Batch clone detection in RFID-enabled supply chain

J Shi, SM Kywe, Y Li - 2014 IEEE International Conference on …, 2014 - ieeexplore.ieee.org
Radio Frequency IDentification (RFID) technology plays an important role in deterring
counterfeit products. There are, however, many unsolved challenges in designing an …

New clone-detection approach for RFID-based supply chains

H Maleki, R Rahaeimehr, C Jin… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless
method for detection of counterfeit product injection in supply chains. In order to adequately …

Privacy-preserving clone detection for RFID-enabled supply chains

D Zanetti, L Fellmann, S Capkun - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Counterfeit products cause financial losses and represent a health risk. Within RFID-
enabled supply chains, where products are equipped with RFID tags, clone detection …

[PDF][PDF] Tailing RFID Tags for Clone Detection.

D Zanetti, S Capkun, A Juels - Ndss, 2013 - ethz.ch
Abstract RFID (Radio-Frequency IDentification) is a key emerging technology for supply-
chain monitoring and detection of counterfeit and grey-market goods. The most prevalent …

DTD: A novel double-track approach to clone detection for RFID-enabled supply chains

J Huang, X Li, CC Xing, W Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Toward improving the traditional clone detection technique whose performance may be
affected by dynamic changes of supply chains and misread, we present a novel and …

SoK: RFID-based clone detection mechanisms for supply chains

H Maleki, R Rahaeimehr, M Van Dijk - … of the 2017 Workshop on Attacks …, 2017 - dl.acm.org
Clone product injection into supply chains causes serious problems for industry and
customers. Many mechanisms have been introduced to detect clone products in supply …

[HTML][HTML] Clone tag detection in distributed RFID systems

H Kamaludin, H Mahdin, JH Abawajy - PloS one, 2018 - journals.plos.org
Although Radio Frequency Identification (RFID) is poised to displace barcodes, security
vulnerabilities pose serious challenges for global adoption of the RFID technology …

[PDF][PDF] How to secure supply chains against counterfeit products using low-cost RFID

MO Lehtonen - 2009 - research-collection.ethz.ch
Counterfeiting of branded and trademarked products is an industrial-scale problem that
continues to affect industries and societies alike, harming legally run businesses and their …

How to detect cloned tags in a reliable way from incomplete RFID traces

M Lehtonen, F Michahelles… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Cloning of RFID tags may lead to considerable financial losses and worse reputation in
many commercial applications, while being attractive for adversaries. One way to address …

Exposing clone RFID tags at the reader

L Mirowski - 2013 12th IEEE International Conference on Trust …, 2013 - ieeexplore.ieee.org
The basic premise of Radio Frequency Identification (RFID) is that objects are marked with"
tags" which emit unique" serial numbers" obtainable by" readers" using radio signals. An …