Skip to Content
You are currently on the new version of our website. Access the old version .
JSANJournal of Sensor and Actuator Networks
  • Article
  • Open Access

4 July 2019

A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems

,
and
School of Information Technology, Deakin University, Geelong, VIC 3220, Australia
*
Author to whom correspondence should be addressed.
Current address: Melbourne School of Engineering, School of Computing and Information Systems, University of Melbourne, Parkville, VIC 3052, Australia.

Abstract

Counterfeiting has always been a concern, costing a significant amount of money and causing losses in international trading markets. Radio frequency identification (RFID) tag Anti-counterfeiting is a conceptual solution that has received attention in the past few years. In this article, we present a survey study on the research topic of anti-counterfeiting products using RFID tags on merchandise. As this issue evolved in industry, there were several techniques used to address the problem; each technique uses a different concept and mechanism in resolving the issue. Each technique also has different pros and cons which we will address at the end of this paper with our findings. As we explore RFID technology and its implementation, we will discuss previous research before proceeding to the core of the topic of RFID Anti-counterfeiting based on the methods used. We compare the different techniques used at the end of the paper.

1. Introduction

Since counterfeiting is a significant problem affecting merchandise and retail systems worldwide, any anti-counterfeiting system needs to be built on a secure authentication protocol. It is estimated that the counterfeiting industry has cost U.S. manufacturers over $200 billion over the past two decades [1,2] and contributed to significant losses for goods manufacturers through the sale of counterfeit products. The issue has severely impacted industry growth and many researchers have adopted RFID technology instead of the traditional bar-code to address the counterfeiting problem, although a secure and comprehensive solution has yet to be achieved. In addition to product counterfeiting, there is the possibility of cloning RFID tags attached to the products. Radio frequency identification (RFID) and wireless sensor networks (WSN) are two important wireless technologies that have a wide variety of applications and provide limitless future potentials, while RFID tags are similar to actuator which requires a control signal and a source of energy. Product counterfeiting has led to significant losses for the global retail market. Although researchers have tried to address this issue, there remains a huge gap in the literature when it comes to surveying the problem based on the technique which was used to prevent or minimize the tag anti-counterfeiting. In the next section, we will briefly discuss RFID implementation in industry to give a background understanding of RFID use in general, before conducting a review of the literature in sections three and four. We will outline and provide an overview of the research topic, technology and methods used, after a brief introduction of RFID technology identifying some of the RFID properties that make it a suitable technology for retail and supply-chain industries. We also outline security and privacy issues which occur with the use of RFID technology. The core contribution of this research paper will be in providing a detailed study of the methods used to address the counterfeiting issue in products using RFID tags, as well as the technologies that these methods employ. We conclude with a comparison of these methods based on classification, taking into account certain technology aspects to provide a comprehensive overview of the methods used so far to prevent product counterfeiting.

2. RFID Technology and Some Implementations

2.1. RFID Technology

RFID systems consist, in general, of three components: a tag, which is attached to an object; a reader; and a database. The tag communicates with the receiver using radio frequency signals. Some tags are powered with a power source, while some are not, relying on the power they receive from the reader. The tag consists of an antenna, memory chip and sometimes a power source as mentioned. There are other types of tags, chipless tags, that do not use memory chips; we will mention them later in the next section. Usually the reader will send a signal to the tag to obtain its information, which will relay with its tag ID, then compare it with its records in the database. As the author in [3] suggested, that the life cycle of the RFID system should pass through five phases, Phase 1–Initiation, Phase 2–Acquisition/Development, Phase 3–Implementation, Phase 4–Operations/Maintenance and Phase 5–Disposition. There are many different implementations of RFID technology in industry. We begin by providing a brief description of some of these implementations before advancing to the issue of counterfeiting and cloning of RFID tags.

