Near Field Authentication

Near Field Authentication

Vasileios Lakafosis, Edward Gebara, Manos M. Tentzeris, Gerald DeJean, Darko Kirovski
ISBN13: 9781466629196|ISBN10: 1466629193|EISBN13: 9781466629202
DOI: 10.4018/978-1-4666-2919-6.ch012
Cite Chapter Cite Chapter

MLA

Lakafosis, Vasileios, et al. "Near Field Authentication." IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2013, pp. 244-267. https://doi.org/10.4018/978-1-4666-2919-6.ch012

APA

Lakafosis, V., Gebara, E., Tentzeris, M. M., DeJean, G., & Kirovski, D. (2013). Near Field Authentication. In I. Management Association (Ed.), IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 244-267). IGI Global. https://doi.org/10.4018/978-1-4666-2919-6.ch012

Chicago

Lakafosis, Vasileios, et al. "Near Field Authentication." In IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 244-267. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2919-6.ch012

Export Reference

Mendeley
Favorite

Abstract

Counterfeiting affects many different sectors of the world trade, including the pharmaceutical and the aerospace industries, and, therefore, its impact is not only of financial nature but can also have fatal consequences. This chapter introduces a new robust RFID system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. The system consists of two major components, namely the near-field certificates of authenticity (NF-CoAs), which complement typical RFID tags and serve as authenticity vouchers of the products they are attached to, and a microcontroller-enabled, low-power and low-cost reader. The high entropy and security of this framework stem from the unique, conductive, and dielectric, physical structure of the certificate instances and the highly complex electromagnetic effects that take place when such a certificate is brought in the reactive near-field area of the reader’s antenna array. In particular, the reader’s main task is to accurately extract the 5 to 6 GHz near-field response (NF fingerprint) of the NF-CoAs. The characterization of the reader’s components, with an emphasis on the accuracy achieved, is provided. Rigorous performance analysis and security test results, including uniqueness among different instances, repeatability robustness for same instance and 2D to 3D projection attack resistance, are presented and verify the unique features of this technology. Rendering typical RFID tags physically unique and hard to near-exactly replicate by complementing them with NF-CoAs can prove a valuable tool against counterfeiting.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.