Implementation Issues in Rfid-Based Track-And-Trace Anti-Counterfeiting

Implementation Issues in Rfid-Based Track-And-Trace Anti-Counterfeiting
Author: Bo Yang
Publisher: Open Dissertation Press
Total Pages:
Release: 2017-01-27
Genre:
ISBN: 9781361366158

This dissertation, "Implementation Issues in RFID-based Track-and-trace Anti-counterfeiting" by Bo, Yang, 楊波, was obtained from The University of Hong Kong (Pokfulam, Hong Kong) and is being sold pursuant to Creative Commons: Attribution 3.0 Hong Kong License. The content of this dissertation has not been altered in any way. We have altered the formatting in order to facilitate the ease of printing and reading of the dissertation. All rights not granted by the above license are retained by the author. Abstract: Counterfeit products, particularly pharmaceuticals, electronic devices, and apparels, are widespread. They threaten consumer safety and cause huge economic losses to licit supply chain partners and governments. Although a number of traditional anti-counterfeiting technologies, such as holograms and chemical tags, are available to combat counterfeiting, they are vulnerable to imitation or being reused. Besides, these technologies are intended to protect individual items, rather than to safeguard an entire supply chain. As such, fake products may likely be injected into the supply chain to hurt end-consumers. Track-and-trace technology based on Radio Frequency Identification (RFID) has recently emerged as a promising tool to combat counterfeiting, because of its automatic and non-line-of-sight capability to identify massive product items. By maintaining an electronic pedigree (e-pedigree) that records the transaction information of product items along the supply chain, this approach stands out for protecting the supply chain against infiltration, eliminating theft and fraud, facilitating recall of defective products, and supporting remote authentication. However, a number of technical and critical issues have yet to be solved for practical implementation of RFID-based track-and-trace anti-counterfeiting. These include generation of accurate initial product e-pedigree in fast moving manufacturing lines, precise e-pedigree updating in batch product distributing and receiving, and fast e- pedigree queries for remote and real-time product authentication from end-customers. Without fully addressing these issues, the accumulated product e-pedigree data would be untrustworthy, rendering any subsequent operations of track-and-trace and product authentication unreliable. This thesis investigates the crucial implementation issues in RFID-based track-and-trace anti-counterfeiting. It firstly presents an innovative track-and-trace anti-counterfeiting system, based on which a TDPS algorithm is proposed for generation of initial product e-pedigree in fast moving production lines. The TDPS overcomes many practical issues, such as tag writing error and tag locking failure, and helps identify the bottleneck of initial product e-pedigree generation. To tackle the bottleneck, the TDPS is further optimized by incorporating a block writing method to enhance the tag EPC writing efficiency and an integration method to balance the overhead of RFID equipment. In product distributing and receiving, a mechanized 3D scanning method is proposed to improve bulk item identification rate and enhance the accuracy and completeness of product e-pedigree. Indeed, RFID-based track-and-trace anti-counterfeiting mandates a relatively high bulk item identification rate for product authentication and e-pedigree updating. Experimental results demonstrate that the mechanized 3D scanning can achieve a bulk item reading rate of up to 98.9%, which largely outperforms the widely documented bulk reading rate (70%) in real applications. In retailing level, the efficiency of e-pedigree queries would hugely impact on customer shopping experience and the effectiveness of track-and-trace anti-counterfeiting. A partition-based method is therefore developed to cluster product e-pedigree data to improve the speed of e-pedigree queries. This approach partitions the accumulated e-pedigree data into fixed and dynamic groups, such

RFID Technology and Applications

RFID Technology and Applications
Author: Stephen B. Miles
Publisher: Cambridge University Press
Total Pages:
Release: 2008-05-29
Genre: Technology & Engineering
ISBN: 1139470612

Are you an engineer or manager working on the development and implementation of RFID technology? If so, this book is for you. Covering both passive and active RFID systems, the challenges to RFID implementation are addressed using specific industry research examples and common integration issues. Key topics include RF tag performance optimization, evaluation methodologies for RFID and Real-Time-Location Systems (RTLS) and sensors, EPC network simulation, RFID in the retail supply chain, and applications in product lifecycle management, anti-counterfeiting and cold chain management. The book brings together insights from the world's leading research laboratories in the field, including the Auto-ID Labs at MIT, successor to the Auto-ID Center which developed the Electronic Product Code scheme which is set to become the global standard for product identification.MIT Auto-ID Labs's suite of Open Source code and tools for RFID implementation is available at www.cambridge.org/9780521880930.