2.2. Some Implementations of RFID Technology in Industry

The RFID technology is used widely in supply chain (SC), pharmaceutical industry, food industry, retailer systems, education and libraries and many more. RFID technology is used widely in supply chain (SC), the pharmaceutical industry, food industry, retailer systems, education, libraries and many more areas. The technology was used widely in education by issuing cards for students or teachers to give them privileges to lab equipment, tools and the use of other ICT (information communication technology) resources in labs [4]; the issue of counterfeiting did not present a threat in this industry. The reason for this lack of threat is that this industry is not attractive to the attackers as it has no feasible financial benefit to them. The same reasoning applies for the use of RFID tags in libraries [5]. The implementation of RFID technology in SCM (supply chain management) and retail systems is a different story, as the issue of counterfeiting had evolved in this industry and caused serious threats and losses. In [6], the authors explore and examine the role of RFID technology in the area of SCM. Extensive research has been carried out considering the adoption of RFID technology in the Greek environment. Case studies have also been analysed to point out the industries and/or organizations that have adopted RFID technology. A key recommendation has forced companies to undertake a pilot implementation or pilot project to assess return on investment (RoI) before full RFID deployment, with a preferred approach being to restrict the pilot implementation to a portion of the company only; however, the authors do not provide any guidelines or recommendations on effective pilot implementation or discuss the issue of counterfeiting or anti-counterfeiting measures. The same issue is found in [7], where the authors present a historical view of the effects of the RFID technology, providing useful information to managers planning an RFID-enabled SCM project. The first tier of an RFID-enabled SCM project is the rush to comply with the terms that may result in the hasty implementation of RFID. The second tier is the integration of RFID into existing systems, after meeting the mandates, and the third tier is the formation of new operating processes as a result of the integration. The authors discussed the barriers affecting the RFID industry; such as, standards, cost and reliability but do not discuss tag cloning and counterfeiting. In [8], the authors exploit a phase fingerprint which extracted phase value of the back-scattered signal provided by the COTS RFID readers. The authors also implemented a prototype of TagPrint using COTS RFID devices and tested the system with over 6000 tags; they showed that the new system fingerprint exhibits a good fitness of uniform distribution and the system achieves a surprising Equal Error Rate of 0.1 percent for anti-counterfeiting. In [9], the authors present the pros and cons of using radio-frequency identification (RFID) in supply chain management. The study states and explains some of the pros of the using an RFID system in SCM, such as non-line-of-sight (NLOS) and automatic NLOS scanning, labour reduction, asset tracking and returnable items, improved inventory management, ability to withstand harsh environments, and cost savings. Additionally, the authors address some of the cons of RFID use in SCMs, such as deployment issues, manufacturing sector concerns, lack of standards, privacy concerns, and interference and reading considerations. The work offers a detailed treatment of each of these factors, but without covering the counterfeiting issue. In [10], the authors proposed a software framework to integrate both RFID and WSNs into SCM systems by establishing a communication channel between the electronic product code information service or EPCIS for RFIDs and mediation layer (MDI) for WSNs. While the RFID focus is on the identification of the objects, the WSN will monitor the control of the supply chain environment. Further, they address the problems associated with this approach of integration, such as disjointed networks between RFID and WSNs, and their different objectives and capabilities for each industry. The authors describe the EPCIS as a particular web service interacting with the whole RFID system and working as a gateway between any requester of tag info and the database. The authors also explain a case which describes their approach, but still did not mention the security and privacy issue in such a framework, including anti-counterfeiting measures, which we strongly recommend.

