A Probabilistic Approach for Detecting Blocking Attack in RFID Systems

被引:0
|
作者
Vahedi, Ehsan [1 ]
Shah-Mansouri, Vahid [1 ]
Wong, Vincent W. S. [1 ]
Blake, Ian F. [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V5Z 1M9, Canada
关键词
FRAMED-SLOTTED ALOHA; ANTICOLLISION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. In this paper, we study the use of blocker tags by malicious attackers which can cause the nearby readers not being able to successfully receive the reply messages from the RFID tags. We mathematically model the blocker tag attack problem using information extracted from the interrogations performed by the reader. Using this analytical framework, we propose a probabilistic blocker tag detection (P-BTD) algorithm to detect the presence of an attacker in the system. The probability of false alarm for the P-BTD algorithm is determined via simulation. Simulation results show that our proposed algorithm has a better performance than the threshold-based detection algorithm in terms of using a shorter time (i.e., fewer interrogations) to detect the presence of blocker tags.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A Novel Security Approach for Detecting Black Hole Attack in MANET
    Jaisankar, N.
    Saravanan, R.
    Swamy, K. Durai
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 217 - +
  • [32] An attack-norm separation approach for detecting cyber attacks
    Ye, Nong
    Farley, Toni
    Lakshminarasimhan, Deepak
    INFORMATION SYSTEMS FRONTIERS, 2006, 8 (03) : 163 - 177
  • [33] Detecting Pilot Spoofing Attack in MISO Systems With Trusted User
    Liu, Xiaoming
    Li, Bin
    Chen, Hongbin
    Sun, Zhuo
    Liang, Ying-Chang
    Zhao, Chenglin
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (02) : 314 - 317
  • [34] Detecting and Locating Whole Genome Duplications on a Phylogeny: A Probabilistic Approach
    Rabier, Charles-Elie
    Ta, Tram
    Ane, Cecile
    MOLECULAR BIOLOGY AND EVOLUTION, 2014, 31 (03) : 750 - 762
  • [35] A Game-Theoretic Probabilistic Approach for Detecting Conversational Groups
    Vascon, Sebastiano
    Mequanint, Eyasu Zemene
    Cristani, Marco
    Hung, Hayley
    Pelillo, Marcello
    Murino, Vittorio
    COMPUTER VISION - ACCV 2014, PT V, 2015, 9007 : 658 - 675
  • [36] An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
    Di Pietro, Roberto
    Molva, Refik
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 853 - 863
  • [37] A Novel Probabilistic Approach for Detecting Concept Drift in Streaming Data
    Parasteh, Sirvan
    Sadaoui, Samira
    DEEP LEARNING THEORY AND APPLICATIONS, DELTA 2023, 2023, 1875 : 173 - 188
  • [38] Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
    Jin, Ruofan
    Wang, Bing
    Wei, Wei
    Zhang, Xiaolan
    Chen, Xian
    Bar-Shalom, Yaakov
    Willett, Peter
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (07) : 1647 - 1660
  • [39] A Demonic Approach to Information in Probabilistic Systems
    Desharnais, Josee
    Laviolette, Francois
    Turgeon, Amelie
    CONCUR 2009 - CONCURRENCY THEORY, PROCEEDINGS, 2009, 5710 : 289 - 304
  • [40] PROBABILISTIC DESIGN APPROACH FOR FILTRATION SYSTEMS
    ZIMMELS, Y
    POWDER TECHNOLOGY, 1991, 67 (02) : 175 - 185