New clone-detection approach for RFID-based supply chains

H. Maleki, R. Rahaeimehr, C. Jin, M. Van Dijk

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

© 2017 IEEE.Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentication, current RFID monitoring schemes need to either have a persistent online connection between supply chain partners and the back-end database or have a local database on each partner site. A persistent online connection is not guaranteed and local databases on each partner site impose extra cost and security issues. We solve this problem by introducing a new scheme in which a small Non-Volatile Memory (NVM) embedded in RFID tag is used to function as a tiny "encoded local database". In addition our scheme resists "tag tracing" so that each partner's operation remains private. Our scheme can be implemented in less than 1200 gates satisfying current RFID technology requirements.
Original languageEnglish
Title of host publicationProceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages122-127
ISBN (Electronic)9781538639283
DOIs
Publication statusPublished - 16 Jun 2017
Externally publishedYes
Event10th IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017 - McLean, United States
Duration: 1 May 20175 May 2017

Conference

Conference10th IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017
Country/TerritoryUnited States
CityMcLean
Period1/05/175/05/17

Fingerprint

Dive into the research topics of 'New clone-detection approach for RFID-based supply chains'. Together they form a unique fingerprint.

Cite this