Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol

Farzana Rahman, Sheikh Iqbal Ahamed

Research output: Chapter in Book/Entry/PoemConference contribution

4 Scopus citations

Abstract

RFID is a promising technology for anti-counterfeiting since it facilitates processing of product information. In large scale RFID applications (such as - supply chain, retail industry, pharmaceutical industry, etc.) tag authentication is used to detect counterfeit products. However, RFID authentication protocols are mainly per-tag based where reader needs to authenticate tags sequentially one at a time. This increases the protocol execution time due to large volume of authentication data. In this paper, we propose to detect counterfeit tags in large scale system using efficient batch authentication. We propose FSA based protocol, FTest, to meet the requirements of prompt and reliable batch authentication in large scale RFID applications. FTest can determine the validity of a batch of tags with minimal execution time which is a major goal of large scale RFID systems. FTest can reduce protocol execution time by ensuring that the percentage of potential counterfeit products is under the user-defined threshold. The experimental result demonstrates that FTest performs significantly better than the existing counterfeit detection approaches, e.g. authentication techniques.

Original languageEnglish (US)
Title of host publication2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
Pages811-816
Number of pages6
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012 - Lugano, Switzerland
Duration: Mar 19 2012Mar 23 2012

Publication series

Name2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012

Conference

Conference2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
Country/TerritorySwitzerland
CityLugano
Period3/19/123/23/12

Keywords

  • Anti-Counterfeiting
  • Batch Authentication
  • RFID

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol'. Together they form a unique fingerprint.

Cite this