A Probabilistic Approach for Detecting Blocking Attack in RFID Systems

被引:0
|
作者
Vahedi, Ehsan [1 ]
Shah-Mansouri, Vahid [1 ]
Wong, Vincent W. S. [1 ]
Blake, Ian F. [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V5Z 1M9, Canada
关键词
FRAMED-SLOTTED ALOHA; ANTICOLLISION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. In this paper, we study the use of blocker tags by malicious attackers which can cause the nearby readers not being able to successfully receive the reply messages from the RFID tags. We mathematically model the blocker tag attack problem using information extracted from the interrogations performed by the reader. Using this analytical framework, we propose a probabilistic blocker tag detection (P-BTD) algorithm to detect the presence of an attacker in the system. The probability of false alarm for the P-BTD algorithm is determined via simulation. Simulation results show that our proposed algorithm has a better performance than the threshold-based detection algorithm in terms of using a shorter time (i.e., fewer interrogations) to detect the presence of blocker tags.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Simple and Effective Attack Against an Authenticaion Protocol for RFID Systems
    Yang, Yuanyuan
    Yu, You
    Lu, Zhen
    Gu, Jian
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1052 - 1055
  • [22] Detecting Clocking Attack in Contactless Access Control Systems
    Tian, Guixiang
    Lu, Li
    Hussain, Muhammad Jawad
    2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2017, : 285 - 290
  • [23] Probabilistic Approach for Recommendation Systems
    Abdalla, Nada
    Forthomme, Damien
    2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, : 629 - 634
  • [24] Probabilistic approach to detecting dependencies between data sets
    Klami, Arto
    Kaski, Samuel
    NEUROCOMPUTING, 2008, 72 (1-3) : 39 - 46
  • [25] Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems
    Chen, Honglong
    Ma, Guolei
    Wang, Zhibo
    Xia, Feng
    Yu, Jiguo
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (12) : 11295 - 11305
  • [26] An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
    Xiong, Qi
    Liang, Ying-Chang
    Li, Kwok Hung
    Gong, Yi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 932 - 940
  • [27] A systematic approach for the reliability of RFID systems
    Inoue, S
    Hagiwara, D
    Yasuura, H
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B183 - B186
  • [28] Fast and Reliable Tag Search in Large-Scale RFID Systems: A Probabilistic Tree-based Approach
    Yu, Jihong
    Gong, Wei
    Liu, Jiangchuan
    Chen, Lin
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1133 - 1141
  • [29] Exploring Attack Graphs for Security Risk Assessment: A Probabilistic Approach
    GAO Ni
    HE Yiyue
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (02) : 171 - 177
  • [30] An attack-norm separation approach for detecting cyber attacks
    Nong Ye
    Toni Farley
    Deepak Lakshminarasimhan
    Information Systems Frontiers, 2006, 8 : 163 - 177