RFID Anti-Counterfeiting and Anti-Theft Solution

RFID Anti-Counterfeiting and Anti-Theft Solution

Counterfeiting is an enormous concern that impacts gross sales and retailing processes all around the globe. Based on a Grand View analysis survey, the counterfeiting exercise has value US producers greater than USD 200 billion over the past 20 years. Though many researchers have chosen radio frequency identification (RFID) know-how over barcode know-how to fight counterfeiting, the issue nonetheless exists. RFID is a reliable know-how that may assist with varied safety issues, reminiscent of counterfeiting and cloning.

RFID tags are low-cost, ubiquitous units which can be used to determine merchandise. They’re made up of an antenna and a microchip. They are often thought-about the subsequent technology of barcodes with extra versatility resulting from this microchip’s inclusion. They permit for the monitoring of a commodity at varied phases and areas in provide chain administration. A number of programs, reminiscent of automated stock management, automated high quality assurance, authentication, fee strategies, and particular safety functions, are being created to investigate the tags’ data for his or her aims.

Even so, the vast majority of present approaches don’t supply a complete picture of counterfeiting and theft points. A new anti-counterfeiting and anti-theft scheme for retail programs that stop monetary fraud of RFID tags on items.

What are the dangers?

Nonetheless, we should emphasize that bodily cloning a tag is comparatively easy. It implies that an intruder can seize the RFID-tag, study it, and (with appreciable diligence) interpret out its information, together with its authentication information (identification quantity, reference keys, and many others.). Then one creates a brand new tag with the very an identical information saved in reminiscence. When this tag is inserted into an merchandise, it’s tough for a reader to distinguish between a real and a faux. To guard an RFID-tag from this type of cloning risk, many safety precautions can stop reminiscence from being learn.

New safety scheme for stopping RFID counterfeiting

In Ghaith Khalil, Robin Doss and Morshed Chowdhury’s proposed mannequin, the seller/purchaser case included every RFID label hooked up to the product shops the distinctive t-id and the corresponding secret S and likewise the merchandise quantity Q. The reader is a pc that the patron makes use of, reminiscent of a smartphone with an actual person ID and encryption code put in from the PSH. The Wt-id is a one-of-a-kind tag ID for the registration and affirmation displayed on the product’s labels, containers, or guarantee playing cards. To confirm the merchandise, the identical reader should learn each t-id and Wt-id on the similar time.

The producer of the merchandise is the tag issuer for each product tags and safety card labels. It sends the tag information to the AC server offering authorization and safety to the system. The database objects are t-id, Wt-id, S and user-id, and the product serial quantity Q. Alternatively, the AT server is supplied by the producer or retailers. They should give their permission to retailer the purchaser’s data and particulars of their system, which the producer can’t conveniently do.

The method may embrace a operate to resolve whether or not or not the product beneath examination is compromised. The vital stakeholders on this part are the PSH and the AT server after the AC server has replied with OK. If the merchandise is reliable and desires to buy it from the authorized producer or distributor, the case wherein the purchaser checks is known as a ‘counterfeiting utilization state of affairs.’ The vendor creates a NO-ID for the brand new proprietor and updates the property’s present possession by submitting t-id, Wt-id and NO-ID to PSH, which is able to then be redirected to AT for replace. Consequently, the file is preserved within the AT repository.