Document Type
Article
Language
eng
Format of Original
12 p.
Publication Date
1-2014
Publisher
Springer
Source Publication
Personal and Ubiquitous Computing
Source ISSN
1617-4909
Original Item ID
DOI: 10.1007/s00779-012-0629-8
Abstract
RFID technology facilitates processing of product information, making it a promising technology for anti-counterfeiting. However, in large-scale RFID applications, such as supply chain, retail industry, pharmaceutical industry, total tag estimation and tag authentication are two major research issues. Though there are per-tag authentication protocols and probabilistic approaches for total tag estimation in RFID systems, the RFID authentication protocols are mainly per-tag-based where the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, one at a time. This increases the protocol execution time due to the large volume of authentication data. In this paper, we propose to detect counterfeit tags in large-scale system using efficient batch authentication protocol. We propose FSA-based protocol, FTest, to meet the requirements of prompt and reliable batch authentication in large-scale RFID applications. FTest can determine the validity of a batch of tags with minimal execution time which is a major goal of large-scale RFID systems. FTest can reduce protocol execution time by ensuring that the percentage of potential counterfeit products is under the user-defined threshold. The experimental result demonstrates that FTest performs significantly better than the existing counterfeit detection approaches, for example, existing authentication techniques.
Recommended Citation
Rahman, Farzana and Ahamed, Sheikh Iqbal, "Efficient Detection of Counterfeit Products in Large-scale RFID Systems Using Batch Authentication Protocols" (2014). Mathematics, Statistics and Computer Science Faculty Research and Publications. 283.
https://epublications.marquette.edu/mscs_fac/283
ADA Accessible Version
Comments
Accepted version. Personal and Ubiquitous Computing, Vol. 18, No. 1 (January 2014): 177-188. DOI. © 2014 Springer. Used with permission.
Shareable Link. Provided by the Springer Nature SharedIt content-sharing initiative.