A two-factor authentication system using Radio Frequency Identification and watermarking technology (original) (raw)
Related papers
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems, 2019
Counterfeiting has always been a concern, costing a significant amount of money and 1 causing losses in international trading markets. RFID tag Anti-counterfeiting is a conceptual solution 2 that has received attention in the past few years. In this article, we present a survey study on the 3 research topic of anti-counterfeiting products using RFID tags on merchandise. As this issue evolved 4 in industry, there were several techniques used to address the problem; each technique uses a different 5 concept and mechanism in resolving the issue. Each technique also has different pros and cons which 6 we will address at the end of this paper with our findings. As we explore RFID technology and its 7 implementation, we will discuss previous research before proceeding to the core of the topic of RFID 8 Anti-counterfeiting based on the methods used. We compare the different techniques used at the end 9 of the paper. 10
A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments
IEEE Access
Product counterfeiting and theft are ongoing problems in supply chains and retail environments, but not a lot of work has been done to address these problems through the cost-effective use of auto-identification technologies such as bar-codes, near-field communication (NFC), or radio-frequency identification (RFID). In this paper, we propose an RFID-based anti-counterfeiting and anti-theft scheme that can be used to detect counterfeit items at the point of purchase by a consumer. The proposed system is lightweight and suited for deployment in large-scale retail environments using low-cost passive tags. We also undertake an analysis of a recent scheme proposed by Tran and Hong to highlight some of the weaknesses of their scheme. A detailed security analysis of the proposed scheme shows that it satisfies the formal requirements of security correctness and is resistant to compromise through security attacks.
Computers in Industry, 2010
The increase in the number of counterfeits penetrating into the open market has created the need for a product authentication approach in tracing and tracking the product anytime, anywhere. Owing to the vague concepts frequently represented in flow of products, this paper presents a self-valuation and visualization system by integrating the RFID technology and EPC concept to protect products from counterfeiting by the means of mobile platform. In this paper, a system architecture is proposed which is capable of integrating mobile technology and EPC-RFID applications. The implementation roadmap of such system architecture is examined and explained in the context of a case study. The aims of the system are to provide greater visibility of the product logistic flow data and to improve the anticounterfeit process, from traditional physical identification to self-validated location-based authentication. The case study illustrates the capability, benefits and advantages of using the proposed system, particularly its support of product authentication and supply chain activities in countering the global counterfeit problems.
Designing Systems for Control and Verifying the Authenticity of Products Using RFID Technology
2012
In contrast to the typical utilization of Radio Frequency IDentification (RFID) technology today in warehouse management and supply chain applications, the focus of this paper is an overview of the structure of RFID systems used by RFID technology and it also presents a solution based on the application of RFID for brand authentication, traceability and tracking, by implementing a production management system and extending its use to traders.
From Identification to Authentication – A Review of RFID Product Authentication Techniques
Authentication has an important role in many RFID applications for providing security and privacy. In this paper we focus on investigating how RFID can be used in product authentication in supply chain applications and a review of existing approaches is provided. The different categories of RFID product authentication approaches are analyzed within the context of anticounterfeiting and fields where future research is needed are identified.
An intelligent RFID-based electronic anti-counterfeit system (InRECS) for the manufacturing industry
2008
Radio Frequency Identification (RFID) is a potent technology that manufacturing enterprises can deploy to enhance supply chain management, inventory control and asset management effectiveness. However, counterfeit prevention is seldom addressed in these RFID applications. The quality image of reputable manufacturers is vulnerable to the damage caused by the expanding flow of counterfeit products in today's global market. To combat the counterfeit problem, this paper proposes an Intelligent RFIDbased Electronic Anti-Counterfeit System (InRECS) that will deliver accurate and global supply chain visibility with intelligent feedback into inventory and materials transfer processes. A case study will also be presented to highlight the benefits the proposed system can bring to the supply chain participants.
A New Secure RFID Anti-Counterfeiting and Anti-Theft Scheme for Merchandise
A New Secure RFID Anti-Counterfeiting and Anti-Theft Scheme for Merchandise, 2020
Counterfeiting and theft have always been problems that incur high costs and result in considerable losses for international markets. In this research paper, we address the issue of counterfeiting while using radio frequency identification RFID technology in retail systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retail market. This system addresses the two abovementioned issues and provides a solution that can save retail systems millions of dollars yearly. The proposed system achieves the objective of preventing or minimising the counterfeiting and theft of tagged products. At the same time, it provides a strong indication of suspiciously sold or obtained items. Furthermore, we conducted a security analysis to prove the correctness of our protocol on the basis of the strand spaces.
Securing a Web-Based Anti-counterfeit RFID System
The use of RFID (Radio Frequency Identification) technology can be employed for automating and streamlining safe and accurate brand identification (ID) uniquely in real-time to protect consumers from counterfeited products. By placing brand tags (RFID tags) on brands at the point of manufacture, vendors and retailers can trace products throughout the supply chain. We outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. Despite these potential benefits, security, and privacy issues are the key factors in the deployment of a web-based RFID-enabled system in anti-counterfeiting schemes. This paper proposes an asymmetric cryptosystem to secure RFID transmission in retail supply chain using Elliptic Curve Cryptographic (ECC) techniques. The uses of ECC techniques provide greater strength than other current cryptosystems (such as RSA, and DSA) for any given key length, enables the use of smaller key size, resulting in significantly lower memory requirements, and faster computations, thus, making it suitable for wireless and mobile applications, including handheld devices.