Abstract
This paper studies a practically important problem of cloned tag detection in large-scale RFID systems where an attacker compromises genuine tags and produces their replicas, namely cloned tags, to threaten RFID applications. Although many efforts have been made to address this problem, the existing work can hardly satisfy the stringent real-time requirement, and thus cannot catch cloning attacks in a time-efficient way. Moreover, the existing work does not consider energy-efficiency, which is very critical when battery-powered active tags are used. To fill these gaps, this paper proposes a Location Polling-based Cloned tag Detection (LP-CTD) protocol by taking both time-efficiency and energy-efficiency into consideration. LP-CTD reports the existence of cloned tags when the reader finds an expected singleton slot appearing as collision one. To improve the efficiency of detecting cloned tags, only sampled tags in LP-CTD participate in the detection process. Theoretical analysis on the proposed protocol is conducted to minimize their execution time and energy consumption. Extensive simulation experiments are conducted to evaluate the performance of the proposed protocols. The results demonstrate that the proposed LP-CTD protocol considerably outperforms the latest related protocols by reducing more than 80% of the execution time, and more than 90% of the energy consumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Nemmaluri, A., Corner, M.D., Shenoy, P.: Sherlock: Automatically locating objects for humans. In: Proc. of ACM MobiSys (2008)
Kodialam, M., Nandagopal, T., Lau, W.C.: Anonymous Tracking using RFID tags. In: Proc. of IEEE INFOCOM (2007)
Matic, A., Papliatseyeu, A., Osmani, V., Mayora-Ibarra, O.: Tuning to Your Position: FM radio based Indoor Localization with Spontaneous Recalibration. In: Proc. of IEEE PerCom (2010)
Lee, C.H., Chung, C.W.: Efficient storage scheme and query processing for supply chain management using RFID. In: Proc. of ACM SIGMOD (2008)
Luo, W., Qiao, Y., Chen, S.: An Efficient Protocol for RFID Multigroup Threshold-based Classification. In: Proc. of IEEE INFOCOM (2013)
Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication. Wiley (2010)
Nath, B., Reynolds, F., Want, R.: RFID technology and applications. In: Proc. of IEEE PerCom (2006)
Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–394 (2006)
Bu, K., Liu, X., Luo, J., Xiao, B., Wei, G.: Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. IEEE Transactions on Information Forensics and Security, TIFS (2012)
Bu, K., Liu, X., Xiao, B.: Fast Cloned-Tag Identification Protocols for Large-Scale RFID Systems. In: Proc. of IEEE IWQoS (2012)
Shahzad, M., Liu, A.X.: Every Bit Counts - Fast and Scalable RFID Estimation. In: Proc. of ACM MobiCom (2012)
Luo, W., Chen, S., Li, T., Qiao, Y.: Probabilistic Missing-tag Detection and Energy-Time Tradeoff in Large-scale RFID Systems. In: Proc. of ACM MobiHoc (2012)
Tan, C.C., Sheng, B., Li, Q.: How to Monitor for Missing RFID tags. In: Proc. of IEEE ICDCS (2008)
Luo, W., Chen, S., Li, T., Chen, S.: Efficient Missing Tag Detection in RFID Systems. In: Proc. of IEEE INFOCOM (2011)
Semiconductors, P.: I-CODE Smart Label RFID Tags (January 2004), http://www.nxp.com/acrobat_download/other/identification/SL092030.pdf
Li, T., Chen, S., Ling, Y.: Identifying the Missing Tags in a Large RFID System. In: Proc. of ACM MobiHoc (2010)
Roberts, L.: ALOHA packet system with and without slots and capture. ACM SIGCOMM Computer Communication Review 5(2), 28–42 (1975)
Chlamtac, I., Petrioli, C., Redi, J.: Energy-Conserving Access Protocols for Identification Networks. IEEE/ACM Transactions on Networking 7, 51–59 (1999)
Qiao, Y., Chen, S., Li, T., Chen, S.: Energy-efficient Polling Protocols in RFID Systems. In: Proc. of ACM MobiHoc (2011)
Yue, H., Zhang, C., Pan, M., Fang, Y., Chen, S.: A Time-efficient Information Collection Protocols for Large-scale RFID Systems. In: Proc. of IEEE INFOCOM (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, X. et al. (2014). Efficient Detection of Cloned Attacks for Large-Scale RFID Systems. In: Sun, Xh., et al. Algorithms and Architectures for Parallel Processing. ICA3PP 2014. Lecture Notes in Computer Science, vol 8630. Springer, Cham. https://doi.org/10.1007/978-3-319-11197-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-11197-1_7
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11196-4
Online ISBN: 978-3-319-11197-1
eBook Packages: Computer ScienceComputer Science (R0)