A Probabilistic Approach for Detecting Blocking Attack in RFID Systems

被引:0
|
作者
Vahedi, Ehsan [1 ]
Shah-Mansouri, Vahid [1 ]
Wong, Vincent W. S. [1 ]
Blake, Ian F. [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V5Z 1M9, Canada
关键词
FRAMED-SLOTTED ALOHA; ANTICOLLISION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. In this paper, we study the use of blocker tags by malicious attackers which can cause the nearby readers not being able to successfully receive the reply messages from the RFID tags. We mathematically model the blocker tag attack problem using information extracted from the interrogations performed by the reader. Using this analytical framework, we propose a probabilistic blocker tag detection (P-BTD) algorithm to detect the presence of an attacker in the system. The probability of false alarm for the P-BTD algorithm is determined via simulation. Simulation results show that our proposed algorithm has a better performance than the threshold-based detection algorithm in terms of using a shorter time (i.e., fewer interrogations) to detect the presence of blocker tags.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Probabilistic Analysis of Blocking Attack in RFID Systems
    Vahedi, Ehsan
    Shah-Mansouri, Vahid
    Wong, Vincent W. S.
    Blake, Ian F.
    Ward, Rabab K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 803 - 817
  • [2] A probabilistic approach for cleaning RFID data
    Ziekow, Holger
    Ivantysynova, Lenka
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1 AND 2, 2008, : 106 - +
  • [3] A Probabilistic approach to detecting network scans
    Leckie, C
    Kotagiri, R
    NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 359 - 372
  • [4] An Approach to Solve Tracking and Message Blocking Problems in RFID
    Singh, Ajay Kant
    Dhal, Subhaish
    Sengupta, Indranil
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 1187 - 1191
  • [5] Securing RFID Systems by Detecting Tag Cloning
    Lehtonen, Mikko
    Ostojic, Daniel
    Ilic, Alexander
    Michahelles, Florian
    PERVASIVE COMPUTING, PROCEEDINGS, 2009, 5538 : 291 - +
  • [6] Supervised approach for detecting average over popular items attack in collaborative recommender systems
    Zhou, Quanqiang
    IET INFORMATION SECURITY, 2016, 10 (03) : 134 - 141
  • [7] An adaptive KPCA approach for detecting LDoS attack
    Zhang, Xiaoyu
    Wu, Zhijun
    Chen, Jiusheng
    Yue, Meng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (04)
  • [8] A novel Approach for Detecting DDoS Attack in MANET
    Gautam, Divya
    Tokekar, Vrinda
    MATERIALS TODAY-PROCEEDINGS, 2020, 29 : 674 - 677
  • [9] ACD: An Adaptable Approach for RFID Cloning Attack Detection
    Huang, Weiqing
    Zhang, Yanfang
    Feng, Yue
    SENSORS, 2020, 20 (08)
  • [10] Detecting the Network Attack Vectors on SCADA Systems
    Ramachandruni, Ram Sandesh
    Poornachandran, Prabaharan
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 707 - 712