Abstract

Counterfeiting and theft have always been problems that incur high costs and result in considerable losses for international markets. In this research paper, we address the issue of counterfeiting while using radio frequency identification RFID technology in retail systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retail market. This system addresses the two abovementioned issues and provides a solution that can save retail systems millions of dollars yearly. The proposed system achieves the objective of preventing or minimising the counterfeiting and theft of tagged products. At the same time, it provides a strong indication of suspiciously sold or obtained items. Furthermore, we conducted a security analysis to prove the correctness of our protocol on the basis of the strand spaces.

Highlights

  • Counterfeiting is one of the major problems affecting merchandising and retailing systems worldwide

  • Availability: most radio frequency identification (RFID) systems can be disturbed by frequency jamming, denial-of service (DOS) attacks, or RFID blocking, as well as being exploited by tag signalling anti-collision mechanisms which interrupt the communication between the readers and the tags

  • In the case of RFID tag counterfeiting, the adversary must know the secret (S) corresponding to the tag t-id, as this S is at least 128 bits in length, which satisfies the key size requirement according to ECRYPT II NIST, which enables the adversary to brute force a search to figure out S, according to the authors in Reference [22]

Read more

Summary

Introduction

Counterfeiting is one of the major problems affecting merchandising and retailing systems worldwide. We can say that the motivation of this research was to establish an RFID anti-counterfeiting and anti-theft protocol which allows us to detect any counterfeit goods or materials that use the RFID technology It was based on a new method that takes other studies into consideration to reduce costs and increase security. Availability: most RFID systems can be disturbed by frequency jamming, denial-of service (DOS) attacks, or RFID blocking, as well as being exploited by tag signalling anti-collision mechanisms which interrupt the communication between the readers and the tags These attacks are not effective when using the proposed scheme, as it takes the attacker considerable effort and time to perform a single attack with which to interrupt the process.

Literature Review
RFID Counterfeiting Definition
Our Previous Work
Other Anti-Counterfeiting Proposed Schemes
System Set-Up
System Flow
The System Process
Anti-Theft Server AT Process
Security Analysis
AA’s Point of View—The Nonce Test and Checking the Secrecy of R1
AA’s Point of View—The Encryption Test Checking the Secrecy of t-id
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call