CFP last date
20 January 2025
Reseach Article

An Authentication Protocol with Anti-Counterfeit for RFID Communication System

by Umesh Kumar Garg, Harshad Panwar, Neetu Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 27
Year of Publication: 2013
Authors: Umesh Kumar Garg, Harshad Panwar, Neetu Sharma
10.5120/12142-8424

Umesh Kumar Garg, Harshad Panwar, Neetu Sharma . An Authentication Protocol with Anti-Counterfeit for RFID Communication System. International Journal of Computer Applications. 69, 27 ( May 2013), 12-14. DOI=10.5120/12142-8424

@article{ 10.5120/12142-8424,
author = { Umesh Kumar Garg, Harshad Panwar, Neetu Sharma },
title = { An Authentication Protocol with Anti-Counterfeit for RFID Communication System },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 27 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 12-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number27/12142-8424/ },
doi = { 10.5120/12142-8424 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:41.674111+05:30
%A Umesh Kumar Garg
%A Harshad Panwar
%A Neetu Sharma
%T An Authentication Protocol with Anti-Counterfeit for RFID Communication System
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 27
%P 12-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

RFID, in today's scenario is playing a vital role in multiple domains, and has become an inevitable tool to manage inventory, animal husbandry, and substituting barcode technology. We see its use at metro stations, so it shows multifaceted use making it an umbrella technology which is cost efficient too. In context to mobile readers, the security of communication channel between reader and backend server is compromised; the same also applies on tag reader communication so prevention of illegal reader and tags to enter the system is at most necessary. Also, counterfeiters have become a global phenomenon cause a threat to security. This paper aims to propose an authentication protocol to check the illegal tag and reader that breaches the system. Hash based function and public key encryption techniques are implemented on authentication protocol.

References
  1. R. Koh, E. W. Schuster, I. Chackrabarti, and A. Bellman, "Securing the Pharmaceutical Supply Chain," White Paper MIT-AUTOID-WH- 021, Auto-Id Center MIT, Cambridge, Ma 02139-4307, USA, 2003, Available at http://www. mitdatacenter. org/MIT-AUTOIDWH021. pdf.
  2. J. Kim, D. Choi, I. Kim, and Kim H. , "Product authentication service of consumer's mobile RFID device," IEEE 10th International Symposium on Consumer Electronics, 2006, pp. 1-6.
  3. J. Kim and H. Kim, "A wireless service for product authentication in mobile RFID environment," The 1st International Symposium on Wireless Pervasive Computing, 2006, 5 pages.
  4. Chin-Ling Chen, Yu-Yi Chen, Tzay-Farm Shih, Tsungm-Min Kuo, "An RFID Authentication and Anti-counterfeit Transaction Protocol" 2012 International Symposium on Computer, Consumer and Control, pp. 419-422.
  5. Swimpy Pahuja, Sandeep Negi, Ankit Verma, Pulkit Rathi, Nidhi Narang, Rakesh Chawla, "An Authentication Protocol for secure tag-reader communication" 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
  6. MEI Shuang, YANG Xiao-long, "An Efficient Authentication Protocol for Low-Cost RFID System in the Prensence of Malicious Readers" 2012 9th International Conference on Fuzzy System and Knowledge Discovery(FSKD 2012),pp. 2111-2114.
  7. Paolo D'Arco and Alfredo De Santis, "On ultralightweight RFID Authentication Protocols", IEEE Transactions on Dependable and Secure Computing, vol. 8, No. 4, July/August 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Anti-counterfeit public-key encryption