IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Near Field Authentication

Near Field Authentication
View Sample PDF
Author(s): Vasileios Lakafosis (Georgia Institute of Technology, USA), Edward Gebara (Georgia Institute of Technology, USA), Manos M. Tentzeris (Georgia Institute of Technology, USA), Gerald DeJean (Microsoft Research, USA)and Darko Kirovski (Microsoft Research, USA)
Copyright: 2013
Pages: 24
Source title: IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-2919-6.ch012

Purchase

View Near Field Authentication on the publisher's website for pricing and purchasing information.

Abstract

Counterfeiting affects many different sectors of the world trade, including the pharmaceutical and the aerospace industries, and, therefore, its impact is not only of financial nature but can also have fatal consequences. This chapter introduces a new robust RFID system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. The system consists of two major components, namely the near-field certificates of authenticity (NF-CoAs), which complement typical RFID tags and serve as authenticity vouchers of the products they are attached to, and a microcontroller-enabled, low-power and low-cost reader. The high entropy and security of this framework stem from the unique, conductive, and dielectric, physical structure of the certificate instances and the highly complex electromagnetic effects that take place when such a certificate is brought in the reactive near-field area of the reader’s antenna array. In particular, the reader’s main task is to accurately extract the 5 to 6 GHz near-field response (NF fingerprint) of the NF-CoAs. The characterization of the reader’s components, with an emphasis on the accuracy achieved, is provided. Rigorous performance analysis and security test results, including uniqueness among different instances, repeatability robustness for same instance and 2D to 3D projection attack resistance, are presented and verify the unique features of this technology. Rendering typical RFID tags physically unique and hard to near-exactly replicate by complementing them with NF-CoAs can prove a valuable tool against counterfeiting.

Related Content

Jeff Mangers, Christof Oberhausen, Meysam Minoufekr, Peter Plapper. © 2020. 26 pages.
Sylvain Maechler, Jean-Christophe Graz. © 2020. 27 pages.
Sabrina Petersohn, Sophie Biesenbender, Christoph Thiedig. © 2020. 41 pages.
Jonas Lundsten, Jesper Mayntz Paasch. © 2020. 21 pages.
Justus Alexander Baron. © 2020. 31 pages.
Vasileios Mavroeidis, Petros E. Maravelakis, Katarzyna Tarnawska. © 2020. 19 pages.
Hiam Serhan, Doudja Saïdi-Kabeche. © 2020. 30 pages.
Body Bottom