3. RFID Anti-Counterfeiting Methods and Technologies

RFID tag counterfeiting can be defined as creating a replica of a tag by either replicating the hardware component of a tag or by copying its software in such a way that the genuine reader, database or users would not know the difference between the actual tag and the replicated one. In general, we can categorise anti-counterfeiting techniques used in the products using RFID systems based on the method or the technique which they adopt, giving four major classifications:
  • PUF Based ‘Unclonable’ RFID ICs and chipless RFID tags for anti-counterfeiting: Since PUF-based ‘Unclonable’ RFID ICs and chipless RFID tags both exploit the physical characteristics, we will include them both here.
    -
    Physical Unclonable Functions (PUFs) exploit the physical characteristics of the IC manufacturing process to characterise each and every chip [11] uniquely. This main characteristic will make it impossible to copy, clone or control these chips. This effect makes the RFID ICs attracted to characteristics that provide uniqueness and adequate security. In [12], the authors define the PUF as “a function that maps challenges to responses embodied in a physical object to achieve the simplicity of evaluation and hard to characterize”. By denoting the PUF response to a challenge, C, by X R n and during the verification phase by Y R n as C , X is a challenge-response pair. The PUF response according, to a fake PUF, is denoted by Z as the reactions X , Y , Z are modeled as random variables with probability distribution P x , y , z . Also, the authors add two more definitions, one for the Integrated Physical Unclonable Function (I-PUF) which is a PUF bounded to a chip which prevents any attempt to separate or remove them from each other as it will lead to the chip destruction. In addition, it has the property of not allowing an attacker to tamper the communications between the chip and PUF as the output is not accessible to an attacker. The best examples for I-PUFs are the silicon PUFs [13] and coating PUFs [14]. Again in [12], the authors construct unclonable RFID tags by embedding I-PUF in the microchips and by using a PUF as a secure memory for storing secret key, as per Figure 1. In [15], the authors discuss the counterfeiting of goods and its implications and threats to health and security. The authors also discuss the incorporation of anti-counterfeiting tags with physical unclonable functions (PUFs) into products as they are unique random physical patterns of taggants which cannot be copied as the PUF tag is the key whereas the stored pattern is the lock. The authors assumed that the stochastic assembly of physical patterns made from taggants exhibiting molecular properties is an excellent approach for designing new PUF keys.
    Figure 1. One Challenge with different responses in PUF.
    -
    Another technology which received a lot of attention lately is the chip-less RFID tag [16], which is unique and has the advantage of low cost, adaptability and easy printing production. Such tags will be also hard to clone as they need special manufacturing measurements which are hard to determine, but they are not fully un-clonable like the PUF based unclonable RFID tags. As per [17] the chipless RFID tags have the following advantages:
    *
    the extremely low price (as low as 0.1 cents) makes them more appropriate to be used in the supply chain of low-cost commodities.
    *
    elimination of tag memory shelters them from denial-of-service (DoS) attack carried out in the form of overwriting tag memory.
    *
    chipless RFID tags can be directly printed on the products or their packages with conductive 3D printing materials.
    The chipless RFID tag is not very well suited for general use, as it requires either removing or shorting some resonators, such as spirals or patch slots, on the tag substrate to represent data and those procedures will increase the manufacturing time and cost [17].
  • Track and trace Anti-counterfeiting: This approach has attracted much attention from researchers due to its reliability. The method demands a trustworthy ‘e-pedigree’, or electronic pedigree, that records the product flow of items from manufacturer to retailers [18] to provide evidence of product authentication. To achieve this goal, it is imperative to have reliable creation of e-pedigree and synchronization throughout the supply chain. There are several critical problems addressed by researchers, especially during the generation of the e-pedigree when the products are tagged or during packaging line-transferring when some tags are not provided with the right programming. The synchronization between the tagged items and the back-end database must be carried in real time and with encryption to prevent eavesdropping or sniffing and to ensure uniqueness with the back end e-pedigree records. Examples of such a protocol that uses the track-and-trace method in anti-counterfeiting are shown in Figure 1. This anti-counterfeiting system is designed for supply chain operations where manufacturers, distributors, and retailers are linked to produce, transport and sell brands and products. Without such a system it is possible to import fake products. The system has been adapted and developed by adding TDPS (tag data processing and synchronization), an algorithm based on Gen2 UHF tags that aims to solve critical issues of product initial e-pedigree. The TDPS consists of five steps: EPC writing, EPC Verification and TID reading, tag locking, locking verification and initial e-pedigree creation and synchronization.
  • Distance bounding protocols: In [19] the authors proposed leveraging broadcast and collisions to identify cloned tags, thus reducing the need to resort to complex cryptography techniques and tag IDs transmission. The authors argue this approach is the best for large-scale RFID systems and also claim the synchronized secret [20] where it assigns each tag a unique ID and a unique random number which is then stored on a back-end server. The use of leverage broadcast and collision to identify counterfeited tags follows the main idea of choosing a tag with a positive ID and then sending a response when there is a cloned or counterfeited tag peer or peers. If there were a collision or multiple responses then the system will detect these cloned peers. Although this idea is practical and more comfortable to use than complex cryptography techniques, and more pleasant to use in a large scale RFID system accommodating thousands of tagged objects, there is still the limitation when using such a system separately, or in different geographic areas, or in different time frames, as this will require continuous synchronization used with RFID tags in the same system.
  • Other types of anti-counterfeiting protocols: These include the use of cryptography in general. There are several protocols which have attempted to address this issue, such as [21], where the authors proposed a system of two protocols as mentioned above. The basic idea is to make the tag handle a one way function F which is compatible with a low-cost RFID tag. The first protocol was the tag authentication protocol where the tag allows the customer “the reader” to inquire about the tag. There are four components of the RFID anti-counterfeiting system: the RFID tag, the reader, the server and the seller. The t i d is a unique tag id for the tag that is attached to the product which also stores the corresponding secret s while the reader is a device used by a customer, such as a tablet or a cell phone, with the application downloaded from the product manufacturer containing the authentication protocol. The manufacturer has the tag database which includes the tag ID or t i d , the secret S, the tag status t s t a t u s which can be sold or unsold and the seller name s n a m e . When issuing a tag, the manufacturer will assign t s t a t u s to unsold in the database and every time the tagged product is sold or transferred the database will add the name of the seller to the record.
    Through this protocol, the server verifies if the product is genuine and notifies the reader if S is incorrect or the item was sold and the server sent invalid message to the reader. The database correction protocol, on the other hand, will correct the database when any legitimate change in the tag status t s t a t u s needs to occur.
    The reader will initiate the procedure by sending the tag ID which can be found on the sticker on the product with the random number R 1 to the tag and the tag will check if t i d is correct. The tag will respond with X = F ( t i d , R 1 , S ) ; otherwise it will terminate. Once the reader has received X, it will generate another random number R 2 and send E m u ( t i d | | X | | R 1 | | R 2 ) which is an encryption of the server public key. The server will then decrypt the message using a private key m r and check if the t i d is there in the record; otherwise it terminates. If the t s t a t u s is sold, the database sends ( i n v a l i d , R 2 ) ; if unsold, the server calculates Y = F ( t i d , R 1 , S ) and checks if X = Y . If true, the server sends message ( v a l i d , R 2 ) and changes tag status to sold. As can be observed, this sequence requires many computational processes as well as encryption, decryption and back-and-forth communications; however, this procedure is still more flexible and reliable than others as it will provide different logical shapes that can adapt to the situation required by the industry.

5. Comparison Discussion

In the table below, we make a comparison of the four types of methods used to address counterfeiting. We also mention the pros and cons of each technology. As seen in Table 1 and Table 2, the physical, such as PUF-based RFID and chipless anti-counterfeiting techniques, use a high amount of resources due to manufacturing requiring specific characteristics compared to other techniques. Also, we can see it has medium complexity, high security, low adaptability, and high limitations, all covered fairly by researchers; thus, it has the disadvantage of high cost and not being adaptable to every industry and it is impossible to clone. On the other hand, the track-and-trace technique for RFID-based anti-counterfeiting uses medium resources although it requires a huge database, has medium complexity and security with low limitations, with high adaptability, as covered extensively in the research. It needs a trusted e-pedigree which make it more reliable in the industry, yet has the issue of synchronization between tagged items and back-end database. The distance-bounding protocols for RFID based anti-counterfeiting technique have medium use of resources, is low in complexity, has high security and limitations but it is low in adaptability. Since it uses broadcast and collision to identify cloned tags, it is best for large-scale RFID tags, but has the disadvantage when used in different geographical areas. The Cryptography based RFID anti-counterfeiting method is very low in resources, has a high complexity, good security, high adaptation and low limitation and was covered fairly in the research. It is very low cost, yet it can be compromised once the secret key is obtained by an adversary, so the security measures need to be strengthened.
Table 1. A comparison between the four anti-counterfeiting methods.
Table 2. Pros and Cons of each RFID anti-counterfeiting technique or method.

