Deterministic Detection of Cloning Attacks for Anonymous RFID Systems

被引:37
作者
Bu, Kai [1 ]
Xu, Mingjie [1 ]
Liu, Xuan [2 ]
Luo, Jiaqing [3 ]
Zhang, Shigeng [4 ]
Weng, Minyu [5 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Zhejiang, Peoples R China
[2] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[4] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[5] Zhejiang Univ, Coll Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
基金
美国国家科学基金会;
关键词
Anonymity; clone detection; radio-frequency identification (RFID); security; PRIVACY; IDENTIFICATION; SECURITY;
D O I
10.1109/TII.2015.2482921
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloning attacks seriously impede the security of radio-frequency identification (RFID) applications. This paper tackles deterministic clone detection for anonymous RFID systems without tag identifiers (IDs) as a priori. Existing clone detection protocols either cannot apply to anonymous RFID systems due to necessitating the knowledge of tag IDs or achieve only probabilistic detection with a few clones tolerated. This paper proposes three protocols-BASE, DeClone, and DeClone+-toward fast and deterministic clone detection for large anonymous RFID systems. BASE leverages the observation that clone tags make tag cardinality exceed ID cardinality. DeClone is built on a recent finding that clone tags cause collisions that are hardly reconciled through rearbitration. For DeClone to achieve detection certainty, this paper designs breadth first tree traversal toward quickly verifying unreconciled collisions and hence the cloning attack. DeClone+ further incorporates optimization techniques that promise faster clone detection when clone ratio is relatively high. The performance of the proposed protocols is validated through analysis and simulation. This paper also suggests feasible extensions to enrich their applicability to distributed design.
引用
收藏
页码:1255 / 1266
页数:12
相关论文
共 37 条
  • [1] [Anonymous], EPCGLOBAL ARCHITECTU
  • [2] Bu K., 2013, THESIS
  • [3] Bu K., 2015, AD HOC NETW, V14, P1
  • [4] Approaching the time lower bound on cloned-tag identification for large RFID systems
    Bu, Kai
    Liu, Xuan
    Xiao, Bin
    [J]. AD HOC NETWORKS, 2014, 13 : 271 - 281
  • [5] Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems
    Bu, Kai
    Liu, Xuan
    Luo, Jiaqing
    Xiao, Bin
    Wei, Guiyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (03) : 429 - 439
  • [6] A Novel Anti-Collision Algorithm in RFID Systems for Identifying Passive Tags
    Chen, Yuan-Hsin
    Horng, Shi-Jinn
    Run, Ray-Shine
    Lai, Jui-Lin
    Chen, Rong-Jian
    Chen, Wei-Chih
    Pan, Yi
    Takao, Terano
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2010, 6 (01) : 105 - 121
  • [7] Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications
    Devadas, Srinivas
    Suh, Edward
    Paral, Sid
    Sowell, Richard
    Ziola, Tom
    Khandelwal, Vivek
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, : 58 - +
  • [8] Disney, 2015, OUR DISN TICK AR 100
  • [9] SHARDIS: A Privacy-Enhanced Discovery Service for RFID-Based Product Information
    Fabian, Benjamin
    Ermakova, Tatiana
    Mueller, Cristian
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2012, 8 (03) : 707 - 718
  • [10] On Improving Automation by Integrating RFID in the Traceability Management of the Agri-Food Sector
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    Sanchez, Erwing R.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (07) : 2357 - 2365