4.7 Article

Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2020.3023785

关键词

Attack probability; cloning attack identification; radio frequency identification (RFID) systems; required identification reliability

资金

  1. NSFC [61772551, 61872274, 61672321, 61832012, 61771289, 61872385]
  2. Fundamental Research Funds for the Central Universities [18CX07003A]
  3. Shandong Provincial Key Laboratory of Computer Networks [SDKLCN-2018-06]
  4. Research Fund for the Creative Research Team of Young Scholars at Universities in Shandong Province [2019KJN019]
  5. International Exchange Project of China University of Petroleum [UPCIEF202052]

向作者/读者索取更多资源

RFID technology has been widely utilized in tracking, object monitoring, and social networks, while cloning attacks can disrupt RFID systems. This paper proposes three protocols (IPCA, MS-IPCA, and S-IPCA) to identify probabilistic cloning attacks, with their effectiveness verified through theoretical analysis and extensive simulations.
Radio-Frequency Identification (RFID) is an emerging technology which has been widely applied in various scenarios, such as tracking, object monitoring, and social networks, etc. Cloning attacks can severely disturb the RFID systems, such as missed detection for the missing tags. Although there are some techniques with physical architecture design or complicated encryption and cryptography proposed to prevent the tags from being cloned, it is difficult to definitely avoid the cloning attack. Therefore, cloning attack detection and identification are critical for the RFID systems. Prior works rely on that each clone tag will reply to the reader when its corresponding genuine tag is queried. In this article, we consider a more general attack model, in which each clone tag replies to the reader's query with a predefined probability, i.e., attack probability. We concentrate on identifying the tags being attacked with the probability no less than a threshold P-t with the required identification reliability alpha. We first propose a basic protocol to Identify the Probabilistic Cloning Attacks with required identification reliability for the large-scale RFID systems called IPCA. Then we propose two enhanced protocols called MS-IPCA and S-IPCA respectively to improve the identification efficiency. We theoretically analyze the parameters of the proposed IPCA, MS-IPCA and S-IPCA protocols to maximize the identification efficiency. Finally we conduct extensive simulations to validate the effectiveness of the proposed protocols.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据