4.8 Article

DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 18, 期 1, 页码 345-355

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2021.3072929

关键词

Cloning; Radiofrequency identification; Probabilistic logic; Protocols; Reliability; Physical unclonable function; Informatics; Anonymous radio frequency identification (RFID) systems; attack probability; detection reliability; probabilistic cloning attack

资金

  1. NSFC [61772551, 62111530052, 62062034, U20A20182, 61872274, 61832012, 61771289]
  2. Graduate Innovation Projects of the China University of Petroleum (East China) [YCX2020096]
  3. Research Fund for the Creative Research Team of Young Scholars at Universities in Shandong Province [2019KJN019]

向作者/读者索取更多资源

This article focuses on the detection of probabilistic cloning attacks in anonymous RFID systems. The proposed DAP protocol effectively detects these attacks by utilizing the inconsistency and collision caused by the cloning attacks. The parameters are analyzed to maximize the detection efficiency.
Radio frequency identification (RFID) systems have achieved wide applications in various scenarios, such as warehouse management, logistic tracking, smart transportation, etc. Despite the enormous benefits from the RFID systems, the security issues are still of great concern, such as the cloning attacks. In this article, we focus on the detection of probabilistic cloning attacks for the anonymous RFID systems, in which each cloned genuine tag suffers attacks from its clone tags with a certain probability. We propose an efficient detection protocol against the probabilistic cloning attacks in anonymous RFID systems named DAP, which can detect the probabilistic cloning attacks with the required detection reliability alpha if at least one tag is attacked with the probability no less than the threshold P-T. The proposed DAP protocol fully utilizes the inconsistency and unreconcilable collision caused by the probabilistic cloning attacks to effectively detect the probabilistic cloning attacks.The parameters are theoretically analyzed to maximize the detection efficiency. The extensive simulations are conducted and the results demonstrate the effectiveness of the proposed DAP protocol.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据