6. Conclusions

Counterfeiting has always been a problem that causes many losses for retail markets. While there has been some work done to address this problem and provide some solutions, especially in the retail market, there is still a knowledge gap not addressed or not covered in details. Some methods which we highlighted above address this issue and provide a solution that can save retailers millions of dollars per annum. In this paper, we have presented a detailed survey of the literature in RFID-based anti-counterfeiting methods and undertaken a detailed analysis of the different approaches and techniques that were used in the literature and industry by researchers. We addressed each method’s advantages and disadvantages compared to each other based on the technology it uses, taking into consideration each technology’s adaptability and limitations. Some possible future directions would be designing a new RFID anti-counterfeiting framework that uses two or more technique together to achieve better security, privacy and adaptability for RFID anti-counterfeiting systems.

Author Contributions

Conceptualization, G.K., R.D. and M.C.; methodology, G.K.; validation, G.K., R.D. and M.C.; formal analysis, G.K., R.D. and M.C.; investigation, G.K.; resources, G.K., R.D. and M.C.; data curation, G.K.; writing—original draft preparation, G.K.; writing—review and editing, R.D. and M.C.; supervision, R.D., M.C.; project administration, R.D., M.C.; funding acquisition, G.K., R.D.

Funding

This research received no external funding.

Conflicts of Interest

We are the authors of “A Comparison Survey Study on RFID tag Anti-Counterfeiting Systems” we declare that there is no conflict of interest.

