Lehtonen, Mikko, Dr.
Dr. Mikko Lehtonen
Phone: +41 44 632 8624
Fax: +41 44 632 1045
Mikko Lehtonen is a PhD candidate at the Swiss Federal Institute of Technology Zürich (ETH Zürich) since January 2006, and a senior researcher in Auto-ID Lab University of St. Gallen / ETH Zürich. He received his MSc (Tech) in 2006 from Helsinki University of Technology, Finland, with major in communications engineering and minor in telecommunications management. He also has a diploma from the multimedia communications department of the Eurecom Institute, Sophia-Antipolis, France, and reserve officer's rank from the Finnish Naval Academy. He has previously worked as a research assistant in the signal processing laboratory of the Helsinki University of Technology, and in the IDIAP research institute, Switzerland. Mikko's previous research topics include beamforming with antenna arrays and artificial intelligence and machine-learning techniques in speech recognition. His current research interests include technical and business aspects in the use of RFID in anti-counterfeiting and product-centric information management.
- How to protect a supply chain against counterfeit products using RFID
- How to extend standard RFID infrastructures for anti-counterfeiting
- Item-level information management
- RFID and EPC Security in the Real World. In Protection of RFID/EPC Systems (organized by BRIDGE project), Leuven, 3 July 2009.
- Applying Auto-ID to Anti-Counterfeiting - Lessons Learned from STOP and BRIDGE Projects. Invited Talk in the International Contactless Technologies Forum (ICTF'09), Marseilles, June 2009.
- How to Think of Security in AntiCounterfeiting and How to Achieve it with RFID. In the final dissemination conference of the SToP Project, Zürich, Switzerland, May 2009.
- Securing RFID Systems by Detecting Tag Cloning. In the Seventh International Conference on Pervasive Computing, Pervasive'09, Nara, Japan, May 2009.
- How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces. In the IEEE RFID 2009 Conference, Orlando, Florida, April 2009.
- Serialized TID Numbers – A Headache or a Blessing for RFID Crackers? In the IEEE RFID 2009 Conference, Orlando, Florida, April 2009.
- Applying Auto-ID to Anti-Counterfeiting - Lessons Learned from STOP and BRIDGE Projects. Invited Talk in EPCglobal European Adoption Programme (EAP), Paris, February 2009.
- Evaluating radiofrequency identification technology in anti-counterfeiting. Invited Talk in Technical University of Graz, Austria, June 2008.
- RFID in Anti-Counterfeiting: From Security to ROI. Invited talk in RFIDJournal LIVE! Conference 2008, Las Vegas, April 2008.
- Results from Anti-Counterfeiting Business Case. In review meeting of EU-BRIDGE project, Malaga, Spain, April 2008 (internal).
- Results from Problem and Requirements Analysis. In review meeting of EU-BRIDGE project, Brussels, Belgium, December 2007 (internal).
- Probabilistic Approach for Location-Based Authentication. In 1st International Workshop on Security for Spontaneous Interaction IWSSI 2007, organized in 9th International Conference on Ubiquitous Computing, Austria, September 2007.
- Product Authentication and EPC-IS. Presentation at the EPCglobal European Adoption Programme (EAP) meeting, 12th June, 2007, Warsaw.
- Towards Optimal Level of Security in RFID-based Anti-Counterfeiting. In Workshop on Pervasive NFC/RFID Technology and Applications (PERTEC). PerCom'07, White Plains, New York, March 2007.
Refereed Journal Papers
- Lehtonen, M., Michahelles, F., Fleisch, E.: Trust and Security in RFID-based Product Authentication Systems. IEEE Systems Journal, Special Issue on RFID Technology: Opportunities and Challenges, Vol. 1, No. 2, pp. 129-144, December 2007.
Refereed Conference Papers
- Boos, D., Grote, G., Lehtonen, M.: Eliciting accountability relations with narrative networks. Accepted as a publication in European Conference on Cognitive Ergonomics (ECCE 2009), 20 September - 2 October, 2009, Otaniemi, Finland.
- Lehtonen, M., Michahelles, F., Fleisch, E.: How to Detect Cloned Tags in a Reliable Way from Incomplete RFID Traces. In 2009 IEEE International Conference on RFID, Orlando, Florida, April 27-28, 2009, pp. 257 - 264.
- Lehtonen, M., Ruhanen, A., Michahelles, F., Fleisch, E.: Serialized TID Numbers – A Headache or a Blessing for RFID Crackers? In 2009 IEEE International Conference on RFID, Orlando, Florida, April 27-28, 2009, pp. 233 - 240.
- Lehtonen, M., Ostojic, D., Ilic, A., Michahelles, F., : Securing RFID Systems by Detecting Tag Cloning. In proceedings of H. Tokuda et al. (Eds.): 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009. LNCS 5538, pp. 291–308.
- Lehtonen, M., Michahelles, F., Fleisch, E.: Probabilistic Approach for Location-Based Authentication. In 1st International Workshop on Security for Spontaneous Interaction IWSSI 2007, organized in 9th International Conference on Ubiquitous Computing, Austria, September 2007.
- Lehtonen, M., Oertel, N., Vogt, H.: Features, Identity, Tracing, and Cryptography for Product Authentication. In 13th International Conference on Concurrent Enterprising (ICE), Sophia-Antipolis, France, June 2007.
- Lehtonen, M.: Towards Optimal Level of Security in RFID-based Anti-Counterfeiting (Position Paper). In Workshop on Pervasive NFC/RFID Technology and Applications (PERTEC). PerCom'07, White Plains, New York, March 2007.
- Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: Strengthening the Security of Machine Readable Documents by Combining RFID and Optical Memory Devices. In Ambient Intelligence Developments Conference (AmI.d), September 2006.
- Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: From Identification to Authentication - A Review of RFID Product Authentication Techniques. Printed handout of Workshop on RFID Security -- RFIDSec 06, July 2006.
- Michahelles, F., Flörkemeier, C., Lehtonen, M., Hinske, S.: An RFID-tag in Every Ski – Item-Level Tagging in the Ski Industry. In PTA2006 Workshop at Pervasive 2006 conference, Dublin, Ireland, May 2006.
- Lehtonen, M., Oertel, N., Vogt, H.: Features, Identity, Tracing, and Cryptography for Product Authentication. To appear in Cryptography: An Introduction, Icfai University Press, 2009.
- Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E.: The Potential of RFID and NFC in Anti-Counterfeiting. Book Chapter in Networked RFID Systems and Lightweight Cryptography Raising Barriers to Product Counterfeiting, Cole, Peter H.; Ranasinghe, Damith C. (Eds.), 2007. ISBN: 978-3-540-71640-2.
- RFID Tag Security, Aigner, M.,Burbridge, T., Ilic, A., Lyon, D., Soppera, A., Lehtonen, M., BRIDGE Whitepaper, June 2009.
- Protecting EPC Tags, Michahelles, F. and Lehtonen, M., Inside the labs column in RFID Journal, 1. August, 2008.
- Synchronized Secrets Approach for RFID-enabled Anti-Counterfeiting, Ilic, A., Lehtonen, M., Michahelles, F., Fleisch, E., Demo at Internet of Things Conference 2008, Zurich, Switzerland, 2008
- Protecting your pharma revenue and patient safety through the GS1 RFID/EPC network, Lehtonen, M. and Hill, D., GS1-Denmark Magazine På Stregen (in Danish), November 2007.
- Security Analysis Report, BRIDGE Project Deliverable D4.1.1, February 2007
- Description of main drivers of illicit trade, the roles of the different licit and illicit actors and the mechanisms of illicit trade, Staake, T., Lehtonen, M., SToP Project Deliverable D1.1, July 2007
- Description of technical and organizational requirements for product authentication solutions, Lehtonen, M., Dada, A., Oertel, N., Müller, J., SToP Project Deliverable D1.2, November 2007
- Description of the status quo of existing technical countermeasures, their benefits and shortcomings, Lehtonen, M., Bogataj, K., Klopcic, Z., Magerkurth, C., SToP Project Deliverable D1.3, April 2008
- Analysis of the ‘weakest points’ within licit supply chains and the properties of products most susceptible to tampering and counterfeiting, Lehtonen, M., Staake, T., Klopcic, Z., SToP Project Deliverable D1.4, October 2008
- Final evaluation of project results accordingly to the identified requirements, Lehtonen, M., Boos, D., von Reischach, F., Magerkurth, C., Müller, J., Bogataj, K., Gout, E., Gourmanel, F., Ippisch, T., Oertel, N., Dada, A., SToP Project Deliverable D1.5, April 2009
- Report on relevant state-of-the-art research, existing technologies and products, Oertel, N., Müller, J., Dada, A., von Reischach, F., Vogt, H., Lehtonen, M., SToP Project Deliverable D3.1, November 2007
- Problem-Analysis Report on Counterfeiting and Illicit Trade, Lehtonen, M., Al-Kassab, J., von Reischach, F., Kasten, O., Michahelles, F., BRIDGE Project Deliverable D5.1, February 2007
- Anti-counterfeiting Requirements Report, Al-Kassab, J., Lehtonen, M., Dubach, E., Michahelles, F., BRIDGE Project Deliverable D5.2, April 2007
- Anti-counterfeiting Business Case Report, Lehtonen, M., Al-Kassab, J., Michahelles, F., Kasten, O., BRIDGE Project Deliverable D5.3, December 2007
- Anti-Counterfeiting Prototypes Report, Al-Kassab, J., Lehtonen, M., Michahelles, F., BRIDGE Project Deliverable D5.4, June 2008
- Anti-Counterfeiting Prototypes Evaluation Report, Al-Kassab, J., Lehtonen, M., Oertel, N., Delchev, I., BRIDGE Project Deliverable D5.5, June 2009
- Application Guidelines and Implementation Roadmap, Lehtonen, M., Al-Kassab, J., Lekies, S., BRIDGE Project Deliverable D5.6, June 2009
Auto-ID Labs ETH Zurich/St. Gallen
The Auto-ID Labs are the leading global network of academic research laboratories in the field of networked RFID. The labs comprise seven of the world's most renowned research universities located on four different continents.
Building Radio Frequency Solutions for the Global Environment (BRIDGE)
BRIDGE is a three year RFID application research and development project funded by the European Commission. The project consists of 31 global organizations including Sony, Nestle, Carrefour, BT and EPCglobal that collaborate on a series of business oriented clusters, technical developments and horizontal activities.
Stop Tampering of Products (SToP)
The SToP project aims at developing ambient intelligence-based and network-oriented systems for the efficient and secure authentication of products. It thereby helps to reduce the problems imposed by counterfeiting and product privacy.
- Lehtonen, M., Fousek, P., Hermansky H.: Hierarchical Approach for Spotting Keywords. In 2nd Workshop on Multimodal Interaction and Related Machine Learning Algorithms - MLMI 05, Edinburgh, United Kingdom, July 2005.
- Hermansky, H., Fousek P., Lehtonen, M.: The Role of Speech in Multimodal Human-computer Interaction (Towards Reliable Rejection of Non-keyword Input). In Proceedings of 8th International Conference of Text, Speech and Dialogue - TSD 2005, Carlsbad, Czech Republic, September 2005.