2013 Eleventh Annual Conference on Privacy, Security and Trust 2013
DOI: 10.1109/pst.2013.6596047
|View full text |Cite
|
Sign up to set email alerts
|

An NFC based consumer-level counterfeit detection framework

Abstract: Abstract-Counterfeit products have been a major concern in global market. There are many procedures for preventing the counterfeiting of goods, such as holograms, tamper-resistant packaging etc. However, there is still a rising trend in counterfeit goods. With the emergence of RFID systems, supply chain management is able to detect counterfeit products relatively easily. Existing techniques generally involve a centralized database and can only be implemented in an online scenario. This deprives the individual … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 8 publications
0
8
0
1
Order By: Relevance
“…Qian [19] points that product differences have an impact on counterfeits; consumer purchase intentions [20] and government regulation strategies [21] are the same. In alleviating the problems of counterfeit products, the development of relevant laws [22], website recommendation systems [23], and RFID tags [24] are helpful.…”
Section: Counterfeit Product and Goodwillmentioning
confidence: 99%
“…Qian [19] points that product differences have an impact on counterfeits; consumer purchase intentions [20] and government regulation strategies [21] are the same. In alleviating the problems of counterfeit products, the development of relevant laws [22], website recommendation systems [23], and RFID tags [24] are helpful.…”
Section: Counterfeit Product and Goodwillmentioning
confidence: 99%
“…RFID-based solutions in [5], [6], [7], [8] and NFC-based solutions in [9], [10], [11], [12] both require dedicated applications or authentication servers to integrate with these tags involved so as to perform writing, reading and validating features on the data stored in these tags with the product identifier (PID) and its metadata also stored in database system of applications for the purpose of validation at later stage to respond to any potential counterfeiting attack at different supply chain nodes. [13], [14] utilized simple barcode technology such as QR code to retrieve the product identifiers by scanning the products and querying corresponding records throughout the dedicated backend database systems to retrieve metadata of specific PIDs so as to prove the authenticity with the PIDs validated and detailed product data retrieved.…”
Section: Related Work Of Anti-counterfeiting and Traceability Systemsmentioning
confidence: 99%
“…Cryptographic approaches use public or private key cryptography to authenticate products. Saeed et al and Saeed and Walter proposed an offline approach that uses NFC tags and is based on public key cryptography. This approach allows customers to check the authenticity of products using their cell phones and does not require access to a database.…”
Section: Related Workmentioning
confidence: 99%