References

  1. Randhawa, P.; Calantone, R.J.; Voorhees, C.M. The pursuit of counterfeited luxury: An examination of the negative side effects of close consumer–brand connections. J. Bus. Res. 2015, 68, 2395–2403. [Google Scholar] [CrossRef]
  2. Meyer, T. Anti-Counterfeiting Trade Agreement: 2010–2012 European Parliament Discussions. In The Politics of Online Copyright Enforcement in the EU; Springer: Berlin/Heidelberg, Germany, 2017; pp. 247–280. [Google Scholar]
  3. Kamaladevi, B. RFID-The best technology in supply chain management. Int. J. Innov. Manag. Technol. 2010, 1, 198. [Google Scholar]
  4. Al, T.; Al, G.K. A Case Study in Developing the ICT Skills for a Group of Mixed Abilities and Mixed Aged Learners at ITEP in Dubai-UAE and Possible Future RFID Implementations. In Envisioning the Future of Online Learning; Springer: Berlin/Heidelberg, Germany, 2016; pp. 133–146. [Google Scholar]
  5. Al, G. RFID Technology: Design Principles, Applications and Controversies; Nova Science Publishers, Inc.: Commack, NY, USA, 2018. [Google Scholar]
  6. Peppa, V.P.; Moschuris, S.J. RFID technology in supply chain management: a review of the literature and prospective adoption to the Greek market. Glob. J. Eng. Educ. 2013, 15, 61–68. [Google Scholar]
  7. Soon, C.B.; Gutiérrez, J.A. Effects of the RFID mandate on supply chain management. J. Theor. Appl. Electron. Commer. Res. 2008, 3, 81. [Google Scholar]
  8. Yang, L.; Peng, P.; Dang, F.; Wang, C.; Li, X.Y.; Liu, Y. Anti-counterfeiting via federated rfid tags’ fingerprints and geometric relationships. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 1966–1974. [Google Scholar]
  9. Michael, K.; McCathie, L. The pros and cons of RFID in supply chain management. In Proceedings of the International Conference on Mobile Business (ICMB’05), Sydney, Australia, 11–13 July 2005; pp. 623–629. [Google Scholar]
  10. Gomez, L.; Laurent, M.; El Moustaine, E. Risk assessment along supply chain: A RFID and wireless sensor network integration approach. Sens. Transducers 2012, 14, 269. [Google Scholar]
  11. Devadas, S.; Suh, E.; Paral, S.; Sowell, R.; Ziola, T.; Khandelwal, V. Design and implementation of PUF-based “unclonable” RFID ICs for anti-counterfeiting and security applications. In Proceedings of the 2008 IEEE International Conference on RFID, Las Vegas, NV, USA, 16–17 April 2008; pp. 58–64. [Google Scholar]
  12. Tuyls, P.; Batina, L. RFID tags for Anti-Counterfeiting. In Proceedings of the Cryptographers Track at the RSA Conference, San Jose, CA, USA, 13–17 February 2006; pp. 115–131. [Google Scholar]
  13. Gassend, B.; Clarke, D.; Van Dijk, M.; Devadas, S. Silicon physical random functions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 148–160. [Google Scholar]
  14. Tuyls, P.; Škorić, B. Secret key generation from classical physics: Physical uncloneable functions. In AmIware Hardware Technology Drivers of Ambient Intelligence; Springer: Berlin, Germany, 2006; pp. 421–447. [Google Scholar]
  15. Arppe, R.; Sørensen, T.J. Physical unclonable functions generated through chemical methods for anti-counterfeiting. Nat. Rev. Chem. 2017, 1, 0031. [Google Scholar] [CrossRef]
  16. Preradovic, S.; Karmakar, N.C. Chipless RFID: Bar Code of the Future. IEEE Microw. Mag. 2010, 11, 87–97. [Google Scholar] [CrossRef]
  17. Yang, K.; Botero, U.; Shen, H.; Woodard, D.L.; Forte, D.; Tehranipoor, M.M. UCR: An Unclonable Environmentally Sensitive Chipless RFID Tag For Protecting Supply Chain. ACM Trans. Des. Autom. Electron. Syst. 2018, 23, 74. [Google Scholar] [CrossRef]
  18. Choi, S.; Yang, B.; Cheung, H.; Yang, Y. RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting. Comput. Ind. 2015, 68, 148–161. [Google Scholar] [CrossRef]
  19. Bu, K.; Liu, X.; Xiao, B. Approaching the time lower bound on cloned-tag identification for large RFID systems. Ad Hoc Netw. 2014, 13, 271–281. [Google Scholar] [CrossRef]
  20. Lehtonen, M.; Ostojic, D.; Ilic, A.; Michahelles, F. Securing RFID systems by detecting tag cloning. In Proceedings of the International Conference on Pervasive Computing, Nara, Japan, 11–14 May 2009; pp. 291–308. [Google Scholar]
  21. Tran, D.T.; Hong, S.J. RFID anti-counterfeiting for retailing systems. J. Appl. Math. Phys. 2015, 3, 1. [Google Scholar] [CrossRef]
  22. Hofman, C.; Keates, S. An Overview of Branding and its Associated Risks. In Countering Brandjacking in the Digital Age; Springer: Berlin, Germany, 2013; pp. 9–35. [Google Scholar]
