Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Marquette University

2014

Security

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Efficient Detection Of Counterfeit Products In Large-Scale Rfid Systems Using Batch Authentication Protocols, Farzana Rahman, Sheikh Iqbal Ahamed Jan 2014

Efficient Detection Of Counterfeit Products In Large-Scale Rfid Systems Using Batch Authentication Protocols, Farzana Rahman, Sheikh Iqbal Ahamed

Mathematics, Statistics and Computer Science Faculty Research and Publications

RFID technology facilitates processing of product information, making it a promising technology for anti-counterfeiting. However, in large-scale RFID applications, such as supply chain, retail industry, pharmaceutical industry, total tag estimation and tag authentication are two major research issues. Though there are per-tag authentication protocols and probabilistic approaches for total tag estimation in RFID systems, the RFID authentication protocols are mainly per-tag-based where the reader authenticates one tag at each time. For a batch of tags, current RFID systems have to identify them and then authenticate each tag sequentially, one at a time. This increases the protocol execution time due to …