2019
DOI: 10.20944/preprints201912.0304.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A New Secure RFID Anti-Counterfeiting and Anti-theft Scheme for Merchandise

Abstract: Counterfeiting and theft have always been problems that incur high costs and results in considerable losses for the international markets. In this research paper, we will address the issue of counterfeiting while using RFID technology in retailer systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retailer market. This system will address the two above mentioned issues and provide a solution that can save the retailer systems millions of dollars yearly. This propos… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…This protocol presents a new method for managing RFID tags that reduces the number of read operations to the minimum to achieve better security and privacy results. In [4] and [1], proposed a new scheme to overcome the anti-counterfeiting problem based on shared secret key later conduct a formal security analysis based on strand space to ensure the security of their work. Also, in [39], an ownership transfer protocol proposed by Kapoor and Piramuthu in [40].…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…This protocol presents a new method for managing RFID tags that reduces the number of read operations to the minimum to achieve better security and privacy results. In [4] and [1], proposed a new scheme to overcome the anti-counterfeiting problem based on shared secret key later conduct a formal security analysis based on strand space to ensure the security of their work. Also, in [39], an ownership transfer protocol proposed by Kapoor and Piramuthu in [40].…”
Section: Literature Reviewmentioning
confidence: 99%
“…RFID tag counterfeiting can be described as the replication of a tag by either cloning its hardware component or copying its software in a way that the genuine reader or users would not be able to tell the if this tag is genuine or replicated one. [1] Losses incurred because of the sale of counterfeit products have led to consequences that can negatively impact the industry growth and the loss of market share for businesses. Radio-frequency identification (RFID) technology is a promising technology for the development of anti-counterfeiting solutions.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…tag counterfeiting can be described as the replication of a tag by either cloning its hardware component or copying its software in a way that the genuine reader or users would not be able to tell the if this tag is genuine or replicated one. [1] A number of researchers have proposed methods to address 5 these problems, including track and trace methods and physically unclonable function (PUF)-based methods; however, the existing methods do not provide a sufficiently integrated solution to address the counterfeiting problem in a retail environment. Many researcher address RFID based product anti-counterfeiting by proposing protocols or schemes to address this issue such as [2], [3] and [4].…”
Section: Introductionmentioning
confidence: 99%
“…Other techniques to overcome anti-counterfeiting can be found in [20], [34], [35] and [36] where a distance bounding technique were used to identify cloned tags without the need 65 to use complex cryptography operations. Anti-counterfeiting schemes based on cryptography as in [17], [4]and [1]. While other similar proposed schemes can be found in [30], [37], [38] and in [39].…”
mentioning
confidence: 99%