Abstract
The unexpected RFID tag removal is a severe problem to RFID-based information system. It can result in erroneous asset identification, mismatched item-level information, and such security threats as impersonation or identity theft. However, only very few scholars and practitioners have ever carefully investigated this problem and managed to solve it. On the other hand, many firms are going to tag their overall assets, products, etc. with RFID tags, but they are currently either clueless about the problem or limited in the choices for solving it. This study presents a solution prototype of integrating time and ambient conditions to sense the RFID tag unexpected removal in an autonomous and secured way.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhou, W., Piramuthu, S.: Preventing ticket-switching of RFID-tagged items in apparel retail stores. Decis. Support Syst. 55, 802–810 (2013)
Zhou, W., Piramuthu, S.: Identification shrinkage in inventory management: an RFID-based solution. Ann. Oper. Res. 258, 258–300 (2015)
http://www.foxnews.com/us/2017/11/09/florida-woman-buys-walmart-electronics-worth-1800-for-3-70-police-say.html. Accessed December 2017
Frost, S.: RFID market in apparel supply chain, May 2012
DTechEx, Apparel RFID 2013–2023, June 2017
http://www.schneier.com/blog/archives/2008/10/upc-switching-s.html (2008)
http://www.schneier.com/blog/archives/2012/05/bar-code-switch.html (2012)
McMillan, R.: Tech. Exec. Built Stolen ‘Legoland’ in $2M Home. Wired, 25 May 2012
Schuman, E.: Wal-Mart Stung in $1.5 Million Bar-Code Scam. eWeek, January 5 2005
Zhou, W.: RFID and item-level information visibility. Eur. J. Oper. Res. 198(1), 252–258 (2009)
Atali, A., Lee, H., Ozer, O.: If the inventory manager knew: value of visibility and RFID under imperfect inventory information. SSRN 1351606 (2009)
Brands, S., Chaum, D.: Distance-bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48285-7_30
Hancke, G.P., Kuhn, M.G.: An RFID distance bounding protocol. In: Proceedings of the IEEE/Create-Net SecureComm, pp. 67–73 (2005)
Urien, P., Piramuthu, S.: Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks. Decis. Support Syst. 59, 28–36 (2014)
Tu, Y., Piramuthu, S.: RFID distance bounding protocols. In: 1st International EURASIP Workshop on RFID Technology, pp. 67–68 (2007)
Halevi, T., Lin, S., Ma, D., Prasad, A.K., Saxena, N., Voris, J., Xiang, T.: Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications, pp. 227–234 (2012)
Reid, J., Nieto, J.M.G., Tang, T., Senadji, B.: Detecting relay attacks with timing-based protocols. In: Proceedings of the 2nd ACM symposium on Information, Computer and Communications Security, pp. 204–213 (2007)
Kim, C.H., Avoine, G.: RFID distance bounding protocol with mixed challenges to prevent relay attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119–133. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10433-6_9
Mitrokotsa, A., Dimitrakakis, C., Peris-Lopez, P., Hernandez-Castro, J.C.: Reid et al.’s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett. 14(2), 121–123 (2010)
Ma, D., Prasad, A.K., Saxena, N., Xiang, T.: Location-aware and safer cards: enhancing RFID Security and privacy via location sensing. In: Proceedings of the ACM Conference on Wireless Network Security (WiSec), pp. 51–62 (2012)
Philipose, M., Smith, J.R., Jiang, B., Sundara-Rajan, K., Mamishev, A., Roy, S.: Battery-free wireless identification and sensing. IEEE Perv. Comput. 4(1), 37–45 (2005)
Halevi, T., et al.: Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications, pp. 227–234 (2012)
Czeskis, A., Koscher, K., Smith, J.R., Kohno, T.: RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 479–490 (2008)
Shu, Y., Gu, Y., Chen, J.: Sensor-data-enhanced authentication for RFID-based access control systems. In: Proceedings of the IEEE Mobile Ad Hoc Sensor Systems (MASS), pp. 236–244 (2012)
Cazecaa, M.J., Meada, J., Chenb, J., Nagarajana, R.: Passive wireless displacement sensor based on technology. Sens. Actuators A: Phys. 190, 197–202 (2013)
Paggi, C., Occhiuzzi, C., Marrocco, G.: Sub-millimeter, displacement sensing by passive UHF RFID antennas. IEEE Trans. Antennas Propagation 62, 905–912 (2014)
Tu, Y., Zhou, W., Piramuthu, S.: A novel means to address RFID tag/item separation in supply chains. Decis. Support Syst. 115, 13–23 (2018)
Taghvaeeyan, S., Rajamani, R.: Nature-inspired position determination using inherent magnetic fields. Technology 2(2), 161–170 (2014)
Avoine, G., Mauw, S., Trujillo-Rasua, R.: Comparing distance bounding protocols: a critical mission supported by decision theory. Comput. Commun. 67(1), 92–102 (2015)
Gurulian, I., Akram, R.N., Markantonakis, K., Mayes, K.: Preventing relay attacks in mobile transactions using infrared light. In: Proceedings of the Symposium on Applied Computing, SAC 2017, pp. 1724–1731. ACM, New York (2017)
Gurulian, I., Markantonakis, K., Frank, E., Akram, R.: Good vibrations: artificial ambience-based relay attack detection. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 481–489 (2018)
Tu, Y.-J., Piramuthu, S.: Lightweight non-distance-bounding means to address RFID relay attacks. Decis. Support Syst. 102, 12–21 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Tu, Y. (2019). An Investigation of Using Time and Ambient Conditions to Sense the Unexpected Removal of RFID Tag. In: Doss, R., Piramuthu, S., Zhou, W. (eds) Future Network Systems and Security. FNSS 2019. Communications in Computer and Information Science, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-34353-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-34353-8_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34352-1
Online ISBN: 978-3-030-34353-8
eBook Packages: Computer ScienceComputer Science (R0)