New Clone-Detection Approach For Rfid-Based Supply Chains

2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST)(2017)

引用 7|浏览10
暂无评分
摘要
Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentication, current RFID monitoring schemes need to either have a persistent online connection between supply chain partners and the back-end database or have a local database on each partner site. A persistent online connection is not guaranteed and local databases on each partner site impose extra cost and security issues. We solve this problem by introducing a new scheme in which a small Non-Volatile Memory (NVM) embedded in RFID tag is used to function as a tiny "encoded local database". In addition our scheme resists "tag tracing" so that each partner's operation remains private. Our scheme can be implemented in less than 1200 gates satisfying current RFID technology requirements.
更多
查看译文
关键词
clone-detection approach,RFID-based supply chains,radio-frequency identification,low-cost wireless method,counterfeit product injection detection,RFID monitoring schemes,supply chain partners,back-end database,security issues,nonvolatile memory,NVM,RFID tag,encoded local database,tag tracing,RFID technology
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要