2010
DOI: 10.1108/02635571011069086
|View full text |Cite
|
Sign up to set email alerts
|

A counterfeit network analyzer based on RFID and EPC

Abstract: Purpose -The purpose of this paper is to focus on the design of a counterfeit network analyzer (CNA) for aggregating all the problematic product flows in order to discover any counterfeit distribution source, and to control the spread of counterfeit goods. The analyzer leverages radio frequency identification (RFID) information stored within the electronic product code (EPC) network. Design/methodology/approach -The system architecture of the proposed CNA is first discussed. A case study of the system applicat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
53
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 39 publications
(54 citation statements)
references
References 26 publications
1
53
0
Order By: Relevance
“…Moreover, some of these solutions are likely to be neutralized soon, as many of the formerly "advanced" technologies have quickly found widespread applications today. Kwok et al (2010) propose a more proactive solution that involves the use of a counterfeit network analyzer (CNA) based on RFID technology and EPC networks. It is an automatic information sharing network that can visualize distribution of fraudulent products by analyzing information captured in EPC networks.…”
Section: Limitations Of Existing Approachesmentioning
confidence: 99%
See 3 more Smart Citations
“…Moreover, some of these solutions are likely to be neutralized soon, as many of the formerly "advanced" technologies have quickly found widespread applications today. Kwok et al (2010) propose a more proactive solution that involves the use of a counterfeit network analyzer (CNA) based on RFID technology and EPC networks. It is an automatic information sharing network that can visualize distribution of fraudulent products by analyzing information captured in EPC networks.…”
Section: Limitations Of Existing Approachesmentioning
confidence: 99%
“…This information can be collected through trackand-trace technology like RFID or barcode (Kwok et al, 2010). Data collected are recorded in the information flow matrix as elaborated by Brinkerhoff (2004) and Marsden (1990).…”
Section: Social Network Analysis (Sna)mentioning
confidence: 99%
See 2 more Smart Citations
“…In general, RFID brings the following benefits in the process of combating counterfeits:  Provides accurate and detailed information that enhances item level traceability throughout supply chains and store networks  Improves stock accuracy to avoid costly discrepancies  Improves product restocking efficiencies and visibility  Provides instant notification about incidents  Strengthens brand protection  Provides real time information of product movement However, in the above mentioned RFID-based product authentication approaches [12,24,[26][27][28], RFID tag is generally attached to the product packages or stuck onto the product itself to serve as a security measure for product genuineness determination. In these approaches, the authentication measure is moved from the product itself to the information carried and stored in the RFID tag.…”
Section: Benefits and Limitations Of Using Rfid In Anti-counterfeitingmentioning
confidence: 99%