  23. Food and Drug Administration. Compliance Policy Guid 160.900 Prescription Drug Marketing Act-Pedigree Requirement under 21 CFR Part 203. 2006. Available online: https://www.fda.gov/regulatory-information/search-fda-guidance-documents/cpg-sec-160900-prescription-drug-marketing-act-pedigree-requirements-under-21-cfr-part-203 (accessed on 30 September 2016).
  24. Al, G.; Doss, R.; Chowdhury, M.; Ray, B. Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept. In Proceedings of the International Conference on Future Network Systems and Security, Paris, France, 23–25 November 2016; pp. 126–141. [Google Scholar]
  25. Al, G.; Doss, R.; Chowdhury, M. Adjusting Matryoshka Protocol to Address the Scalability Issue in IoT Environment. In Proceedings of the International Conference on Future Network Systems and Security, Gainesville, FL, USA, 31 August–2 September 2017; pp. 84–94. [Google Scholar]
  26. Chen, Y.C.; Wang, W.L.; Hwang, M.S. RFID authentication protocol for anti-counterfeiting and privacy protection. In Proceedings of the 9th International Conference on Advanced Communication Technology, Kobe, Japan, 12–14 February 2007; Volume 1, pp. 255–259. [Google Scholar]
  27. Zhu, Y.; Gao, W.; Yu, L.; Li, P.; Wang, Q.; Yang, Y.; Du, J. Research on RFID-based anti-counterfeiting system for agricultural production. In Proceedings of the World Automation Congress (WAC), Kobe, Japan, 19–23 September 2010; pp. 351–353. [Google Scholar]
  28. Yuan, Y.; Cao, L. Liquor Product Anti-counterfeiting System Based on RFID and Two-dimensional Barcode Technology. J. Converg. Inf. Technol. 2013, 8, 88–96. [Google Scholar]
  29. Mackey, T.K.; Nayyar, G. A review of existing and emerging digital technologies to combat the global trade in fake medicines. Expert Opin. Drug Saf. 2017, 16, 587–602. [Google Scholar] [CrossRef] [PubMed]
  30. Cheung, H.; Choi, S. Implementation issues in RFID-based anti-counterfeiting systems. Comput. Ind. 2011, 62, 708–718. [Google Scholar] [CrossRef]
  31. Duc, D.N.; Lee, H.; Kim, K. Enhancing Security of EPCglobal Gen-2 RFID against Traceability and Cloning. In Proceedings of the SCIS 2006, Hiroshima, Japan, 17–20 January 2006. [Google Scholar]
  32. Choi, E.Y.; Lee, D.H.; Lim, J.I. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems. Comput. Stand. Interfaces 2009, 31, 1124–1130. [Google Scholar] [CrossRef]
  33. Johnston, R.G. An anticounterfeiting strategy using numeric tokens. Int. J. Pharm. Med. 2005, 19, 163–171. [Google Scholar] [CrossRef]
  34. Choi, S.; Yang, B.; Cheung, H.; Yang, Y. Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain. In Proceedings of the 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK, 9–12 December 2013; pp. 265–269. [Google Scholar]
  35. Koh, R.; Schuster, E.W.; Chackrabarti, I.; Bellman, A. Securing the Pharmaceutical Supply Chain; White Paper; Auto-ID Labs, Massachusetts Institute of Technology: Cambridge, MA, USA, 2003; pp. 1–19. [Google Scholar]
  36. Staake, T.; Thiesse, F.; Fleisch, E. Extending the EPC network: the potential of RFID in anti-counterfeiting. In Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, NW, USA, 13–17 March 2005; pp. 1607–1612. [Google Scholar]
  37. Staake, T.; Michahelles, F.; Fleisch, E.; Williams, J.R.; Min, H.; Cole, P.H.; Lee, S.G.; McFarlane, D.; Murai, J. Anti-counterfeiting and supply chain security. In Networked RFID Systems and Lightweight Cryptography; Springer: Berlin, Germany, 2008; pp. 33–43. [Google Scholar]
  38. Kim, J.; Kim, H. Anti-Counterfeiting Solution Employing Mobile RFID Environment; World Academy of Science, Engineering and Technology: Paris, France, 2005. [Google Scholar]
  39. Lehtonen, M.; Staake, T.; Michahelles, F. From identification to authentication–a review of RFID product authentication techniques. In Networked RFID Systems and Lightweight Cryptography; Springer: Berlin, Germany, 2008; pp. 169–187. [Google Scholar]
  40. Choi, S.; Poon, C. An RFID-based anti-counterfeiting system. IAENG Int. J. Comput. Sci. 2008, 35, 80–91. [Google Scholar]
  41. Brock, D.L. Integrating the Electronic Product Code (EPC) and the Global Trade Item Number (GTIN). White Paper. 2001. Volume 25. Available online: www.autoidcenter.org/pdfs/MIT-WUTOID-WH-004.pdf (accessed on 1 September 2007).
