Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems

Tag cloning attack is a serious threat to the radio-frequency identification (RFID) applications. Cloned tags detection is an effective security mechanism to prevent the attacks. To improve the accuracy and efficiency of detection for cloned tags, this study presents a deterministic cloned tags detection (DCTD) protocol for anonymous RFID systems to detect cloned tags, using a tree-based anti-collision algorithm to find irreconcilable collisions. This protocol, which uses the pseudonym of tags in the detecting process, can quickly detect all the cloned tags with a deterministic time without revealing the sensitive information. Experiments show that DCTD protocol, with less detection time and higher accuracy, outperforms the known detection protocols.

References

    1. 1)
      • 7. Zanetti, D., Capkun, S., Juels, A.: ‘Tailing RFID tags for clone detection’. Proc. Network and Distributed System Security Symposium (NDSS), San Diego, USA, February 2013, pp. 117.
    2. 2)
    3. 3)
      • 4. Burmester, M., Munilla, J.: ‘Lightweight RFID authentication with forward and backward security’, ACM Trans. Inf. Syst. Sec. (TISSEC), 2011, 14, (1), p. 11.
    4. 4)
      • 6. Lehtonen, M., Ostojic, D., Ilic, A., et al: ‘Securing RFID systems by detecting tag cloning’. Proc. Seventh Int. Conf. on Pervasive Computing, Nara, Japan, May 2009, pp. 291308.
    5. 5)
      • 1. Alomair, B., Lazos, L., Poovendran, R.: ‘Securing low-cost RFID systems: an unconditionally secure approach’, J. Comput. Secur., 2011, 19, (2), pp. 229257.
    6. 6)
    7. 7)
      • 5. Abawajy, J.: ‘Enhancing RFID tag resistance against cloning attack’. Proc. of Third IEEE Int. Conf. on Network and System Security, Queensland, Australia, October 2009, pp. 1823.
    8. 8)
      • 17. Zhang, W., Guo, Y., Tang, X., et al: ‘An efficient adaptive anticollision algorithm based on 4-ary pruning query tree’, Int. J. Distrib. Sensor Netw., 2013, 2013, pp. 17.
    9. 9)
    10. 10)
    11. 11)
    12. 12)
      • 13. Finkenzeller, K.: ‘RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication’ (Wiley & Sons Press, 2010, 1st edn.), pp. 194211.
    13. 13)
    14. 14)
      • 11. Liang, C.K., Chien, Y.C., Tsai, C.H.: ‘A pre-detection query tree tag anti-collision scheme in RFID systems’. Proc. Seventh Int. Conf. on Sensor Technologies and Applications, Barcelona, Spain, August 2013, pp. 5156.
    15. 15)
    16. 16)
    17. 17)
    18. 18)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2014.0504
Loading

Related content

content/journals/10.1049/iet-ifs.2014.0504
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address