Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 8356983, 9 pages
https://doi.org/10.1155/2017/8356983
Research Article

Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

1Taiyuan University of Technology, Taiyuan, China
2Taiyuan Normal University, Taiyuan, China
3Tsinghua University, Beijing, China
4Hong Kong University of Science and Technology, New Territories, Hong Kong

Correspondence should be addressed to Ju-min Zhao; nc.ude.tuyt@nimujoahz

Received 14 July 2016; Revised 26 January 2017; Accepted 8 March 2017; Published 27 April 2017

Academic Editor: Kai Rannenberg

Copyright © 2017 Ju-min Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. EPC class-1 generation-2 RFID protocol, V. 1. 0, http://www.gs1.org/sites/default/files/docs/epc/uhfc1g2_1_2_0-standard-20080511.pdf.
  2. Philips Semiconductors, I-CODE Smart Label RFID Tags, http://www.semiconductors.philips.com/.
  3. Y. Zheng and M. Li, “Fast tag searching protocol for large-scale RFID systems,” IEEE/ACM Transactions on Networking, vol. 21, no. 3, pp. 924–934, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. D. Delen, B. C. Hardgrave, and R. Sharda, “RFID for better supply-chain management through enhanced information visibility,” Production and Operations Management, vol. 16, no. 5, pp. 613–624, 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. B. D. Janz, M. G. Pitts, and R. F. Otondo, “Information systems and health care-II: back to the future with RFID: lessons learned-some old, some new,” Communications of the Association for Information Systems, vol. 15, no. 1, article 7, 2005. View at Google Scholar
  6. M. Lehtonen, D. Ostojic, A. Ilic et al., in Securing RFID systems by detecting tag cloning/Pervasive Computing, pp. 291–308, Springer, Berlin Heidelberg, Germany, 2009.
  7. S. Spiekermann and S. Evdokimov, “Privacy enhancing technologies for RFID-a critical state-of-the-art report,” IEEE Security and Privacy, vol. 7, no. 2, pp. 56–62, 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. http://www.tldm.org/news4/markofthebeast.htm.
  9. M. Lehtonen, F. Michahelles, and E. Fleisch, “How to detect cloned tags in a reliable way from incomplete RFID traces,” in Proceedings of the IEEE International Conference on RFID (RFID '09), pp. 257–264, Atlanta, GA, USA, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. D. Zanetti, L. Fellmann, and S. Capkun, “Privacy-preserving clone detection for RFID-enabled supply chains,” in 4th Annual IEEE International Conference on RFID, RFID 2010, pp. 37–44, usa, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Bu, X. Liu, J. Luo, B. Xiao, and G. Wei, “Unreconciled collisions uncover cloning attacks in anonymous RFID systems,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 3, pp. 429–439, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. A. Ruhanen, M. Hanhikorpi, F. Bertuccelli et al., Sensorenabled RFID Tag Handbook, IST-2005-033546, BRIDGE, 2008.
  13. D. Feng, Research on Time-Efficient Cloning Attacks Identification in Large Scale RFID Systems, Taiyuan University of Technology, 2014.
  14. H. Vogt, “Efficient object identification with passive RFID tags,” in Pervasive Computing, vol. 2414 of Lecture Notes in Computer Science, pp. 98–113, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar
  15. R. Zhang, Y. Liu, Y. Zhang, and J. Sun, “Fast identification of the missing tags in a large RFID system,” in Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '11), pp. 277–286, Salt Lake City, Utah, USA, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Chen, M. Zhang, and B. Xiao, “Efficient information collection protocols for sensor-augmented RFID networks,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '11), pp. 3101–3109, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Myung and W. Lee, “Adaptive splitting protocols for RFID tag collision arbitration,” in Proceedings of the ACM Mobile Ad Hoc, 2006.
  18. T. F. La Porta, G. Maselli, and C. Petrioli, “Anticollision protocols for single-reader RFID systems: temporal analysis and optimization,” IEEE Transactions on Mobile Computing, vol. 10, no. 2, pp. 267–279, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Abawajy, “Enhancing RFID tag resistance against cloning attack,” in Proceedings of the 3rd International Conference on Network and System Security (NSS'09), pp. 18–23, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. T. Dimitriou, “A lightweight RFID protocol to protect against traceability and cloning attacks,” in Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm'05), pp. 59–66, Greece, September 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. C. Tan, B. Sheng, and Q. Li, “Secure and serverless RFID authentication and search protocols,” IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1400–1407, 2008. View at Google Scholar
  22. A. Juels, “Minimalist cryptography for low-cost RFID tags,” Security in Communication Networks, pp. 149–164, 2005. View at Google Scholar
  23. J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, “Mutual authentication protocol for low-cost RFID,” in Proceedings of the ECRYPT Workshop on RFID and Lightweight Crypto, 2005.
  24. L. Mirowski and J. Hartnett, “Deckard, a system to detect change of RFID tag ownership,” International Journal of Computer Science and Network Security, vol. 7, no. 7, pp. 89–98, 2007. View at Google Scholar
  25. R. Koh, E. W. Schuster, I. Chackrabarti, and A. Bellman, “Securing the Pharmaceutical Supply Chain,” White Paper, Auto-ID Labs, Massachusetts Institute of Technology, 2003. View at Google Scholar
  26. T. Li, S. Chen, and Y. Ling, “Identifying the missing tags in a large RFID system,” in Proceedings of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '10), pp. 1–10, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,” Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970. View at Publisher · View at Google Scholar · View at Scopus
  28. H. Yue, C. Zhang, M. Pan, Y. Fang, and S. Chen, “A time-efficient information collection protocol for large-scale RFID systems,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM'12), pp. 2158–2166, Atlanta, GA, USA, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  29. Y. Zheng and M. Li, “P-MTI: physical-layer missing tag identification via compressive sensing,” in Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM '13), pp. 917–925, April 2013. View at Publisher · View at Google Scholar · View at Scopus