Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach

被引:4
|
作者
Feng, Yue [1 ,2 ]
Huang, Weiqing [1 ,2 ]
Wang, Siye [1 ,2 ]
Zhang, Yanfang [1 ,2 ]
Jiang, Shang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Radio frequency identification (RFID); Cloning detection; Dijkstra?s algorithm; DIJKSTRA;
D O I
10.1016/j.comnet.2021.107922
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the internet of things (IoT), radio frequency identification (RFID) technology plays an important role in various fields. However, tags are vulnerable to cloning attacks because they are limited by size and production costs. A cloning attack fabricates one or more replicas of a genuine tag, which behave exactly the same as the genuine tag and can deceive the reader to obtain legitimate authorization, leading to potential economic loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks. Existing trajectory-based RFID clone detection methods use historical trajectories for model training. However, the environment of the RFID monitoring area is complex and diverse and changes in real time. The features trained based on historical trajectories cannot effectively adapt to the complex environment. In this article, we make a novel attempt to counterattack tag cloning based on real-time trajectories. We propose the clone attack detection approach (deClone), which can intuitively and accurately display the positions of abnormal tags in real time. It requires only commercial off-the-shelf (COTS) RFID devices, unlike methods based on radio frequency (RF) fingerprints and synchronization keys, which require additional hardware devices or software redesign. According to the experimental results, our scheme improves the detection precision by 16.71% compared with that of the existing trajectory-based detection methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] ACD: An Adaptable Approach for RFID Cloning Attack Detection
    Huang, Weiqing
    Zhang, Yanfang
    Feng, Yue
    SENSORS, 2020, 20 (08)
  • [32] Parallel LDPC Decoding on GPUs Using a Stream-Based Computing Approach
    Falcao, Gabriel
    Yamagiwa, Shinichi
    Silva, Vitor
    Sousa, Leonel
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, 24 (05) : 913 - 924
  • [33] Evaluating process safety at conceptual stage: A stream-based index approach
    Pelucchi, Silvia
    Carretta, Filippo
    Mocellin, Paolo
    Galli, Federico
    PROCESS SAFETY AND ENVIRONMENTAL PROTECTION, 2025, 195
  • [34] Stream-based learning through data selection in a road safety application
    Saunier, N
    Midenet, S
    Grumbach, A
    STAIRS 2004, 2004, 109 : 107 - 117
  • [35] Community-Engaged School District Design: A Stream-Based Approach
    Ozel, Aysu
    Smilowitz, Karen
    Goldstein, Lila K. S.
    OPERATIONS RESEARCH, 2025,
  • [36] DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems
    Chen, Honglong
    Ai, Xin
    Lin, Kai
    Yan, Na
    Wang, Zhibo
    Jiang, Nan
    Yu, Jiguo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 345 - 355
  • [37] Modelling and programming stream-based distributed computing based on the meta-pipeline approach
    Yamagiwa, Shinichi
    Sousa, Leonel
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2009, 24 (04) : 311 - 330
  • [38] Incremental Clustering Approach for Evolving Trajectory Data Stream
    Shein, Thi Thi
    Puntheeranurak, Sutheera
    2018 6TH INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON), 2018,
  • [39] Adaptive Stream-based Shifting Bottleneck Detection in IoT-based Computing Architectures
    Najdataei, Hannaneh
    Subramaniyan, Mukund
    Gulisano, Vincenzo
    Skoogh, Anders
    Papatriantafilou, Marina
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 993 - 1000
  • [40] An Effective Intrusion Detection Approach for Jamming Attacks on RFID Systems
    Avanco, Leandro
    Guelfi, A. E.
    Pontes, Elvis
    Silva, A. A. A.
    Kofuji, S. T.
    Zhou, F.
    2015 INTERNATIONAL EURASIP WORKSHOP ON RFID TECHNOLOGY (EURFID), 2015, : 73 - 80