Skip to main content

An Improved Anti-collision Algorithm for ISO15693 RFID Systems

  • Conference paper
Cyberspace Safety and Security (CSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7672))

Included in the following conference series:

  • 2464 Accesses

Abstract

The Radio Frequency Identification (RFID) is an important technology of the Internet of Things. Along with the rapid growth of the RFID technology, security issues have acquired much attention recently. However, most of the RFID security works focus on fake identity or information leaking problems. Researchers seldom care about the security of system mechanism, such as media access control. This paper focuses on the anti-collision mechanism of ISO15693. We analyze the 16-slot anti-collision in ISO15693 in detail, demonstrate access vulnerability, present a potential attack approach of similar-tags collision and validate the attack efficiency through simulation. Afterwards, an improved anti-collision paradigm is proposed to mitigate the similar-tags attack. The empirical study shows that the improved anti-collision tactic is much more efficient than that in ISO15693.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atzoria, L., Ierab, A., Morabitoc, G.: The Internet of Things: A survey. Computer Networks 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  2. Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–393 (2006)

    Article  MathSciNet  Google Scholar 

  3. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Google Scholar 

  4. Mitrokotsa, A., Rieback, M., Tanenbaum, A.: Classifying RFID attacks and defenses. Information Systems Frontiers 12(5), 491–505 (2009)

    Article  Google Scholar 

  5. Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. In: Pervasive Computing & Communications Workshops, pp. 149–153 (2004)

    Google Scholar 

  7. Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Lee, S.M., Hwang, Y.J., Lee, D.-H., Lim, J.-I.: Efficient Authentication for Low-Cost RFID Systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Saito, J., Ryou, J.-C., Sakurai, K.: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Domdouzis, K., Kumar, B., Anumba, C.: Radio-Frequency Identification (RFID) applications: A brief introduction. Advanced Engineering Informatics 21, 350–355 (2007)

    Article  Google Scholar 

  12. David, N., Stephon, V.: Multi-access fading channels Part 1: Polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transaction on Information Theory 44(7), 2796–2815 (1998)

    Article  Google Scholar 

  13. Jamil, Y., Li, Y.: Block reservation time division multiple access protocol for a high capacity wireless network. International Journal of Wireless Information Networks 7(4), 211–220 (2000)

    Article  Google Scholar 

  14. Myung, J., Lee, W.: An adaptive memoryless tag anti-collision protocol for RFID networks. In: IEEE INFOCOM 2005, Poster Session, pp. 1096–1101 (2005)

    Google Scholar 

  15. Ali, K., Hassanein, H., Taha, A.: RFID anti-collision protocol for dense passive tag environments, pp. 819–824. IEEE Computer Society (2007)

    Google Scholar 

  16. Jiang, L., Lu, G., Xin, Y.: Research on anti-collision algorithm in radio frequency identification system. Computer Engineering and Applications 15, 29–32 (2007)

    Google Scholar 

  17. Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons (2003)

    Google Scholar 

  18. Shih, D., Sun, P., Yen, D., Huang, S.: Taxonomy and survey of RFID anti-collision protocols. Computer Communication 11(29), 2150–2166 (2006)

    Article  Google Scholar 

  19. Law, C., Lee, K., Siu, K.: Efficient memory-less protocol for tag identification. In: Proc. 4th International Workshop on DIALM, pp. 75–84 (2000)

    Google Scholar 

  20. Du, H., Xu, K., Wang, W.: An anti-collision algorithm based on binary-tree searching of backtracking. Journal of Yunnan University 28, 133–136 (2006)

    Google Scholar 

  21. Shi, X., Huang, Q., Wei, F.: An enhanced binary anti-collision algorithm of backtracking in RFID system. Progress In Electromagnetics Research B 4, 263–271 (2008)

    Article  Google Scholar 

  22. Jacomet, M., Ehrsam, A., Gehrig, U.: Contactless identification device with anticollision algorithm. In: Proceedings of the IEEE Conference on Circuits, Systems, Computer and Communications, pp. 75–84 (2000)

    Google Scholar 

  23. Juels, A., Rivest, R., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Conference on Computer and Communications Security, pp. 27–30 (2003)

    Google Scholar 

  24. Choi, H., Cha, J., Kim, J.: Fast wireless anti-collision algorithm in ubiquitous id system. In: Proc. of the 60th IEEE Vehicular Technology Conference, pp. 4589–4592 (2004)

    Google Scholar 

  25. Alsalih, W., Ali, K., Hassanein, H.: Optimal distance-based clustering for tag anti-collision in RFID systems. In: Proc. of 33rd IEEE Conference on Local Computer Networks (LCN), pp. 266–273 (2008)

    Google Scholar 

  26. Kim, S., Shin, M., Park, P.: A new tree-based tag anticollision protocol for RFID systems. In: Proc. of the 2006 International Conference on Communications in Computing, pp. 83–86 (2006)

    Google Scholar 

  27. Zhou, F., Jin, D., Huang, C., Min, H.: Optimize the power consumption of passive electronic tags for anti-collision schemes. In: Proc. of the 5th ASICON, pp. 1213–1217 (2003)

    Google Scholar 

  28. Zhou, F., Chen, C., Jin, D., Huang, C., Min, H.: Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems. In: ISLPED 2004: Proc. of the 2004 International Symposium on Low Power Electronics and Design, pp. 357–362 (2004)

    Google Scholar 

  29. Liu, L., Xie, Z., Xi, J., Lai, S.: An improved anti-collision algorithm in RFID system. In: Proc. of 2nd International Conference on Mobile Technology, Applications and System, pp. 1–5 (2005)

    Google Scholar 

  30. Law, C., Lee, K., Siu, K.: Scanning-based pre-processing for enhanced RFID tag anti-collision protocols. In: ISCIT 2006: Proc. of the 2006 International Symposium on Communications and Information Technologies, pp. 75–84 (2006)

    Google Scholar 

  31. Zhao, L., Zhou, C.: An anti-collision Arithmetic based on ISO15693 protocol and its realization. Microcomputer Information 24, 170–172 (2008)

    Google Scholar 

  32. International Standards Organization. ISO/IEC 15693-2: Identification cards-Contactless integrated crcuit(s) cards-Vicinity cards-Part2: Air interface and initialization (2000)

    Google Scholar 

  33. International Standards Organization. ISO/IEC 15693-3: Identification cards-Contactless integrated crcuit(s) cards-Vicinity cards-Part 3: Anticollision and transmission protocol (2000)

    Google Scholar 

  34. Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. IEEE Security and Privacy for Emerging Areas in Communications, Networks, 59–66 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, L., Wang, X., Fu, W., Liu, X., Qin, Z. (2012). An Improved Anti-collision Algorithm for ISO15693 RFID Systems. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35362-8_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35361-1

  • Online ISBN: 978-3-642-35362-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics