CFP last date
20 December 2024
Reseach Article

A Study on Product Authentication and Authorization

by Mahmuda Khan Moon, Roksana Akter, Rashed Mazumder
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 45
Year of Publication: 2021
Authors: Mahmuda Khan Moon, Roksana Akter, Rashed Mazumder
10.5120/ijca2021921844

Mahmuda Khan Moon, Roksana Akter, Rashed Mazumder . A Study on Product Authentication and Authorization. International Journal of Computer Applications. 183, 45 ( Dec 2021), 1-7. DOI=10.5120/ijca2021921844

@article{ 10.5120/ijca2021921844,
author = { Mahmuda Khan Moon, Roksana Akter, Rashed Mazumder },
title = { A Study on Product Authentication and Authorization },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2021 },
volume = { 183 },
number = { 45 },
month = { Dec },
year = { 2021 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number45/32232-2021921844/ },
doi = { 10.5120/ijca2021921844 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:42.963479+05:30
%A Mahmuda Khan Moon
%A Roksana Akter
%A Rashed Mazumder
%T A Study on Product Authentication and Authorization
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 45
%P 1-7
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Fake product has become a major concern in the developing countries like Bangladesh. A good number of products found fake or altered now-a-days. Basic information of the product including company-logo, price, manufacturing and expiring date are printed on product-body or packet. Usually, customers believe those information during purchase time. However, these information can be altered in many ways such as generation and distribution of fake product, and changing the tag. Under this circumstances, an idea is generated that can solve the above issues using a cryptographic tool such as authenticated encryption (AE) and Quick Response Code (QR Code). The target point of using AE is to ensure product authentication and authorization. Furthermore, QR code provides user friendly environment. In this paper, encryption is performed based on the product contents using encryption key and can not be altered without key. This encrypted data is used to create a tag. This tag will be based on AES algorithm and converted into QR code. A valid user can get the tag from the QR. In the next step, a valid user will get all information related to that product.

References
  1. Denso ADC. “QR Code Essentials”. In: (Jan. 2013). Archived from the original on 12 May 2013. Retrieved 12 March 2013.
  2. ADWEEK. Counterfeit Goods Are a $460 Billion Industry, and Most Are Bought and Sold Online. https://www.adweek.com/brand-marketing/counterfeitgoods- are-a-460-billion-industry-and-most-are-boughtand- sold-online/. 13 February 2017.
  3. Himja Agrawal and Prof.P.R.Badadapure. “A Survey Paper On Elliptic Curve Cryptography”. In: International Research Journal of Engineering and Technology(IRJET) 3 (Apr. 2016).
  4. Barcode.com. History of the Bar Code. https://barcode.com/20110610585/history-of-the-barcode. html. [Online, Accessed 2 January, 2020]. 2020.
  5. CNN business. The ’fakes’ industry is worth $461 billion. https://money.cnn.com/2016/04/18/news/economy/fakepurses- shoes-economy-counterfeit-trade/index.html. 18 April 2016.
  6. BusinessDictionary. Mechanism. http://www.businessdictionary.com/definition/mechanism.html. [Online, Accessed 8 January, 2020]. 2020.
  7. Sumanta Chatterjee. How long will it take to break a 256 bit AES encryption key using brute force? https://www.quora.com/How-long-will-it-take-to-break-a- 256-bit-AES-encryption-key-using-brute-force. [Online, Accessed 12 January, 2020]. 13 June 2017.
  8. Comparitech. What is aes encryption and how does it work. https://www.comparitech.com/blog/informationsecurity/ what-is-aes-encryption/. [Online, Accessed 8 January, 2020]. 2019.
  9. Wikipedia Contributors. Barcode. https://en.wikipedia.org/wiki/Barcode. [Online, Accessed 2 January, 2020]. 21 January 2020.
  10. Wikipedia Contributors. Ciphertext. https://en.wikipedia.org/wiki/Ciphertext. [Online, Accessed 12 January, 2020]. 18 December 2019.
  11. Wikipedia Contributors. WM. https://en.wikipedia.org/wiki/Waterfallmodel. [Online]. Oct. 2021.
  12. Denso-Wave. “QR Code features”. In: (Jan. 2013). Retrieved 3 October 2011.
  13. Christoph Jechlitschek. “A survey paper on Radio Frequency Identification (RFID) trends”. 24 April 2006.
  14. Dejan Baca Kai Petersen Claes Wohlin. The Waterfall Model in Large-Scale Development. June 2009.
  15. Mobie-QR-Codes.org. How are QR codes better than barcodes. http://www.mobile-qr-codes.org/qr-codes-vsbarcodes. html. [Online, Accessed 11 January, 2020].
  16. Allied Market Research. Packaged Food Market by Product Type (Ice Creams, Pasta, Cheese, Yogurt, Nuts, Biscuits, Baby Food, Soups, Potato Chips, Instant Noodles, Non-Alcoholic Drinks, Breakfast Cereals) - Opportunity Analysis and Industry Forecast, 2014 - 2020. https://www.alliedmarketresearch.com/packagedfood- market. July 2015.
  17. Seritag. NFC tag Authentication. https://learn.seritag.com/tech/nfc-tag-authenticationexplained. [Online, Accessed 3 January, 2020]. 21 June 2019.
  18. TechTarget. Advanced Encryption Standard (AES). https://searchsecurity.techtarget.com/definition/Advanced- Encryption-Standard. [Online, Accessed 8 January, 2020]. 2020.
  19. Hetty Tullis. 13 Terrifying Dangers Of Counterfeit Makeup. https://www.thetalko.com/13-terrifying-dangersof- counterfeit-makeup/. 15 December 2015.
  20. How stuff works. What’s an NFC tag? https://electronics.howstuffworks.com/nfc-tag.htm. [Online, Accessed 3 January, 2020]. 2019.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication QR codes AES Encryption