DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems

被引:11
作者
Chen, Honglong [1 ]
Ai, Xin [1 ]
Lin, Kai [1 ]
Yan, Na [1 ]
Wang, Zhibo [2 ]
Jiang, Nan [3 ]
Yu, Jiguo [4 ]
机构
[1] China Univ Petr East China, Coll Control Sci & Engn, Qingdao 266580, Peoples R China
[2] Zhejiang Univ, Coll Comp Sci & Technol, Inst Cyberspace Res, Hangzhou 310027, Peoples R China
[3] East China Jiaotong Univ, Coll Informat Engn, Nanchang 330013, Jiangxi, Peoples R China
[4] Qilu Univ Technol, Shandong Acad Sci, Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan,Shandong Key Lab Comp Ne, Jinan 250353, Peoples R China
关键词
Cloning; Radiofrequency identification; Probabilistic logic; Protocols; Reliability; Physical unclonable function; Informatics; Anonymous radio frequency identification (RFID) systems; attack probability; detection reliability; probabilistic cloning attack; AUTHENTICATION PROTOCOL; IDENTIFICATION; SECURITY; PRIVACY;
D O I
10.1109/TII.2021.3072929
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio frequency identification (RFID) systems have achieved wide applications in various scenarios, such as warehouse management, logistic tracking, smart transportation, etc. Despite the enormous benefits from the RFID systems, the security issues are still of great concern, such as the cloning attacks. In this article, we focus on the detection of probabilistic cloning attacks for the anonymous RFID systems, in which each cloned genuine tag suffers attacks from its clone tags with a certain probability. We propose an efficient detection protocol against the probabilistic cloning attacks in anonymous RFID systems named DAP, which can detect the probabilistic cloning attacks with the required detection reliability alpha if at least one tag is attacked with the probability no less than the threshold P-T. The proposed DAP protocol fully utilizes the inconsistency and unreconcilable collision caused by the probabilistic cloning attacks to effectively detect the probabilistic cloning attacks.The parameters are theoretically analyzed to maximize the detection efficiency. The extensive simulations are conducted and the results demonstrate the effectiveness of the proposed DAP protocol.
引用
收藏
页码:345 / 355
页数:11
相关论文
共 30 条
[1]   Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems [J].
Ai, Xin ;
Chen, Honglong ;
Lin, Kai ;
Wang, Zhibo ;
Yu, Jiguo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :714-727
[2]   Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags [J].
Bertoncini, Crystal ;
Rudd, Kevin ;
Nousain, Bryan ;
Hinders, Mark .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (12) :4843-4850
[3]   Deterministic Detection of Cloning Attacks for Anonymous RFID Systems [J].
Bu, Kai ;
Xu, Mingjie ;
Liu, Xuan ;
Luo, Jiaqing ;
Zhang, Shigeng ;
Weng, Minyu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) :1255-1266
[4]   Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems [J].
Bu, Kai ;
Liu, Xuan ;
Luo, Jiaqing ;
Xiao, Bin ;
Wei, Guiyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) :429-439
[5]   Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems [J].
Chen, Honglong ;
Wang, Zhibo ;
Xia, Feng ;
Li, Yanjun ;
Shi, Leyi .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2915-2926
[6]   Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags [J].
Chen, Honglong ;
Xue, Guoliang ;
Wang, Zhibo .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (03) :736-748
[7]  
Chen XY, 2020, PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, P1101
[8]  
Chen XY, 2018, IEEE INT CONF SENS, P343
[9]   Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems [J].
Choi, Eun Young ;
Lee, Dong Hoon ;
Lim, Jong In .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) :1124-1130
[10]   Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications [J].
Devadas, Srinivas ;
Suh, Edward ;
Paral, Sid ;
Sowell, Richard ;
Ziola, Tom ;
Khandelwal, Vivek .
2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, :58-+