From identification to authentication - A review of RFID product authentication techniques

43Citations
Citations of this article
56Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Authentication has an important role in many RFID applications for providing security and privacy. In this paper we focus on investigating how RFID can be used in product authentication in supply chain applications and a review of existing approaches is provided. The different categories of RFID product authentication approaches are analyzed within the context of anticounterfeiting and fields where future research is needed are identified. © 2008 Springer-Verlag Berlin Heidelberg.

Author supplied keywords

Cite

CITATION STYLE

APA

Lehtonen, M., Staake, T., Michahelles, F., & Fleisch, E. (2008). From identification to authentication - A review of RFID product authentication techniques. In Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting: First Edition (pp. 169–187). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free