4.7 Article

Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2020.3023785

Keywords

Attack probability; cloning attack identification; radio frequency identification (RFID) systems; required identification reliability

Funding

  1. NSFC [61772551, 61872274, 61672321, 61832012, 61771289, 61872385]
  2. Fundamental Research Funds for the Central Universities [18CX07003A]
  3. Shandong Provincial Key Laboratory of Computer Networks [SDKLCN-2018-06]
  4. Research Fund for the Creative Research Team of Young Scholars at Universities in Shandong Province [2019KJN019]
  5. International Exchange Project of China University of Petroleum [UPCIEF202052]

Ask authors/readers for more resources

RFID technology has been widely utilized in tracking, object monitoring, and social networks, while cloning attacks can disrupt RFID systems. This paper proposes three protocols (IPCA, MS-IPCA, and S-IPCA) to identify probabilistic cloning attacks, with their effectiveness verified through theoretical analysis and extensive simulations.
Radio-Frequency Identification (RFID) is an emerging technology which has been widely applied in various scenarios, such as tracking, object monitoring, and social networks, etc. Cloning attacks can severely disturb the RFID systems, such as missed detection for the missing tags. Although there are some techniques with physical architecture design or complicated encryption and cryptography proposed to prevent the tags from being cloned, it is difficult to definitely avoid the cloning attack. Therefore, cloning attack detection and identification are critical for the RFID systems. Prior works rely on that each clone tag will reply to the reader when its corresponding genuine tag is queried. In this article, we consider a more general attack model, in which each clone tag replies to the reader's query with a predefined probability, i.e., attack probability. We concentrate on identifying the tags being attacked with the probability no less than a threshold P-t with the required identification reliability alpha. We first propose a basic protocol to Identify the Probabilistic Cloning Attacks with required identification reliability for the large-scale RFID systems called IPCA. Then we propose two enhanced protocols called MS-IPCA and S-IPCA respectively to improve the identification efficiency. We theoretically analyze the parameters of the proposed IPCA, MS-IPCA and S-IPCA protocols to maximize the identification efficiency. Finally we conduct extensive simulations to validate the effectiveness of the proposed protocols.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available