Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems

被引:31
作者
Bu, Kai [1 ]
Liu, Xuan [1 ]
Luo, Jiaqing [2 ]
Xiao, Bin [1 ]
Wei, Guiyi [3 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[3] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou 310018, Peoples R China
关键词
Anonymous RFID system; cloning attack detection; privacy; security; unreconciled collision; LARGE-SCALE; CARDINALITY ESTIMATION; ALGORITHMS; PRIVACY; TREE;
D O I
10.1109/TIFS.2012.2237395
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloning attacks threaten radio-frequency identification (RFID) applications but are hard to prevent. Existing cloning attack detection methods are enslaved to the knowledge of tag identifiers (IDs). Tag IDs, however, should be protected to enable and secure privacy-sensitive applications in anonymous RFID systems. In a first step, this paper tackles cloning attack detection in anonymous RFID systems without requiring tag IDs as a priori. To this end, we leverage unreconciled collisions to uncover cloning attacks. An unreconciled collision is probably due to responses from multiple tags with the same ID, exactly the evidence of cloning attacks. This insight inspires GREAT, our pioneer protocol for cloning attack detection in anonymous RFID systems. We evaluate the performance of GREAT through theoretical analysis and extensive simulations. The results show that GREAT can detect cloning attacks in anonymous RFID systems fairly fast with required accuracy. For example, when only six out of 50,000 tags are cloned, GREAT can detect the cloning attack in 75.5 s with a probability of at least 0.99.
引用
收藏
页码:429 / 439
页数:11
相关论文
共 41 条
  • [1] Abawajy J, 2009, NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, P18, DOI 10.1109/NSS.2009.101
  • [2] Physically unclonable function-based security and privacy in RFID systems
    Bolotnyy, Leonid
    Robins, Gabriel
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 211 - +
  • [3] Broder Andrei, 2002, Internet mathematics, P636, DOI DOI 10.1080/15427951.2004.10129096
  • [4] Efficient Misplaced-Tag Pinpointing in Large RFID Systems
    Bu, Kai
    Xiao, Bin
    Xiao, Qingjun
    Chen, Shigang
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2094 - 2106
  • [5] TREE ALGORITHMS FOR PACKET BROADCAST CHANNELS
    CAPETANAKIS, JI
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1979, 25 (05) : 505 - 515
  • [6] Chen SG, 2011, IEEE INFOCOM SER, P3101, DOI 10.1109/INFCOM.2011.5935155
  • [7] Dean G., 2006, RFID WEAPONS ARMOURY, V22
  • [8] Delen D, 2007, PROD OPER MANAG, V16, P613
  • [9] Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications
    Devadas, Srinivas
    Suh, Edward
    Paral, Sid
    Sowell, Richard
    Ziola, Tom
    Khandelwal, Vivek
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, : 58 - +
  • [10] Dimitriou T., 2006, P IEEE SECURECOMM, P59