  42. Abawajy, J. Enhancing RFID tag resistance against cloning attack. In Proceedings of the Third International Conference on Network and System Security, Gold Coast, Australia, 19–21 October 2009; pp. 18–23. [Google Scholar]
  43. Dimitriou, T. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), Athens, Greece, 5–9 September 2005; pp. 59–66. [Google Scholar]
  44. Sarma, S. Some issues related to RFID and Security. In Proceedings of the Vortrag am zweiten Workshop über RFID Security (RFIDSec’06), Graz, Austria, July 2006. [Google Scholar]
  45. Spiekermann, S.; Evdokimov, S. Privacy enhancing technologies for RFID-A critical investigation of state of the art research. IEEE Priv. Secur. 2009, 7, 56–62. [Google Scholar] [CrossRef]
  46. Klair, D.K.; Chin, K.W.; Raad, R. A survey and tutorial of RFID anti-collision protocols. IEEE Commun. Surv. Tutor. 2010, 12, 400–421. [Google Scholar] [CrossRef]
  47. Lakafosis, V.; Traille, A.; Lee, H.; Orecchini, G.; Gebara, E.; Tentzeris, M.M.; Laskar, J.; DeJean, G.; Kirovski, D. An RFID system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. In Proceedings of the 2010 IEEE MTT-S International Microwave Symposium Digest (MTT), Anaheim, CA, USA, 23–28 May 2010; pp. 840–843. [Google Scholar]
  48. Berman, B. Strategies to detect and reduce counterfeiting activity. Bus. Horizons 2008, 51, 191–199. [Google Scholar] [CrossRef]
  49. Jeng, A.B.; Chang, L.C.; Wei, T.E. Survey and remedy of the technologies used for RFID tags against counterfeiting. In Proceedings of the 2009 International Conference on Machine Learning and Cybernetics, Baoding, China, 12–15 July 2009; Volume 5, pp. 2975–2981. [Google Scholar]
  50. Juels, A. Strengthening EPC tags against cloning. In Proceedings of the 4th ACM workshop on Wireless Security, Cologne, Germany, 2 September 2005; pp. 67–76. [Google Scholar]
  51. Schapranow, M.P.; Müller, J.; Zeier, A.; Plattner, H. Costs of authentic pharmaceuticals: Research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains. Pers. Ubiquitous Comput. 2012, 16, 271–289. [Google Scholar] [CrossRef]
  52. Pyun, G. 2008 Pro-IP Act: The Inadequacy of the Property Paradigm in Criminal Intellectual Property Law and Its Effect on Prosecutorial Boundaries. DePaul J. Art Tech. Intell. Prop. L. 2008, 19, 355. [Google Scholar]
  53. Lee, Y.S.; Kim, T.Y.; Lee, H.J. Mutual authentication protocol for enhanced RFID security and anti-counterfeiting. In Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Fukuoka, Japan, 26–29 March 2012; pp. 558–563. [Google Scholar]
  54. Kardaş, S.; Çelik, S.; Bingöl, M.A.; Kiraz, M.S.; Demirci, H.; Levi, A. k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions. Wirel. Commun. Mob. Comput. 2015, 15, 2150–2166. [Google Scholar] [CrossRef]
  55. Yan, B.; Huang, G. Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products. In Proceedings of the International Seminar on Business and Information Management, Wuhan, China, 19 December 2008; Volume 1, pp. 392–395. [Google Scholar]
  56. Rahman, F.; Ahamed, S.I. Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols. Pers. Ubiquitous Comput. 2014, 18, 177–188. [Google Scholar] [CrossRef]
  57. Bansal, D.; Malla, S.; Gudala, K.; Tiwari, P. Anti-counterfeit technologies: A pharmaceutical industry perspective. Sci. Pharm. 2013, 81, 1–13. [Google Scholar] [CrossRef] [PubMed]
  58. Li, L. Technology designed to combat fakes in the global supply chain. Bus. Horizons 2013, 56, 167–177. [Google Scholar] [CrossRef]
  59. Power, G. Anti-Counterfeit Technologies for the Protection of Medicines; World Health Organization: Geneva, Switzerland, 2008. [Google Scholar]
  60. Cimino, M.G.; Marcelloni, F. Autonomic tracing of production processes with mobile and agent-based computing. Inf. Sci. 2011, 181, 935–953. [Google Scholar] [CrossRef]
  61. Al, T.; Al, G.K.; Ram Mohan Doss, R. A Survey on RFID tag ownership transfer protocols. In RFID Technology: Design Principles, Applications and Controversies; Al, G.K., Ed.; Nova Science Publishers: Hauppage, NY, USA, 2018; pp. 83–92. [Google Scholar]
  62. Al, T.; Al, G.K.; Ram Mohan Doss, R. Survey on RFID Security Issues and Scalability; Al, G.K., Ed.; Nova Science Publishers: Hauppage, NY, USA, 2018; pp. 37–50. [Google Scholar]
  63. Al, G.; Ray, B.; Chowdhury, M. Multiple Scenarios for a Tag Ownership Transfer protocol for A Closed Loop System. IJNDC 2015, 3, 128–136. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.