Networked RFID Systems and Lightweight Cryptography

Raising Barriers to Product Counterfeiting

  • Peter H. Cole
  • Damith C. Ranasinghe

Table of contents

  1. Front Matter
    Pages I-VIII
  2. Introduction from the editors

    1. Peter H. Cole, Damith C. Ranasinghe
      Pages 1-30
  3. Anti-counterfeiting and RFID

    1. Front Matter
      Pages 31-31
    2. Thorsten Staake, Florian Michahelles, Elgar Fleisch, John R. Williams, Hao Min, Peter H. Cole et al.
      Pages 33-43
    3. Damith C. Ranasinghe, Peter H. Cole
      Pages 45-58
    4. Damith C. Ranasinghe, Mark Harrison, Peter H. Cole
      Pages 59-78
    5. Manfred Jantscher, Raja Ghosal, Alfio Grasso, Peter H. Cole
      Pages 79-98
  4. Security and Privacy Current Status

    1. Front Matter
      Pages 99-99
    2. Damith C. Ranasinghe, Peter H. Cole
      Pages 101-145
    3. Behnam Jamali, Peter H. Cole, Daniel Engels
      Pages 147-155
    4. Damith C. Ranasinghe, Peter H. Cole
      Pages 157-167
    5. Mikko Lehtonen, Thorsten Staake, Florian Michahelles
      Pages 169-187
  5. Network Based Solutions

    1. Front Matter
      Pages 189-189
    2. Mikko Lehtonen, Thorsten Staake, Florian Michahelles, Elgar Fleisch
      Pages 211-222
  6. Cryptographic Solutions

    1. Front Matter
      Pages 247-247
    2. Thorsten Staake, Zoltan Nochta, Elgar Fleisch
      Pages 249-252
    3. Mikko Lehtonen, Thorsten Staake, Florian Michahelles, Elgar Fleisch
      Pages 253-267
    4. Dang Nguyen Duc, Hyunrok Lee, Kwangjo Kim
      Pages 269-277
    5. Wenyi Che, Huan Deng, Wang Tan, Junyu Wang
      Pages 279-287
    6. Damith C. Ranasinghe, Srinivas Devadas, Peter H. Cole
      Pages 289-309
    7. Damith C. Ranasinghe
      Pages 311-346
  7. Back Matter
    Pages 347-355

About this book


This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the extent of their success, the various barriers that may be brought against their actions, and the effectiveness of those barriers. The new field of lightweight cryptography is described in the context of using RFID systems in the fight against counterfeit products, its cost effectiveness is examined and feasible approaches to its deployment are described. Research problems and likely avenues for solutions are also presented to guide a global effort in anti-counterfeiting.


CompTIA RFID+ Elliptic Curve Cryptography Lightweight cryptography Product authentication Radio frequency identification systems authentication cryptography information system near field communication privacy radio-frequency identification (RFID

Editors and affiliations

  • Peter H. Cole
    • 1
  • Damith C. Ranasinghe
    • 1
  1. 1.School of Electrical and Electronic EngineeringUniversity of AdelaideAdelaideAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-71640-2
  • Online ISBN 978-3-540-71641-9
  • Buy this book on publisher's site
Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences