Securing a Smart Anti-counterfeit Web Application

Belal Chowdhury, Morshed Chowdhury, Jemal Abawajy
1969 Journal of Networks  
The use of RFID (Radio Frequency Identification) technology can be employed for automating and streamlining safe and accurate brand identification (ID) uniquely in real-time to protect consumers from counterfeited products. We outline a Web-based Anticounterfeit RFID S ystem (WARS ) to combat counterfeit branding. By placing brand tags (RFID tags) on brands at the point of manufacture, vendors and retailers can trace products throughout the supply chain. Despite these potential benefits,
more » ... y, and privacy issues are the key factors in the deployment of a web-based RFID-enabled system in anti-counterfeiting schemes. This paper proposes an asymmetric cryptosystem to secure RFID transmission in the retail supply chain using Elliptic Curve Cryptographic (ECC) techniques. ECC is one of the most powerful, and widely use public-key cryptography techniques today, which provide greater strength than other current cryptosystems (such as RS A, and DS A/DH) for any given key length. In addition it enables the use of smaller keys to get the same levels of security as RS A, resulting in significant means for wireless and mobile applications, including handheld devices. Index Terms-Asymmetric or Pu blic-Key Cryptography; ECC; RFID; WARS ; Counterfeit Branding I.
doi:10.4304/jnw.9.11.2925-2933 fatcat:mijtjgvhwjac5kosysvtgwni3q