2019
DOI: 10.3390/jsan8030037
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems

Abstract: Counterfeiting has always been a concern, costing a significant amount of money and causing losses in international trading markets. Radio frequency identification (RFID) tag Anti-counterfeiting is a conceptual solution that has received attention in the past few years. In this article, we present a survey study on the research topic of anti-counterfeiting products using RFID tags on merchandise. As this issue evolved in industry, there were several techniques used to address the problem; each technique uses a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 44 publications
0
17
0
Order By: Relevance
“…In addition, 2.5 million jobs have been lost as a result of fake products. Furthermore, a significant number of injuries and deaths have occurred because of counterfeit materials, such as fake pharmaceutical medicines [6][7][8]. As a result, many anti-counterfeiting techniques or solutions have been proposed, such as barcodes and RFID tags.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, 2.5 million jobs have been lost as a result of fake products. Furthermore, a significant number of injuries and deaths have occurred because of counterfeit materials, such as fake pharmaceutical medicines [6][7][8]. As a result, many anti-counterfeiting techniques or solutions have been proposed, such as barcodes and RFID tags.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Previously, in Reference [8], we compared the available methods which are used to address RFID counterfeiting. We also showed results of the comparison between the available techniques, such as physical [9,10] or PUF [11], track and trace [12], distance bounding [13,14] and cryptography [15] in relation to cost, adaptability and security.…”
Section: Our Previous Workmentioning
confidence: 99%
“…Al thought this was not the first work which the authors had produce in the field of RFID tag security as they had previously researched the topic and proposed a secure method of authentication in [13], [14], [15] and [16]. Also, in [17], we compared the available methods according to the technique which were used to address RFID counterfeiting. We also showed results of the comparison between the available techniques used such as physical [18], [19] or PUF [20], Track and trace [21], distance bounding [22], [23], and cryptography [4] in relation to cost, adaptability and security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Tag identification is a basic and important problem in the RFID system [3]. It is implemented by information exchanged between a reader and many tags, which are attached to different objects [4].…”
Section: Introductionmentioning
confidence: 99%