Abstract
© 2017 IEEE.Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentication, current RFID monitoring schemes need to either have a persistent online connection between supply chain partners and the back-end database or have a local database on each partner site. A persistent online connection is not guaranteed and local databases on each partner site impose extra cost and security issues. We solve this problem by introducing a new scheme in which a small Non-Volatile Memory (NVM) embedded in RFID tag is used to function as a tiny "encoded local database". In addition our scheme resists "tag tracing" so that each partner's operation remains private. Our scheme can be implemented in less than 1200 gates satisfying current RFID technology requirements.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 122-127 |
ISBN (Electronic) | 9781538639283 |
DOIs | |
Publication status | Published - 16 Jun 2017 |
Externally published | Yes |
Event | 10th IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017 - McLean, United States Duration: 1 May 2017 → 5 May 2017 |
Conference
Conference | 10th IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017 |
---|---|
Country/Territory | United States |
City | McLean |
Period | 1/05/17 → 5/05/17 |