SoK: RFID-based clone detection mechanisms for supply chains

Hoda Maleki, Reza Rahaeimehr, Marten Van Dijk

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Clone product injection into supply chains causes serious problems for industry and customers. Many mechanisms have been introduced to detect clone products in supply chains which make use of RFID technologies. .is article gives an overview of these mechanisms, categorizes them by hardware change requirements, and compares their a.ributes.

Original languageEnglish (US)
Title of host publicationASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017
PublisherAssociation for Computing Machinery, Inc
Pages33-41
Number of pages9
ISBN (Electronic)9781450353977
DOIs
StatePublished - Nov 3 2017
Externally publishedYes
Event1st Workshop on Attacks and Solutions in Hardware Security, ASHES 2017 - Dallas, United States
Duration: Nov 3 2017 → …

Publication series

NameASHES 2017 - Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2017

Conference

Conference1st Workshop on Attacks and Solutions in Hardware Security, ASHES 2017
Country/TerritoryUnited States
CityDallas
Period11/3/17 → …

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'SoK: RFID-based clone detection mechanisms for supply chains'. Together they form a unique fingerprint.

Cite this