ABSTRACT
Radio Frequency Identification (RFID) technology has been applied in many fields, such as tracking product through the supply chains, electronic passport (ePassport), proximity card, etc. Most companies will choose low-cost RFID tags. However, these RFID tags are almost no security mechanism so that criminals can easily clone these tags and get the user permissions. In this paper, we aim at more efficient detection proximity card be cloned and design a real-time intrusion detection system based on one tool of Complex Event Processing (Esper) in the RFID middleware. We will detect the cloned tags through training our system with the user's habits. When detected anomalous behavior which may clone tags have occurred, and then send the notification to user. We discuss the reliability of this intrusion detection system and describes in detail how to work.
- S. Garfinkel and H. Holtzman. Understanding rfid technology. RFID, pages 15--36, 2006.Google Scholar
- J.-h. Guo, H.-d. Yang, and F.-q. Deng. Intrusion detection model for rfid system based on immune network. Journal of Computer Applications, 28(10):2481--2484, 2008.Google ScholarCross Ref
- N. Mehdiyev, J. Krumeich, D. Enke, D. Werth, and P. Loos. Determination of rule patterns in complex event processing using machine learning techniques. Procedia Computer Science, 61:395--401, 2015.Google ScholarCross Ref
- L. Mirowski and J. Hartnett. Deckard: A system to detect change of rfid tag ownership. International Journal of Computer Science and Network Security, 7(7):89--98, 2007.Google Scholar
- R. Oh and J. Park. A development of active monitoring system for intelligent rfid logistics processing environment. In Advanced Language Processing and Web Information Technology, 2008. ALPIT'08. International Conference on, pages 358--361. IEEE, 2008. Google ScholarDigital Library
- D. Ranasinghe, D. Engels, and P. Cole. Low-cost rfid systems: Confronting security and privacy. In Auto-ID labs research workshop, pages 54--77. Citeseer, 2004.Google Scholar
- S. Sarma. Towards the 5 cent tag. Auto-ID Center, 2001.Google Scholar
- J. Schuermann. Information technology--radio frequency identification (rfid) and the world of radio regulations. ISO Bulletin, pages 3--4, 2000.Google Scholar
- H. YANG, C. LI, and J. HU. Rfid intrusion detection with possibilistic fuzzy c-means clustering. Journal of Computational Information Systems, 6(8):2623--2632, 2010.Google Scholar
Recommendations
Complex RFID event processing
Advances of sensor and radio frequency identification (RFID) technology provide significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identification of objects with unique IDs without ...
An OSGi Based RFID Complex Event Processing System
EUC '10: Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous ComputingThe increasingly wide range of RFID applications and the characteristics of RFID data, such as massive, continuous, require RFID middleware to provide efficient, real-time data processing capability, and to support to extract meaningful complex event ...
RFID system with fairness within the framework of security and privacy
ESAS'05: Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor NetworksRadio Frequency Identification (RFID) systems are expected to be widely deployed in automated identification and supply-chain applications. Although RFID systems have several advantages, the technology may also create new threats to user privacy. In ...
Comments