Authors:
Wallstabe, Andreas; Pohl, Hartmut (Information Security, Department of Computer Science, University of Applied Sciences Bonn-Rhein-Sieg, St. Augustin Germany)

Abstract:

Radio Frequency Identification (RFID) systems have become popular mostly for automated identification and supply chain applications. To implement counterfeit security, RFID- and Public Key (PK) technology are combined. RFID tags authenticate themselves by responding to a challenge of a reader/writer device. For this an asymmetric encryption algorithm (RSA) is implemented and executed on the tag. Thereby a high level of counterfeit security is reached. Using a private/public key pair makes this method very flexible for validation by the distributor or the customer. The asymmetric encryption algorithm is running on a low cost tag providing security even for products with a low value. For high level security, drugs are used as example products.

Recommend this Page




Verification Code Refresh image