DBF: A General Framework for Anomaly Detection in RFID Systems

被引:0
作者
Chen, Min [1 ,2 ,4 ]
Liu, Jia [3 ]
Chen, Shigang [1 ]
Qiao, Yan [1 ,2 ,4 ]
Zheng, Yuanqing
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL USA
[2] Google Inc, 1600 Amphitheatre Pkwy, Mountain View, CA USA
[3] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
来源
IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS | 2017年
基金
美国国家科学基金会;
关键词
IDENTIFICATION; TAGS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RFID technologies are making their way into numerous applications, including inventory management, supply chain, product tracking, transportation, logistics, etc. One important application is to automatically detect anomalies in RFID systems, such as missing tags, unknown tags, or cloned tags due to theft, management error, or targeted attacks. Existing solutions are all designed to detect a certain type of RFID anomalies, but lack a general functionality for detecting different types of anomalies. This paper attempts to propose a general framework for anomaly detection in RFID systems, thereby reducing the complexity for readers and tags to implement different anomaly-detection protocols. We introduce a new concept of differential Bloom filter (DBF), which turns physical-layer signal data into a segmented Bloom filter that encodes the IDs of abnormal tags. As a case study, we propose a protocol that builds DBF for identifying all missing tags in an efficient way. We implement a prototype for missing-tag identification using USRP and WISP tags to verify the effectiveness our protocol, and use large-scale simulations for performance evaluation. The results show that our solution can significantly improve time efficiency, when comparing with the best existing work.
引用
收藏
页数:9
相关论文
共 23 条
[1]  
[Anonymous], P ACM SIGCOMM
[2]  
[Anonymous], IEEE INFOCOM
[3]  
[Anonymous], 2003, INTERNET MATH
[4]  
[Anonymous], IEEE T PARALLEL DIST
[5]   Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems [J].
Bu, Kai ;
Xu, Mingjie ;
Liu, Xuan ;
Luo, Jiaqing ;
Zhang, Shigeng .
2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, :416-424
[6]   Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems [J].
Bu, Kai ;
Liu, Xuan ;
Luo, Jiaqing ;
Xiao, Bin ;
Wei, Guiyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :429-439
[7]  
Chen B., 2013, P ACM MOB
[8]   ETAP: Enable Lightweight Anonymous RFID Authentication with O(1) Overhead [J].
Chen, Min ;
Chen, Shigang .
2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2015, :267-278
[9]  
Jones E.E., 2007, RFID in Logistics A Practical Introduction
[10]  
Lehtonen M, 2009, IEEE RFID: 2009 IEEE INTERNATIONAL CONFERENCE ON RFID, P225