Universal one-way hash functions and their cryptographic applications
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
RFID Privacy Workshop: Concerns, Consensus, and Questions
IEEE Security and Privacy
A novel mutual authentication scheme based on quadratic residues for RFID systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
WSEAS Transactions on Information Science and Applications
Information security pre-assessment of u-City service
AIC'08 Proceedings of the 8th conference on Applied informatics and communications
Cellular automata-based authentication for low-cost RFID systems
International Journal of Communication Networks and Distributed Systems
An intelligent traffic management expert system with RFID technology
Expert Systems with Applications: An International Journal
An innovative virtual-engineering system for supporting integrated footwear design
International Journal of Intelligent Engineering Informatics
Hi-index | 0.00 |
Public authorities and business communities in apparel industry of Hong Kong are looking for an effective method to identify counterfeited products. RFID technology provides a tool to address these problems. This paper presents a new approach using lightweight cryptography and a simple authentication method based on hash function for RFID Class 1 passive tags. Tags are embedded inside apparel products, such as garments or high-value apparel accessories. To determine whether a product is counterfeit, tag authentication on that apparel product can be performed and this will advise us whether the apparel product is genuine or faked. The proposed method has been compared with other basic approaches for tag authentication. It was found that the proposed method is effective and its operation is reliable. The proposed method would be useful to the existing apparel retail applications, particularly in the point-of-sale applications (POS).