Abstract
Counterfeiting and theft have always been problems that incur high costs and result in considerable losses for international markets. In this research paper, we address the issue of counterfeiting while using radio frequency identification RFID technology in retail systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retail market. This system addresses the two abovementioned issues and provides a solution that can save retail systems millions of dollars yearly. The proposed system achieves the objective of preventing or minimising the counterfeiting and theft of tagged products. At the same time, it provides a strong indication of suspiciously sold or obtained items. Furthermore, we conducted a security analysis to prove the correctness of our protocol on the basis of the strand spaces.
Highlights
Counterfeiting is one of the major problems affecting merchandising and retailing systems worldwide
Availability: most radio frequency identification (RFID) systems can be disturbed by frequency jamming, denial-of service (DOS) attacks, or RFID blocking, as well as being exploited by tag signalling anti-collision mechanisms which interrupt the communication between the readers and the tags
In the case of RFID tag counterfeiting, the adversary must know the secret (S) corresponding to the tag t-id, as this S is at least 128 bits in length, which satisfies the key size requirement according to ECRYPT II NIST, which enables the adversary to brute force a search to figure out S, according to the authors in Reference [22]
Summary
Counterfeiting is one of the major problems affecting merchandising and retailing systems worldwide. We can say that the motivation of this research was to establish an RFID anti-counterfeiting and anti-theft protocol which allows us to detect any counterfeit goods or materials that use the RFID technology It was based on a new method that takes other studies into consideration to reduce costs and increase security. Availability: most RFID systems can be disturbed by frequency jamming, denial-of service (DOS) attacks, or RFID blocking, as well as being exploited by tag signalling anti-collision mechanisms which interrupt the communication between the readers and the tags These attacks are not effective when using the proposed scheme, as it takes the attacker considerable effort and time to perform a single attack with which to interrupt the process.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have