© The Institution of Engineering and Technology
Tag cloning attack is a serious threat to the radio-frequency identification (RFID) applications. Cloned tags detection is an effective security mechanism to prevent the attacks. To improve the accuracy and efficiency of detection for cloned tags, this study presents a deterministic cloned tags detection (DCTD) protocol for anonymous RFID systems to detect cloned tags, using a tree-based anti-collision algorithm to find irreconcilable collisions. This protocol, which uses the pseudonym of tags in the detecting process, can quickly detect all the cloned tags with a deterministic time without revealing the sensitive information. Experiments show that DCTD protocol, with less detection time and higher accuracy, outperforms the known detection protocols.
References
-
-
1)
-
7. Zanetti, D., Capkun, S., Juels, A.: ‘Tailing RFID tags for clone detection’. Proc. Network and Distributed System Security Symposium (NDSS), San Diego, USA, February 2013, pp. 1–17.
-
2)
-
8. Bu, K., Liu, X., Xiao, B.: ‘Approaching the time lower bound on cloned-tag identification for large RFID systems’, Ad Hoc Netw., 2014, 13, pp. 271–281 (doi: 10.1016/j.adhoc.2013.08.011).
-
3)
-
4. Burmester, M., Munilla, J.: ‘Lightweight RFID authentication with forward and backward security’, ACM Trans. Inf. Syst. Sec. (TISSEC), 2011, 14, (1), p. 11.
-
4)
-
6. Lehtonen, M., Ostojic, D., Ilic, A., et al: ‘Securing RFID systems by detecting tag cloning’. Proc. Seventh Int. Conf. on Pervasive Computing, Nara, Japan, May 2009, pp. 291–308.
-
5)
-
1. Alomair, B., Lazos, L., Poovendran, R.: ‘Securing low-cost RFID systems: an unconditionally secure approach’, J. Comput. Secur., 2011, 19, (2), pp. 229–257.
-
6)
-
2. Juels, A.: ‘RFID security and privacy: a research survey’, IEEE J. Sel. Areas Commun., 2006, 24, (2), pp. 381–394 (doi: 10.1109/JSAC.2005.861395).
-
7)
-
5. Abawajy, J.: ‘Enhancing RFID tag resistance against cloning attack’. Proc. of Third IEEE Int. Conf. on Network and System Security, Queensland, Australia, October 2009, pp. 18–23.
-
8)
-
17. Zhang, W., Guo, Y., Tang, X., et al: ‘An efficient adaptive anticollision algorithm based on 4-ary pruning query tree’, Int. J. Distrib. Sensor Netw., 2013, 2013, pp. 1–7.
-
9)
-
16. Shin, J., Jeon, B., Yang, D.: ‘Multiple RFID tags identification with m-ary query tree scheme’, IEEE Commun. Lett., 2013, 17, (3), pp. 604–607 (doi: 10.1109/LCOMM.2013.012313.122094).
-
10)
-
15. Jia, X.L., Feng, Q.Y.: ‘An improved anti-collision protocol for radio frequency identification tag’, Int. J. Commun. Syst., 2015, 28, (3), pp. 401–413 (doi: 10.1002/dac.2629).
-
11)
-
14. Jia, X., Feng, Q., Yu, L.: ‘Stability analysis of an efficient anti-collision protocol for RFID tag identification’, IEEE Trans. Commun., 2012, 60, (8), pp. 2285–2294 (doi: 10.1109/TCOMM.2012.051512.110448).
-
12)
-
13. Finkenzeller, K.: ‘RFID handbook: fundamentals and applications in contactless smart cards, radio frequency identification and near-field communication’ (Wiley & Sons Press, 2010, 1st edn.), pp. 194–211.
-
13)
-
3. Bu, K., Liu, X., Luo, J., et al: ‘Unreconciled collisions uncover cloning attacks in anonymous RFID systems’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (3), pp. 429–439 (doi: 10.1109/TIFS.2012.2237395).
-
14)
-
11. Liang, C.K., Chien, Y.C., Tsai, C.H.: ‘A pre-detection query tree tag anti-collision scheme in RFID systems’. Proc. Seventh Int. Conf. on Sensor Technologies and Applications, Barcelona, Spain, August 2013, pp. 51–56.
-
15)
-
10. Shih, D.H., Sun, P.L., Yen, D.C., et al: ‘Taxonomy and survey of RFID anti-collision protocols’, Comput. Commun., 2006, 29, (11), pp. 2150–2166 (doi: 10.1016/j.comcom.2005.12.011).
-
16)
-
12. Alomair, B., Clark, A., Cuellar, J., et al: ‘Scalable RFID systems: a privacy-preserving protocol with constant-time identification’, IEEE Trans. Parallel Distrib. Syst., 2012, 23, (8), pp. 1536–1550 (doi: 10.1109/TPDS.2011.290).
-
17)
-
9. Park, J., Chung, M.Y., Lee, T.J.: ‘Identification of RFID tags in framed-slotted ALOHA with robust estimation and binary selection’, IEEE Commun. Lett., 2007, 11, (5), pp. 452–454 (doi: 10.1109/LCOMM.2007.061581).
-
18)
-
18. Wu, H., Zeng, Y., Feng, J., et al: ‘Binary tree slotted ALOHA for passive RFID tag anticollision’, IEEE Trans. Parallel Distrib. Syst., 2013, 24, (1), pp. 19–31 (doi: 10.1109/TPDS.2012.120).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2014.0504
Related content
content/journals/10.1049/iet-ifs.2014.0504
pub_keyword,iet_inspecKeyword,pub_concept
6
6