Extending the EPC network: the potential of RFID in anti-counterfeiting
Proceedings of the 2005 ACM symposium on Applied computing
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
Product Specific Security Features Based on RFID Technology
SAINT-W '06 Proceedings of the International Symposium on Applications on Internet Workshops
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Proceedings of the 2007 ACM symposium on Applied computing
Securing the Pharmaceutical Supply Chain using RFID
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Using radio frequency identification in agent-based control systems for industrial applications
Engineering Applications of Artificial Intelligence
Security problems of RFID authentication protocols
ICOSSSE'07 Proceedings of the 6th WSEAS international conference on System science and simulation in engineering
Design & development of collaborative workflow for lean production in a repair & overhaul industry
WSEAS Transactions on Computers
Vulnerabilities in some recently proposed RFID ownership transfer protocols
IEEE Communications Letters
Assessing the relative effectiveness of technological strategies for fighting counterfeit medicines
COMATIA'10 Proceedings of the 2010 international conference on Communication and management in technological innovation and academic globalization
Hi-index | 0.00 |
Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. The Counterfeit imposes a menace to industry worldwide, and the problem is not specific for certain products or countries. In 2003, Koh et al. describe a RFID system based on "track and trace" solution to apply into pharmaceutical supply chain management to fight the counterfeit. Moreover, there are applications to solve malicious manner were presented. But there always still existed some disputes and not conform Class 1 Generation 2 (C1G2) standards. Unfortunately, the trick is changeable. The Koh et al.'s scheme is at premise rather primitive. In order to tackle this problem, we propose an anti-counterfeit ownership transfer protocol for low cost RFID system. We only use a tag to be a storage media. The proposed scheme can ensure a secure transaction.