4.8 Article

DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 18, Issue 1, Pages 345-355

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2021.3072929

Keywords

Cloning; Radiofrequency identification; Probabilistic logic; Protocols; Reliability; Physical unclonable function; Informatics; Anonymous radio frequency identification (RFID) systems; attack probability; detection reliability; probabilistic cloning attack

Funding

  1. NSFC [61772551, 62111530052, 62062034, U20A20182, 61872274, 61832012, 61771289]
  2. Graduate Innovation Projects of the China University of Petroleum (East China) [YCX2020096]
  3. Research Fund for the Creative Research Team of Young Scholars at Universities in Shandong Province [2019KJN019]

Ask authors/readers for more resources

This article focuses on the detection of probabilistic cloning attacks in anonymous RFID systems. The proposed DAP protocol effectively detects these attacks by utilizing the inconsistency and collision caused by the cloning attacks. The parameters are analyzed to maximize the detection efficiency.
Radio frequency identification (RFID) systems have achieved wide applications in various scenarios, such as warehouse management, logistic tracking, smart transportation, etc. Despite the enormous benefits from the RFID systems, the security issues are still of great concern, such as the cloning attacks. In this article, we focus on the detection of probabilistic cloning attacks for the anonymous RFID systems, in which each cloned genuine tag suffers attacks from its clone tags with a certain probability. We propose an efficient detection protocol against the probabilistic cloning attacks in anonymous RFID systems named DAP, which can detect the probabilistic cloning attacks with the required detection reliability alpha if at least one tag is attacked with the probability no less than the threshold P-T. The proposed DAP protocol fully utilizes the inconsistency and unreconcilable collision caused by the probabilistic cloning attacks to effectively detect the probabilistic cloning attacks.The parameters are theoretically analyzed to maximize the detection efficiency. The extensive simulations are conducted and the results demonstrate the effectiveness of the proposed DAP protocol.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available