Secure protocols for serverless remote product authentication

  • Authors:
  • Abdourhamane Idrissa;Alain Aubert;Thierry Fournel;Viktor Fischer

  • Affiliations:
  • Universite de Lyon, Lyon, France and Universite de Saint-Etienne, Saint-Etienne, France;Universite de Lyon, Lyon, France and Universite de Saint-Etienne, Saint-Etienne, France;Universite de Lyon, Lyon, France and Universite de Saint-Etienne, Saint-Etienne, France;Universite de Lyon, Lyon, France and Universite de Saint-Etienne, Saint-Etienne, France

  • Venue:
  • WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Industrial companies lose large sums of money because of counterfeits and they need to efficiently protect their trademarks. Most of them implement their own anti-counterfeiting policy to deal with the menace. A number of technologies, such as holograms, smart cards, biometric markers and inks, can be employed to protect and authenticate genuine products. Instead of using markers and additional identification means, one of the recent methods use a PUF-like authentication method based on image processing. However, in order to authenticate the object (e.g. a trademark product), the method needs direct access to the database system containing the object's "fingerprint". The paper presents a new secure method to remotely authenticate the object without communication with the database server. In this method, an autonomous and secure embedded system called authentication device authenticates the product by extracting its morphometric fingerprint and comparing it with a signed original morphometric fingerprint printed on the object. However, we show that in order to secure the protocol, the authentication hardware needs to be authenticated, too. For this reason, we propose security protocols that allow to authenticate the authentication device and remotely check its integrity. The proposed security protocols are shown to be sure using formal methods of security protocol evaluation.