RFID Security and Privacy

RFID Security and Privacy
Author: Ari Juels
Publisher: Springer Science & Business Media
Total Pages: 211
Release: 2012-01-12
Genre: Computers
ISBN: 3642252869

This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID.

Counterfeit Integrated Circuits

Counterfeit Integrated Circuits
Author: Mark (Mohammad) Tehranipoor
Publisher: Springer
Total Pages: 282
Release: 2015-02-12
Genre: Technology & Engineering
ISBN: 3319118242

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems facing both the public and private sectors, it also offers practical, real-world solutions for combatting this substantial threat. · Helps beginners and practitioners in the field by providing a comprehensive background on the counterfeiting problem; · Presents innovative taxonomies for counterfeit types, test methods, and counterfeit defects, which allows for a detailed analysis of counterfeiting and its mitigation; · Provides step-by-step solutions for detecting different types of counterfeit ICs; · Offers pragmatic and practice-oriented, realistic solutions to counterfeit IC detection and avoidance, for industry and government.

Countering the Problem of Falsified and Substandard Drugs

Countering the Problem of Falsified and Substandard Drugs
Author: Institute of Medicine
Publisher: National Academies Press
Total Pages: 377
Release: 2013-06-20
Genre: Medical
ISBN: 0309269393

The adulteration and fraudulent manufacture of medicines is an old problem, vastly aggravated by modern manufacturing and trade. In the last decade, impotent antimicrobial drugs have compromised the treatment of many deadly diseases in poor countries. More recently, negligent production at a Massachusetts compounding pharmacy sickened hundreds of Americans. While the national drugs regulatory authority (hereafter, the regulatory authority) is responsible for the safety of a country's drug supply, no single country can entirely guarantee this today. The once common use of the term counterfeit to describe any drug that is not what it claims to be is at the heart of the argument. In a narrow, legal sense a counterfeit drug is one that infringes on a registered trademark. The lay meaning is much broader, including any drug made with intentional deceit. Some generic drug companies and civil society groups object to calling bad medicines counterfeit, seeing it as the deliberate conflation of public health and intellectual property concerns. Countering the Problem of Falsified and Substandard Drugs accepts the narrow meaning of counterfeit, and, because the nuances of trademark infringement must be dealt with by courts, case by case, the report does not discuss the problem of counterfeit medicines.

RFID Security and Privacy

RFID Security and Privacy
Author: Yingjiu Li
Publisher: Morgan & Claypool Publishers
Total Pages: 159
Release: 2013-12-01
Genre: Technology & Engineering
ISBN: 1627053263

As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.

Social Manufacturing: Fundamentals and Applications

Social Manufacturing: Fundamentals and Applications
Author: Pingyu Jiang
Publisher: Springer
Total Pages: 312
Release: 2018-06-12
Genre: Technology & Engineering
ISBN: 3319729861

This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual technologies enabled by social manufacturing for each topic, supported by case studies. The technologies discussed include manufacturing resource minimalization and their socialized reorganizations, blockchain models in cybersecurity, computing and decision-making, social business relationships and organizational networks, open product design, social sensors and extended cyber-physical systems, and social factory and inter-connections. This book helps engineers and managers in industry to practice social manufacturing, as well as offering a systematic reference resource for researchers in manufacturing. Students also benefit from the detailed discussions of the latest research and technologies that will have been put into practice by the time they graduate.

Networked RFID Systems and Lightweight Cryptography

Networked RFID Systems and Lightweight Cryptography
Author: Peter H. Cole
Publisher: Springer Science & Business Media
Total Pages: 350
Release: 2007-11-08
Genre: Computers
ISBN: 3540716416

This book consists of a collection of works on utilizing the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID Labs around the globe. It assumes very little knowledge on the part of the reader on Networked RFID systems as the material provided in the introduction familiarizes the reader with concepts, underlying principles and vulnerabilities of modern RFID systems.

Introduction to Hardware Security and Trust

Introduction to Hardware Security and Trust
Author: Mohammad Tehranipoor
Publisher: Springer Science & Business Media
Total Pages: 429
Release: 2011-09-22
Genre: Technology & Engineering
ISBN: 1441980806

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.