Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach

被引:4
|
作者
Feng, Yue [1 ,2 ]
Huang, Weiqing [1 ,2 ]
Wang, Siye [1 ,2 ]
Zhang, Yanfang [1 ,2 ]
Jiang, Shang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
关键词
Radio frequency identification (RFID); Cloning detection; Dijkstra?s algorithm; DIJKSTRA;
D O I
10.1016/j.comnet.2021.107922
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the internet of things (IoT), radio frequency identification (RFID) technology plays an important role in various fields. However, tags are vulnerable to cloning attacks because they are limited by size and production costs. A cloning attack fabricates one or more replicas of a genuine tag, which behave exactly the same as the genuine tag and can deceive the reader to obtain legitimate authorization, leading to potential economic loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks. Existing trajectory-based RFID clone detection methods use historical trajectories for model training. However, the environment of the RFID monitoring area is complex and diverse and changes in real time. The features trained based on historical trajectories cannot effectively adapt to the complex environment. In this article, we make a novel attempt to counterattack tag cloning based on real-time trajectories. We propose the clone attack detection approach (deClone), which can intuitively and accurately display the positions of abnormal tags in real time. It requires only commercial off-the-shelf (COTS) RFID devices, unlike methods based on radio frequency (RF) fingerprints and synchronization keys, which require additional hardware devices or software redesign. According to the experimental results, our scheme improves the detection precision by 16.71% compared with that of the existing trajectory-based detection methods.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Handover detection approach based on trajectory data mining techniques
    Han, Nan
    Qiao, Shaojie
    Liu, Dunhu
    Ding, Peng
    Zhang, Yongqing
    Xiong, Xi
    Wang, Mengran
    Gutierrez, Louis Alberto
    JOURNAL OF ENGINEERING-JOE, 2018, (16): : 1534 - 1537
  • [42] Application of a stream-based SAR-Backprojection approach for automotive environment perception
    Gisder, Thomas
    Harrer, Fabian
    Biebl, Erwin
    2018 19TH INTERNATIONAL RADAR SYMPOSIUM (IRS), 2018,
  • [43] Architectural Design Of Data Stream-Based Big Data Real-Time Analysis System
    Liu, Qiang
    Lv, Junmin
    Yuan, Xun
    Luo, Renyi
    Lv, Dekui
    PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 153 - 156
  • [44] A Stream-Based Semi-Supervised Active Learning Approach for Document Classification
    Bouguelia, Mohamed-Rafik
    Belaid, Yolande
    Belaid, Abdel
    2013 12TH INTERNATIONAL CONFERENCE ON DOCUMENT ANALYSIS AND RECOGNITION (ICDAR), 2013, : 611 - 615
  • [45] Large-Scale DNA Sequence Analysis in the Cloud: A Stream-Based Approach
    Kienzler, Romeo
    Bruggmann, Remy
    Ranganathan, Anand
    Tatbul, Nesime
    EURO-PAR 2011: PARALLEL PROCESSING WORKSHOPS, PT II, 2012, 7156 : 467 - 476
  • [46] Stream-based live entity resolution approach with adaptive duplicate count strategy
    Ma, Kun
    Yang, Bo
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2017, 13 (03) : 351 - 373
  • [47] Expiring Decisions for Stream-based Data Access in a Declarative Privacy Policy Framework
    Martiny, Karsten
    Denker, Grit
    MPS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON MULTIMEDIA PRIVACY AND SECURITY, 2018, : 71 - 80
  • [48] Semantic-Aware Clustering-based Approach of Trajectory Data Stream Mining
    Tasnim, Samia
    Caldas, Juan
    Pissinou, Niki
    Iyengar, S. S.
    Ding, Ziqian
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 88 - 92
  • [49] Comparison of stream-based fiction text classification methods based on data compression and counting substrings
    Ashurov, Mihail F.
    VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2014, 29 (04): : 16 - 22
  • [50] A Stream-Based Architecture for the Management and On-Line Analysis of Unbounded Amounts of Simulation Data
    Schuetzel, Johannes
    Meyer, Holger
    Uhrmacher, Adelinde M.
    SIGSIM-PADS'14: PROCEEDINGS OF THE 2014 ACM CONFERENCE ON SIGSIM PRINCIPLES OF ADVANCED DISCRETE SIMULATION, 2014, : 83 - 94