Abstract

Counterfeit medications are known as the medications that were manufactured for the purpose of deceptively representing as authentic, effective and original in the market. Such medications cause severe health issues for patients. Counterfeited drugs have an inimical effect on the human health. The legal manufacturing companies also face threats to their revenue loss due to these counterfeited medicines. In this paper, we introduce a novel authentication protocol for anti-counterfeited drugs systems based on Internet of Things (IoT) to help checking the validity of drugs “unit dosage”. Our protocol uses the near-field communication (NFC) as it is convenient for mobile environment. The protocol also offers reliable update phase for NFC. Furthermore, our scheme is complemented with performance evaluation along with the use of random oracle model for formal security analysis. We also evaluate our protocol broadly using Py-Charm tool. Results show that proposed protocol resists most of common related flaws almost in equal computing cost with more added security features.

Highlights

  • The broad majority of business extensively utilizes the innovative technology of Internet of Things which is persuading almost every facet of the world

  • This becomes even more serious in the case of sensitive and critical systems such as anti-counterfeiting which is constructed by the use of Internet of Things (IoT) infrastructure

  • Alzahrani et al.: Lightweight Authentication Protocol for near-field communication (NFC) Based Anti-Counterfeiting System in IoT Infrastructure counterfeited medicines are more than 30%, as noticed by World Health Organization (WHO)

Read more

Summary

INTRODUCTION

The broad majority of business extensively utilizes the innovative technology of Internet of Things which is persuading almost every facet of the world. B. ANTI-COUNTERFEIT SYSTEM WORKFLOW The working of the system of anti-counterfeit is described as follows: Anti-counterfeit portal helps the end users such as distributors, retailers and consumers to check the authenticity of the drug packet through computer or mobile device. The authentication process is facilitated by a unique NFC tag which is placed on each product These properties help the customers to check whether the status of the product is set as sold in early or not. Method (2) NFC code tracking and generation These functions are described as follows: 1) TRACKING AND CODE GENERATION OF NFC The blueprint of NFC tracking and code generation is given, with the following details: Step 1: The anti-counterfeiting web services is accessed by manufacturers for their product registration by giving the relevant information. PRELIMINARIES The hash functions, elliptic curve cryptography, and adversarial model that are used in this paper are described

HASH FUNCTIONS
RELATED WORK
PROPOSED SCHEME
LOGIN AND AUTHENTICATION STAGE
5: Extract Flag from DB by corresponding EPC
COMPARISON OF THE COMPUTATION COST
Findings
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call