Product authentication using hash chains and printed QR codes
Title | Product authentication using hash chains and printed QR codes |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Keni, H., Earle, M., Min, M. |
Conference Name | 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC) |
ISBN Number | 978-1-5090-6196-9 |
Keywords | authentication, Computer crime, cost-efficient scheme, counterfeit goods, cryptography, cyber physical systems, hash-chain, printed tags, product authentication, production engineering computing, Protocols, pubcrawl, QR codes, Resiliency, RFID tags, security characteristics, security threats, Servers, static code, static tag based hash chains, statically printed QR codes |
Abstract | In this paper, we explore the usage of printed tags to authenticate products. Printed tags are a cheap alternative to RFID and other tag based systems and do not require specialized equipment. Due to the simplistic nature of such printed codes, many security issues like tag impersonation, server impersonation, reader impersonation, replay attacks and denial of service present in RFID based solutions need to be handled differently. We propose a cost-efficient scheme based on static tag based hash chains to address these security threats. We analyze the security characteristics of this scheme and compare it to other product authentication schemes that use RFID tags. Finally, we show that our proposed statically printed QR codes can be at least as secure as RFID tags. |
URL | https://ieeexplore.ieee.org/document/7983126 |
DOI | 10.1109/CCNC.2017.7983126 |
Citation Key | keni_product_2017 |
- Protocols
- statically printed QR codes
- static tag based hash chains
- static code
- Servers
- security threats
- security characteristics
- RFID tags
- Resiliency
- QR codes
- pubcrawl
- authentication
- production engineering computing
- product authentication
- printed tags
- hash-chain
- cyber physical systems
- Cryptography
- counterfeit goods
- cost-efficient scheme
- Computer crime