Abstract

Product counterfeiting and theft are on-going problems in supply chains and retail environments, but not a lot of work has been done to address these problems through the cost-effective use of auto-identification technologies such as bar-codes, near-field communication (NFC), or radio-frequency identification (RFID). In this paper, we propose an RFID-based anti-counterfeiting and anti-theft scheme that can be used to detect counterfeit items at the point of purchase by a consumer. The proposed system is lightweight and suited for deployment in large-scale retail environments using low-cost passive tags. We also undertake an analysis of a recent scheme proposed by Tran and Hong to highlight some of the weaknesses of their scheme. A detailed security analysis of the proposed scheme shows that it satisfies the formal requirements of security correctness and is resistant to compromise through security attacks.

Highlights

  • Product counterfeiting is one of the major problem that impact retailing systems worldwide

  • In addition to product counterfeiting, there exists the parallel possibility of counterfeiting, more especially, cloning of the Radio-frequency identification (RFID) tags attached to the products for anti-counterfeiting purposes

  • Tran and Hong [15] proposed an anti-counterfeiting system for retail environments with the system consisting of a tag authentication protocol with four key players and the database correction protocol with two players

Read more

Summary

INTRODUCTION

Product counterfeiting is one of the major problem that impact retailing systems worldwide. Low-cost passive RFID tags present challenges for the implementation of established security primitives, and there is the need to ensure that the proposed solutions are lightweight and are suitable for implementation. The security properties required are as follows: 1- Tag/Reader Anonymity: The protocol protects against information leakage that can lead to the disclosure of a tag’s/reader’s real identifier. This is important, as otherwise, an attacker may be able to clone a valid tag/reader.

LITERATURE REVIEW
OUR PROPOSED SCHEME
SECURITY ANALYSIS
OTHER SECURITY ANALYSIS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call