An RFID Authentication and Anti-counterfeit Transaction Protocol

In recent years, counterfeiters have become a menace to industry worldwide. This problem is not specific to certain products or countries. More and more RFID applications to solve malicious behaviors have been presented. However, these RFID applications still existed some disputes and not conform to EPCglobal Class 1 Generation 2 (C1G2) standards. Most techniques are not suitable for on-line automatic tests of product authenticity, as required in warehouses. To solve this problem, we propose an on-line authorized RFID secure transaction system with anti-counterfeiting technology. In this way, not only the counterfeiter will be restrained, but also can protect the consumer's interests.

[1]  Ygal Bendavid,et al.  Exploring the impact of RFID technology and the EPC network on mobile B2B eCommerce: A case study in the retail industry , 2008 .

[2]  Shu-Jen Wang,et al.  The simulated impact of RFID-enabled supply chain on pull-based inventory replenishment in TFT-LCD industry , 2008 .

[3]  A. Rizzi,et al.  Economical assessment of the impact of RFID technology and EPC system on the fast-moving consumer goods supply chain , 2008 .

[4]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[5]  Tatsuaki Okamoto,et al.  Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.

[6]  Howon Kim,et al.  Product Authentication Service of Consumer's mobile RFID Device , 2006, 2006 IEEE International Symposium on Consumer Electronics.

[7]  Elgar Fleisch,et al.  Product specific security features based on RFID technology , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).

[8]  Florian Michahelles,et al.  Trust and Security in RFID-Based Product Authentication Systems , 2007, IEEE Systems Journal.

[9]  Howon Kim,et al.  A wireless service for product authentication in mobile RFID environment , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[10]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[11]  Min-Shiang Hwang,et al.  RFID Authentication Protocol for Anti-Counterfeiting and Privacy Protection , 2007, The 9th International Conference on Advanced Communication Technology.

[12]  V. Potdar,et al.  Applications of RFID in Pharmaceutical Industry , 2006, 2006 IEEE International Conference on Industrial Technology.

[13]  Lung-Chuang Wang,et al.  Enhancing construction quality inspection and management using RFID technology , 2008 .

[14]  Brian King,et al.  Securing the Pharmaceutical Supply Chain using RFID , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[15]  Vladimír Marík,et al.  Using radio frequency identification in agent-based control systems for industrial applications , 2008, Eng. Appl. Artif. Intell..