Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept

8Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since the RFID technology has been found couple of decades ago, there was much involvement of this emerging technology in the improvement of supply chain management. As this technology made the industry more reliable and faster to process, yet there were always some technical issues and security threats that emerged from the heavy use of the RFID tags in the SCM, or other industries. Hereby we represent a new protocol based on a new idea that can be used to manage and organize tags as well as the objects attached to them in SCM, to prevent counterfeiting and reduce the security threats taking into consideration the security and privacy concerns that faces the industry today. This new approach will open a new horizon to the supply chain management as well as the RFID systems technology since it will handle multi- tags attached to objects managed in one location as an entity of one in one. We called our approach the MATRYOSHKA approach since it has the same idea of the russian doll, in managing multi-tags as one entity and prevent counterfeiting.We also added extra authentication process based on a mathematical exchange key formation to increase the security during communication to prevent threats and attacks and to provide a secure mutual authentication method.

Author supplied keywords

Cite

CITATION STYLE

APA

Al, G., Doss, R., Chowdhury, M., & Ray, B. (2016). Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept. In Communications in Computer and Information Science (Vol. 670, pp. 126–141). Springer Verlag. https://doi.org/10.1007/978-3-319-48021-3_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free