease to zero and below. Thus the second, indirect effect of security is that injecting counterfeit products to the licit supply chain no longer pays off for the illicit actors. Since counterfeiters are primary financially motivated, we can assume that decreasing the expected profits has a deterrent effect on counterfeiters. The technical factors that provide the deterrent effect of security are illustrated in Figure 3. It is important to note in practice deterrence is not provided the absolute magnitudes of prevention, detection and response, but how counterfeiters perceive and value them. For instance, a convincing sticker of a surveillance system alone can deter a burglar from breaking into a house if the burglar perceives that the risk of alarm is too high, without the need of an actual surveillance system.

Cost to break (prevention)

Detection rate (detection)

Deterrence (indirect security)

Punishment (response)

Figure 3. Indirect effect of security

All of counterfeit products do not need to be detected in order to make injecting counterfeit products to a licit supply chain unprofitable. This is due to two factors. First, also counterfeiters have costs that need to be covered before they can break even, for instance from production and logistics [37]. Second, the risk of getting caught and being punished – though it may be small – needs to be offset by somewhat high returns; otherwise taking the risk does not pay off in the long term. However, it must be noted that deterrence only means that injecting counterfeits to the protected supply chain is not financially interesting in the long term under certain assumptions, but it does not guarantee or prevent that it will not happen.

1.2 Organization of this Report This report is organized as follows. First, section 2 presents an implementation roadmap towards strong authentication of EPC-tagged products. Then, section 3 describes and analyzes eight different supply chain locations for the authenticity checks and presents the technical feasibility of different security measures in these locations. And last, section 4 provides an anti-counterfeiting project-life cycle model that is a manual to help affected

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

companies during different phases of the implementation project, and this life-cycle model is illustrated with an example in section 5.

Section 1: Introduction Content:

Introduction to the deliverable, conceptual framework of security in anti-counterfeiting.

Findings:

Supply chain is protected through high check rate and intrinsic security of the check.

Section 2: Implementation Roadmap Content:

Implementation roadmap towards secure authentication of EPC-tagged products.

Findings:

EPC/RFID provides a platform of security features, suitable security features depend on the product.

Section 3: Supply Chain Locations for Product Authentication Content:

Analysis of possible supply locations for product authentication, feasibility of different techniques therein.

Findings:

There are eight usage scenarios for product authentication in licit supply chains.

Section 4: Anti-Counterfeiting Project Life Cycle Content:

Description and analysis of issues during different phases of an anti-counterfeiting project.

Findings:

Guidelines for initiation phase, planning phase, implementation phase, and closing phase.

Section 5: Example Application Content:

Example application of the rules-based approach to an anonymized real-world based company.

Findings:

Illustration of the project life cycle model.

Figure 4. Organization of this deliverable.

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

2 Implementation Roadmap This section describes an implantation roadmap towards secure authentication of EPCtagged products. The roadmap includes three different dimensions of security, namely tag cloning resistance, detection of cloned tags and tag-product integrity, and presents the different security measures that are needed to move towards higher level of security. The goal of choosing the security measures is to enable secure product authentication. Table 1. Threat levels and needed countermeasures Threat

Countermeasure

I

Counterfeit product without an RFID tag

Basic measure

II

Counterfeit product with an RFID tag with an invalid EPC

Basic measure

III

Counterfeit product with an RFID tag with a valid EPC

Tag cloning resistance / detection of cloned tags

IV

Counterfeit product with a genuine RFID tag

Tag-product integrity

The implementation roadmap addresses different threat levels of counterfeit products injected to the protected supply chain. We define these threat levels as follows: The first level threat is a counterfeit product without an RFID tag. The second level threat is a counterfeit product with an RFID tag with an invalid EPC number. The third level threat is a counterfeit product with an RFID tag with a copied, valid, EPC number, and the fourth level threat is a counterfeit product with a genuine RFID tag that is removed and reapplied from a genuine product. The threat levels and needed countermeasures are summarized in Table 1. Basic measure

Tag seals

weak

Low level of security

Unique TID numbers

Crypto tags

strong

Tag cloning resistance

Mark invalid EPC numbers T&T checks

Physical tag integration

Synchronized secrets

strong

Logical tag integration

ACCESS passwords

stro High level of security

Tag-product integrity

ng Detection of cloned tags

Figure 5. Roadmap towards secure authentication of EPC-tagged products

Reading a product’s EPC number and verifying that this number has been issued by the brand owner (“white list”) represents the first level of a technical countermeasure (cf.

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment

subsection 2.1). When the need for security increases, additional security measures are needed against tag cloning attacks and tag-product integrity violations, i.e. removal and reapplication of valid tags. These security measures are illustrated in Figure 5. For products where the risk of counterfeiting is very low, such as some non-branded fast moving consumer goods, the basic measure provides a good starting point. For products where the risk of counterfeiting is higher, such as medicines and airplane spare parts, the need for security is higher and the first technical countermeasure should already include some more advanced security measures, such as track and trace checks or cryptographic tags. In general, the need for security increases over time; counterfeiters can learn about the countermeasures and implement ways to overcome or bypass them. When a need for an increased level of protection is recognized, for example by discovering that counterfeiters copy the EPC numbers of genuine products or that tags with fully programmable TID memory have become commercially available, the brand-owner needs to move towards stronger security measures. Since additional security measures have always costs involved, only the necessary security measures should be implemented. This paradigm is called “good enough security” [23] and it argues that practically and commercially successful security systems have a level of security that is modest in the academic sense, but good enough to work in practice.

2.1 Basic Measure This subsection formalizes the basic measure that is not yet secure authentication of products, but the foundation for the secure authentication. We define authentication as verification of the claimed identity and therefore identification is the prerequisite for authentication. A product claims to have a certain identity through the EPC number written on its RFID tag. The basic measure is to read the EPC number and verify that it is valid, i.e. one that can be found on a genuine product. This kind of check is analogous to having a doorman in front of a club to verify that only people who have their name on the list get in; thus only the people on the list are authorized to enter. Identification = A claim of identity Authentication = Identification + Verification of the claimed identity Valid EPC number = An EPC number that can be found on a genuine product

BRIDGE – Building Radio frequency IDentification solutions for the Global Environment Back-end

EPC Tag

Reader establish secure connection

Phase I: Initialization

(0)

inventory (1)

read EPC

Phase II: Identification

(2)

EPC (3)

(5)

if EPC is valid: result = y; else: result = n

EPC, ,