2007
DOI: 10.1109/jsyst.2007.909820
|View full text |Cite
|
Sign up to set email alerts
|

Trust and Security in RFID-Based Product Authentication Systems

Abstract: Abstract-Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of genuine products. Security is a critical property of product authentication systems. In this paper, we study trust and security in RFID-based product authentication systems. We first present a formal definition for product authentication process and then derive the general chain of trust as well as functional and nonfunctional security requirements for product authentication. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(30 citation statements)
references
References 24 publications
0
25
0
Order By: Relevance
“…Pauli and Xu give "impersonate user" as a misuse case for "enter appointment," which is mitigated by "recognize user," in a health-care system [11]. Lehtonen, Michahelles, Fleisch give "theft from internal IT" as a misuse case for "tag authentication," which is mitigated by "secure internal IT system," in the RFID context [8].…”
Section: Orphan Misuses Anti-patternmentioning
confidence: 99%
“…Pauli and Xu give "impersonate user" as a misuse case for "enter appointment," which is mitigated by "recognize user," in a health-care system [11]. Lehtonen, Michahelles, Fleisch give "theft from internal IT" as a misuse case for "tag authentication," which is mitigated by "secure internal IT system," in the RFID context [8].…”
Section: Orphan Misuses Anti-patternmentioning
confidence: 99%
“…All subjects were required to consider two systems; a RFID-based product authentication system [31] (Figs. 9 and 10) and a Swiss portfolio management company system [46] (Figs.…”
Section: Experimental Tasks and Artifactsmentioning
confidence: 99%
“…It is beneficial not to use diagrams that were created by the authors in order to prevent bias. The misuse case diagrams from [46,31] were selected for this experiment as they represent real systems, consequently reducing the external threat to validity. The diagrams were slightly edited for two purposes: (a) to ensure that each diagram contains the Table 9 The dependent variables and their corresponding hypotheses.…”
Section: Experimental Tasks and Artifactsmentioning
confidence: 99%
“…The reduction in cost and effort to perform product identification is the most prominent advantage of RFID technology in contrast to barcodes [3]. The technology is also considered to extend the superior identification capabilities of RFID to provide product authentication.…”
Section: Introductionmentioning
confidence: 99%