Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach

被引:4
|
作者
Feng, Yue [1 ,2 ]
Huang, Weiqing [1 ,2 ]
Wang, Siye [1 ,2 ]
Zhang, Yanfang [1 ,2 ]
Jiang, Shang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Radio frequency identification (RFID); Cloning detection; Dijkstra?s algorithm; DIJKSTRA;
D O I
10.1016/j.comnet.2021.107922
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the internet of things (IoT), radio frequency identification (RFID) technology plays an important role in various fields. However, tags are vulnerable to cloning attacks because they are limited by size and production costs. A cloning attack fabricates one or more replicas of a genuine tag, which behave exactly the same as the genuine tag and can deceive the reader to obtain legitimate authorization, leading to potential economic loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks. Existing trajectory-based RFID clone detection methods use historical trajectories for model training. However, the environment of the RFID monitoring area is complex and diverse and changes in real time. The features trained based on historical trajectories cannot effectively adapt to the complex environment. In this article, we make a novel attempt to counterattack tag cloning based on real-time trajectories. We propose the clone attack detection approach (deClone), which can intuitively and accurately display the positions of abnormal tags in real time. It requires only commercial off-the-shelf (COTS) RFID devices, unlike methods based on radio frequency (RF) fingerprints and synchronization keys, which require additional hardware devices or software redesign. According to the experimental results, our scheme improves the detection precision by 16.71% compared with that of the existing trajectory-based detection methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A data stream-based approach for anomaly detection in surveillance videos
    Aydogdu, Ozge
    Ekinci, Murat
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (21) : 60213 - 60241
  • [2] Data Is a Stream: Security of Stream-Based Channels
    Fischlin, Marc
    Guenther, Felix
    Marson, Giorgia Azzurra
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 545 - 564
  • [3] Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection
    Feng, Yue
    Huang, Weiqing
    Wang, Siye
    Zhang, Yanfang
    Jiang, Shang
    Cao, Ziwen
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2022, PT II, 2022, 461 : 75 - 90
  • [4] Stream-Based Extreme Learning Machine Approach for Big Data Problems
    Horta, Euler Guimaraes
    de Castro, Cristiano Leite
    Braga, Antonio Padua
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [5] Stream-based live data replication approach of in-memory cache
    Ma, Kun
    Yang, Bo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (11):
  • [6] An Approach to Spatiotemporal Trajectory Clustering Based on Community Detection
    Wang, Xin
    Niu, Xinzheng
    Zhu, Jiahui
    Liu, Zuoyan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [7] Stream-Based Active Unusual Event Detection
    Loy, Chen Change
    Xiang, Tao
    Gong, Shaogang
    COMPUTER VISION-ACCV 2010, PT I, 2011, 6492 : 161 - 175
  • [8] Deterministic Detection of Cloning Attacks for Anonymous RFID Systems
    Bu, Kai
    Xu, Mingjie
    Liu, Xuan
    Luo, Jiaqing
    Zhang, Shigeng
    Weng, Minyu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) : 1255 - 1266
  • [9] Applying One-Class Algorithms for Data Stream-Based Insider Threat Detection
    Peccatiello, Rafael Bruno
    Gondim, Joao Jose Costa
    Garcia, Luis Paulo Faina
    IEEE ACCESS, 2023, 11 : 70560 - 70573
  • [10] A traffic monitoring stream-based real-time vehicular offence detection approach
    Liu, Ying
    Ou, Guoyu
    JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 22 (01) : 53 - 64