New clone-detection approach for RFID-based supply chains

Hoda Maleki, Reza Rahaeimehr, Chenglu Jin, Marten Van Dijk

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentication, current RFID monitoring schemes need to either have a persistent online connection between supply chain partners and the back-end database or have a local database on each partner site. A persistent online connection is not guaranteed and local databases on each partner site impose extra cost and security issues. We solve this problem by introducing a new scheme in which a small Non-Volatile Memory (NVM) embedded in RFID tag is used to function as a tiny "encoded local database". In addition our scheme resists "tag tracing" so that each partner's operation remains private. Our scheme can be implemented in less than 1200 gates satisfying current RFID technology requirements.

Original languageEnglish (US)
Title of host publicationProceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages122-127
Number of pages6
ISBN (Electronic)9781538639283
DOIs
StatePublished - Jun 16 2017
Externally publishedYes
Event10th IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017 - McLean, United States
Duration: May 1 2017May 5 2017

Publication series

NameProceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017

Conference

Conference10th IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017
Country/TerritoryUnited States
CityMcLean
Period5/1/175/5/17

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'New clone-detection approach for RFID-based supply chains'. Together they form a unique fingerprint.

Cite this