Counterfeiting is a big issue that affects sales and retailing processes all over the globe. According to a Grand View research survey, the counterfeiting activity has cost US producers more than USD 200 billion over the last two decades. Even though many researchers have chosen radio frequency identification (RFID) technology over barcode technology to combat counterfeiting, the problem still exists. RFID is a trustworthy technology that can help with various security problems, such as counterfeiting and cloning.
RFID tags are low-cost, ubiquitous devices that are used to identify products. They are made up of an antenna and a microchip. They can be considered the next generation of barcodes with additional versatility due to this microchip’s inclusion. They allow for the monitoring of a commodity at various stages and locations in supply chain management. Several systems, such as automatic inventory control, automated quality assurance, authentication, payment methods, and specific security applications, are being created to analyze the tags’ information for their objectives.
Even so, the majority of current approaches do not offer a comprehensive image of counterfeiting and theft issues. A new anti-counterfeiting and anti-theft scheme for retail systems that prevent financial fraud of RFID tags on goods.
What are the risks?
However, we must emphasize that physically cloning a tag is relatively simple. It means that an intruder can seize the RFID-tag, examine it, and (with considerable diligence) interpret out its data, including its authentication data (identification number, reference keys, etc.). Then one creates a new tag with the very identical data stored in memory. When this tag is inserted into an item, it is difficult for a reader to differentiate between a genuine and a fake. To protect an RFID-tag from this form of cloning threat, many security precautions can prevent memory from being read.
New security scheme for preventing RFID counterfeiting
In Ghaith Khalil, Robin Doss and Morshed Chowdhury’s proposed model, the vendor/buyer case included each RFID label attached to the product stores the unique t-id and the corresponding secret S and also the item number Q. The reader is a computer that the consumer uses, such as a smartphone with a real user ID and encryption code installed from the PSH. The Wt-id is a one-of-a-kind tag ID for the registration and confirmation displayed on the product’s labels, boxes, or warranty cards. To verify the item, the same reader must read both t-id and Wt-id at the same time.
The producer of the item is the tag issuer for both product tags and security card labels. It sends the tag data to the AC server providing authorization and security to the system. The database objects are t-id, Wt-id, S and user-id, and the product serial number Q. On the other hand, the AT server is provided by the manufacturer or retailers. They need to give their permission to store the purchaser’s information and details in their system, which the manufacturer cannot conveniently do.
The process could include a function to decide whether or not the product under examination is compromised. The important stakeholders in this phase are the PSH and the AT server after the AC server has replied with OK. If the item is legitimate and wants to purchase it from the legal manufacturer or distributor, the case in which the purchaser checks is referred to as a ‘counterfeiting usage situation.’ The seller creates a NO-ID for the new owner and updates the property’s current possession by submitting t-id, Wt-id and NO-ID to PSH, which will then be redirected to AT for update. Consequently, the record is preserved in the AT repository.