2020
DOI: 10.1109/access.2020.2979264
|View full text |Cite
|
Sign up to set email alerts
|

A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments

Abstract: Product counterfeiting and theft are ongoing problems in supply chains and retail environments, but not a lot of work has been done to address these problems through the cost-effective use of auto-identification technologies such as bar-codes, near-field communication (NFC), or radio-frequency identification (RFID). In this paper, we propose an RFID-based anti-counterfeiting and anti-theft scheme that can be used to detect counterfeit items at the point of purchase by a consumer. The proposed system is lightwe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
38
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 42 publications
(44 citation statements)
references
References 36 publications
1
38
0
Order By: Relevance
“…This was not the first work which the authors produced in the field of RFID tag security as they had previously researched the topic and proposed a secure method of authentication in Reference [18][19][20] and Reference [21]. In addition, we proposed a framework to prevent counterfeiting in Reference [3]; this was not the first work of its kind as recent system proposed by Reference [15] consists of a tag authentication protocol, which has four key players: the RFID tag, the reader, the server and the seller; and the database correction protocol, which has two players: the seller and the server. The first protocol authenticates the tags without revealing their sensitive information and allows the customer to inquire whether the tag is genuine or not; while the database correction protocol guarantees the correctness of the tag status.…”
Section: Our Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This was not the first work which the authors produced in the field of RFID tag security as they had previously researched the topic and proposed a secure method of authentication in Reference [18][19][20] and Reference [21]. In addition, we proposed a framework to prevent counterfeiting in Reference [3]; this was not the first work of its kind as recent system proposed by Reference [15] consists of a tag authentication protocol, which has four key players: the RFID tag, the reader, the server and the seller; and the database correction protocol, which has two players: the seller and the server. The first protocol authenticates the tags without revealing their sensitive information and allows the customer to inquire whether the tag is genuine or not; while the database correction protocol guarantees the correctness of the tag status.…”
Section: Our Previous Workmentioning
confidence: 99%
“…Therefore, in general, we can say that our main contribution in this research paper is a secure anti-counterfeiting and anti-theft protocol that requires less resources and less complicated operations, which results in easy troubleshooting and updates in case of an error. Moreover, we will provide a formal security analysis at the end for the proposed protocol on the basis of the strand space method to prove that the proposed protocol is secure [3]. The rest of this paper is organised as follows: in the next section, we elaborate on the existing technologies that address the considered issues and the different methods used by previous researchers.…”
Section: Introductionmentioning
confidence: 99%
“…While every year, counterfeit goods account for 7RFID tag counterfeiting can be defined as creating a replica of a tag by either replicating the hardware component of a tag or by copying its software in such a way that the genuine reader, database, or users would not know the difference between the genuine tag and the replicated one. Recently, we proposed a framework to prevent counterfeiting [3]; this was not the first work as one of the recent novels was a system proposed by [4] and consists of a tag authentication protocol, which has four key players, namely the RFID tag, the reader, the server, and the seller, and the database correction protocol, which has two players, namely the seller and the server. The first protocol authenticates the tags without revealing their sensitive information and allows the customer to inquire whether the tag is genuine or not.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, in general, we can say that our main contribution in this research paper is the secure anti-counterfeiting and anti-theft protocol that requires less recourse and less complicated operations, which will result in easy troubleshooting and update in case of an error. Moreover, we will provide a formal security analysis at the end for the proposed protocol on the basis of the strand space method to prove that the proposed protocol is secure [3]. The rest of this paper is organised as follows: In the next section, we elaborate on the existing technologies that address the considered issues and the different methods used by previous researchers.…”
Section: Introductionmentioning
confidence: 99%
“…[1] A number of researchers have proposed methods to address 5 these problems, including track and trace methods and physically unclonable function (PUF)-based methods; however, the existing methods do not provide a sufficiently integrated solution to address the counterfeiting problem in a retail environment. Many researcher address RFID based product anti-counterfeiting by proposing protocols or schemes to address this issue such as [2], [3] and [4].…”
Section: Introductionmentioning
confidence: 99%