skip to main content
10.1145/2987386.2987397acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
research-article

Intrusion Detection System based on Complex Event Processing in RFID middleware

Authors Info & Claims
Published:11 October 2016Publication History

ABSTRACT

Radio Frequency Identification (RFID) technology has been applied in many fields, such as tracking product through the supply chains, electronic passport (ePassport), proximity card, etc. Most companies will choose low-cost RFID tags. However, these RFID tags are almost no security mechanism so that criminals can easily clone these tags and get the user permissions. In this paper, we aim at more efficient detection proximity card be cloned and design a real-time intrusion detection system based on one tool of Complex Event Processing (Esper) in the RFID middleware. We will detect the cloned tags through training our system with the user's habits. When detected anomalous behavior which may clone tags have occurred, and then send the notification to user. We discuss the reliability of this intrusion detection system and describes in detail how to work.

References

  1. S. Garfinkel and H. Holtzman. Understanding rfid technology. RFID, pages 15--36, 2006.Google ScholarGoogle Scholar
  2. J.-h. Guo, H.-d. Yang, and F.-q. Deng. Intrusion detection model for rfid system based on immune network. Journal of Computer Applications, 28(10):2481--2484, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  3. N. Mehdiyev, J. Krumeich, D. Enke, D. Werth, and P. Loos. Determination of rule patterns in complex event processing using machine learning techniques. Procedia Computer Science, 61:395--401, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  4. L. Mirowski and J. Hartnett. Deckard: A system to detect change of rfid tag ownership. International Journal of Computer Science and Network Security, 7(7):89--98, 2007.Google ScholarGoogle Scholar
  5. R. Oh and J. Park. A development of active monitoring system for intelligent rfid logistics processing environment. In Advanced Language Processing and Web Information Technology, 2008. ALPIT'08. International Conference on, pages 358--361. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Ranasinghe, D. Engels, and P. Cole. Low-cost rfid systems: Confronting security and privacy. In Auto-ID labs research workshop, pages 54--77. Citeseer, 2004.Google ScholarGoogle Scholar
  7. S. Sarma. Towards the 5 cent tag. Auto-ID Center, 2001.Google ScholarGoogle Scholar
  8. J. Schuermann. Information technology--radio frequency identification (rfid) and the world of radio regulations. ISO Bulletin, pages 3--4, 2000.Google ScholarGoogle Scholar
  9. H. YANG, C. LI, and J. HU. Rfid intrusion detection with possibilistic fuzzy c-means clustering. Journal of Computational Information Systems, 6(8):2623--2632, 2010.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    RACS '16: Proceedings of the International Conference on Research in Adaptive and Convergent Systems
    October 2016
    266 pages
    ISBN:9781450344555
    DOI:10.1145/2987386

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 11 October 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    RACS '16 Paper Acceptance Rate40of161submissions,25%Overall Acceptance Rate393of1,581submissions,25%
  • Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader