RF-DNA: Radio-Frequency Certificates of Authenticity (original) (raw)
Related papers
A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting
2010
Abstract Electronic Product Code (EPC) Radio Frequency IDentification (RFID) tags support a costeffective anti-counterfeiting mechanism through the tag-specific and globally unique Transponder ID (TID). However, with the existence of customizable tags, this countermeasure could easily be bypassed as long as the TID codes are leaked through either physically opening genuine tags or unauthorizedly breaching the backend database.
Securing a Web-Based Anti-counterfeit RFID System
The use of RFID (Radio Frequency Identification) technology can be employed for automating and streamlining safe and accurate brand identification (ID) uniquely in real-time to protect consumers from counterfeited products. By placing brand tags (RFID tags) on brands at the point of manufacture, vendors and retailers can trace products throughout the supply chain. We outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. Despite these potential benefits, security, and privacy issues are the key factors in the deployment of a web-based RFID-enabled system in anti-counterfeiting schemes. This paper proposes an asymmetric cryptosystem to secure RFID transmission in retail supply chain using Elliptic Curve Cryptographic (ECC) techniques. The uses of ECC techniques provide greater strength than other current cryptosystems (such as RSA, and DSA) for any given key length, enables the use of smaller key size, resulting in significantly lower memory requirements, and faster computations, thus, making it suitable for wireless and mobile applications, including handheld devices.
RF fingerprinting physical objects for anticounterfeiting applications
2011
Rendering typical RF identification (RFID) tags physically unique and hard to near-exactly replicate by complementing them with unique RF certificates of authenticity (RF-CoAs) can prove a valuable tool against counterfeiting. This paper introduces a new robust RFID system with enhanced hardware-enabled authentication and anticounterfeiting capabilities that relies on the near-field RF effects between a 5 5 antenna array and the uniquely modified substrate of the RF-CoAs. A microcontroller-enabled, low-power, and low-cost reader is used to accurately extract the near-field response ("RF fingerprint") of the certificates meant to complement typical RFID tags in the 5-6-GHz frequency range. The RF characterization of all the reader's components, with an emphasis on the accuracy provided, has been performed. The state diagram of the fast and accurate reader operation is outlined. Rigorous performance and security test results are presented and verify the unique features of this technology.
Securing a Smart Anti-counterfeit Web Application
Journal of Networks
The use of RFID (Radio Frequency Identification) technology can be employed for automating and streamlining safe and accurate brand identification (ID) uniquely in real-time to protect consumers from counterfeited products. We outline a Web-based Anticounterfeit RFID S ystem (WARS) to combat counterfeit branding. By placing brand tags (RFID tags) on brands at the point of manufacture, vendors and retailers can trace products throughout the supply chain. Despite these potential benefits, security, and privacy issues are the key factors in the deployment of a web-based RFID-enabled system in anti-counterfeiting schemes. This paper proposes an asymmetric cryptosystem to secure RFID transmission in the retail supply chain using Elliptic Curve Cryptographic (ECC) techniques. ECC is one of the most powerful, and widely use public-key cryptography techniques today, which provide greater strength than other current cryptosystems (such as RS A, and DS A/DH) for any given key length. In addition it enables the use of smaller keys to get the same levels of security as RS A, resulting in significant means for wireless and mobile applications, including handheld devices.
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems, 2019
Counterfeiting has always been a concern, costing a significant amount of money and 1 causing losses in international trading markets. RFID tag Anti-counterfeiting is a conceptual solution 2 that has received attention in the past few years. In this article, we present a survey study on the 3 research topic of anti-counterfeiting products using RFID tags on merchandise. As this issue evolved 4 in industry, there were several techniques used to address the problem; each technique uses a different 5 concept and mechanism in resolving the issue. Each technique also has different pros and cons which 6 we will address at the end of this paper with our findings. As we explore RFID technology and its 7 implementation, we will discuss previous research before proceeding to the core of the topic of RFID 8 Anti-counterfeiting based on the methods used. We compare the different techniques used at the end 9 of the paper. 10
An RFID-based technology for electronic component and system Counterfeit detection and Traceability
2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
The vulnerabilities in the supply chain have raised serious concerns about the security and trustworthiness of electronic components and systems. Testing for device provenance, detection of counterfeit integrated circuits/systems, and traceability mechanisms are challenging issues to address. In this paper, we develop a novel RFIDbased system suitable for electronic component and system counterfeit detection and system traceability called CST. Different types of onchip sensors and in-system structures can be connected to the CST system to provide the information needed to detect multiple counterfeit types (recycled, cloned, etc.) and to verify the authenticity of the system with some degree of confidence. Board-and chip-related information can be updated periodically on the chip and safely stored to reflect the latest hardware conditions such as the increment of chip usage time. An essential part of this system is an RFID tag employed as storage and a channel to read the information from different types of chips on the printed circuit board (PCB) in both power-off and power-on scenarios. Chip-level counterfeiting, board-level counterfeiting and board identification/tracking are supported by CST. Simulations and experimental results using Spartan 3E FPGAs demonstrate the effectiveness of this system.
Pharmaceutical Counterfeiting and the RFID Technology Intervention
Journal of Hospital Marketing & Public Relations, 2010
Both nationally and internationally pharmaceutical counterfeiting has become a problem threatening economic stability and public health. The purpose of the present research study review was to analyze the scope and severity of pharmaceutical counterfeiting and to establish if the implantation of the Radio Frequency Identification Device (RFID) model can more efficiently be used within the pharmaceutical supply chain to reduce the problem counterfeit drugs impose on public health and international economic stability. Results indicated that implementing the RFID model for tracking drugs at the item-level in the pharmaceutical supply chain has potential to alleviate the scope of the counterfeit drug problem. Recommendations for how the pharmaceutical industry may sooner adopt the RFID model are made.
A cost-effective counterfeiting prevention method using hashing, QR code, and website
International Journal of Advances in Applied Sciences, 2024
In this paper, we proposed a cost-effective software method to prevent counterfeiting where we used a website, quick-response (QR) code, and hashing. At the early stage of the product, the system will create a unique ID and a password with a random password generator for all products. Then, the password hash would be stored along with the ID in the database. At the same time, the password would be converted into a QR code for each product. The manufacturer will collect the QR code and ID and attach them to the product. When consumers attempt to verify the product, they will enter the website provided by the manufacturer and scan the QR code. After applying the same hash used before, the code will be checked on the database. After a successful check, the product entity will be destroyed and the life of the product ends. This paper contains flowcharts, figures, cost estimation, and a detailed explanation of the system. As it only requires domain hosting, thus the fixed cost of the system is so lower to bear for small enterprises also. We built a similar system using PHP, HTML, JavaScript for websites, and MYSQL for databases.