@inproceedings{fa77112bd223486a8ab651a661c18bf3,
title = "New clone-detection approach for RFID-based supply chains",
abstract = "Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentication, current RFID monitoring schemes need to either have a persistent online connection between supply chain partners and the back-end database or have a local database on each partner site. A persistent online connection is not guaranteed and local databases on each partner site impose extra cost and security issues. We solve this problem by introducing a new scheme in which a small Non-Volatile Memory (NVM) embedded in RFID tag is used to function as a tiny {"}encoded local database{"}. In addition our scheme resists {"}tag tracing{"} so that each partner's operation remains private. Our scheme can be implemented in less than 1200 gates satisfying current RFID technology requirements.",
author = "Hoda Maleki and Reza Rahaeimehr and Chenglu Jin and {Van Dijk}, Marten",
year = "2017",
month = jun,
day = "16",
doi = "10.1109/HST.2017.7951810",
language = "English (US)",
series = "Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "122--127",
booktitle = "Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017",
note = "10th IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017 ; Conference date: 01-05-2017 Through 05-05-2017",
}