Preprint Article Version 2 Preserved in Portico This version is not peer-reviewed

An Extended Re-selling Protocol For Existing Anti-Counterfeiting Schemes

Version 1 : Received: 14 July 2020 / Approved: 16 July 2020 / Online: 16 July 2020 (13:37:11 CEST)
Version 2 : Received: 9 August 2020 / Approved: 10 August 2020 / Online: 10 August 2020 (15:16:58 CEST)

How to cite: Khalil, G.; Doss, R.; Chowdhury, M. An Extended Re-selling Protocol For Existing Anti-Counterfeiting Schemes. Preprints 2020, 2020070360. https://doi.org/10.20944/preprints202007.0360.v2 Khalil, G.; Doss, R.; Chowdhury, M. An Extended Re-selling Protocol For Existing Anti-Counterfeiting Schemes. Preprints 2020, 2020070360. https://doi.org/10.20944/preprints202007.0360.v2

Abstract

Product counterfeiting is an on-going problem in supply chains and retail environments, Recently an anti-counterfeiting protocol to address this issue via cost-effective use of auto-identification technologies such as radio-frequency identification (RFID) was proposed by researchers.Yet the use case of re-selling the same product was not been fully addressed which might cause serious problem for the exciting and proposed schemes and transactions. This paper proposes an extended RFID-based anti-counterfeiting to address the use case of the original buyer reselling the same item to a second buyer. The extended scheme will be followed by a formal security analysis to show that the proposed protocol satisfies the requirements of security correctness and is resistant to compromise through security attacks.

Keywords

Anti-counterfeiting; Security; RFID; Retailer; Re-selling

Subject

Engineering, Industrial and Manufacturing Engineering

Comments (1)

Comment 1
Received: 10 August 2020
Commenter: Ghaith Khalil
Commenter's Conflict of Interests: Author
Comment: Revised version
+ Respond to this comment

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 1
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.