Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 8356983, 9 pages
Research Article

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

1Taiyuan University of Technology, Taiyuan, China
2Taiyuan Normal University, Taiyuan, China
3Tsinghua University, Beijing, China
4Hong Kong University of Science and Technology, New Territories, Hong Kong

Correspondence should be addressed to Ju-min Zhao; nc.ude.tuyt@nimujoahz

Received 14 July 2016; Revised 26 January 2017; Accepted 8 March 2017; Published 27 April 2017

Academic Editor: Kai Rannenberg

Copyright © 2017 Ju-min Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Radio Frequency Identification (RFID) is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP) to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.