4.7 Article

Fast Identification of Blocked RFID Tags

期刊

IEEE TRANSACTIONS ON MOBILE COMPUTING
卷 17, 期 9, 页码 2041-2054

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2018.2793219

关键词

RFID; blocked tags; complete identification; trade-off; estimation

资金

  1. National Key Research and Development Program of China [2016YFB1000205]
  2. State Key Program of National Natural Science of China [61432002]
  3. NSFC [U1701262, 61672379, 61772112, 61772251, 61370199, 61702365]
  4. Dalian High-level Talent Innovation Program [2015R049]
  5. Natural Science Foundation of Tianjin [17JCQNJC00700]
  6. Strategic Information and Communications R&D Promotion Programme [162302008]
  7. MIC, Japan
  8. NSF [CNS 1629746, CNS 1564128, CNS 1449860, CNS 1461932, CNS 1460971, CNS 1439672, CNS 1301774]

向作者/读者索取更多资源

The widely used RFID systems are vulnerable to the denial-of-service (DoS) attacks launched by malicious blocker tags. This paper studies how to quickly and completely identify the valid RFID tags that are blocked. The existing work that can seemingly address this problem suffers from either low time-efficiency or serious false positives. This paper proposes a hybrid approach that consists of two complementary component protocols, namely Aloha Filtering (AF) and Poll&Listen (PL). AF is fast but inaccurate, while PL is accurate but slow. Taking the merit of each protocol, our hybrid approach is to first repeat the fast AF for multiple rounds to quickly filter out the target tags that are definitely not blocked. Then, on the size-reduced remaining set that just contains a small number of suspicious tags, we invoke the accurate PL to verify the intactness of each suspicious tag with 100 percent confidence. We optimize the round count of AF that trades off between the time costs of AF and PL to minimize the total time of AF+PL. As required in the optimization process, we need to know the size of the blocked tag set and that of the unknown tag set, which, however, are not known in advance. To estimate these two set sizes, we propose a supplementary protocol called Simultaneous Estimation of the Blocked tag size and the Unknown tag size (SEBU). The key advantages of our approach over the prior art are four-fold. First, unlike the detection protocol that just discovers the existence of blocking attacks, our approach exactly identifies all the blocked target tags. Second, our approach is compliant with the C1G2 standard, and does not require any modifications to be made to the commercial RFID tags. It only needs to be installed on readers as a software module. Third, our approach does not involve any false positives. Finally, our approach significantly reduces the execution time when compared with the state-of-the-art schemes that can completely identify the blocked tags.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据