Anti-counterfeit ownership transfer protocol for low cost RFID system
WSEAS Transactions on Computers
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Hi-index | 0.01 |
In today's business, there is a growing problem of product counterfeiting and piracy. Criminals have considerable expertise and resources that enable them to produce and sell counterfeits of products. The proposed solution aims at providing unique and secure authentication mechanisms of a given item, in order to distinguish between genuine products and counterfeits. As underlying technology, the approach utilizes RFID technology: Transponders hold unique and cryptographically secured data that uniquely binds a given product to a given tag, and thus makes duplication or re-application of tags difficult.