A Probabilistic Approach for Detecting Blocking Attack in RFID Systems

被引:0
|
作者
Vahedi, Ehsan [1 ]
Shah-Mansouri, Vahid [1 ]
Wong, Vincent W. S. [1 ]
Blake, Ian F. [1 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V5Z 1M9, Canada
关键词
FRAMED-SLOTTED ALOHA; ANTICOLLISION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. In this paper, we study the use of blocker tags by malicious attackers which can cause the nearby readers not being able to successfully receive the reply messages from the RFID tags. We mathematically model the blocker tag attack problem using information extracted from the interrogations performed by the reader. Using this analytical framework, we propose a probabilistic blocker tag detection (P-BTD) algorithm to detect the presence of an attacker in the system. The probability of false alarm for the P-BTD algorithm is determined via simulation. Simulation results show that our proposed algorithm has a better performance than the threshold-based detection algorithm in terms of using a shorter time (i.e., fewer interrogations) to detect the presence of blocker tags.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Probabilistic analysis of monitoring systems for detecting subsurface contaminant plumes
    Warrick, A.W.
    Young, M.H.
    Wierenga, P.J.
    Ground Water, 36 (06): : 894 - 900
  • [42] Probabilistic analysis of monitoring systems for detecting subsurface contaminant plumes
    Warrick, AW
    Young, MH
    Wierenga, PJ
    GROUND WATER, 1998, 36 (06) : 894 - 900
  • [43] BLOCKING GIBBS SAMPLING IN VERY LARGE PROBABILISTIC EXPERT-SYSTEMS
    JENSEN, CS
    KJAERULFF, U
    KONG, A
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 1995, 42 (06) : 647 - 666
  • [44] Detecting BitTorrent Blocking
    Dischinger, Marcel
    Mislove, Alan
    Haeberlen, Andreas
    Gummadi, Krishna P.
    IMC'08: PROCEEDINGS OF THE 2008 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, 2008, : 3 - 8
  • [45] Situation aware RFID system: Evaluating abnormal behavior detecting approach
    Chae, Heeseo
    Lee, Taek
    In, Hoh Peter
    FOURTH IEEE WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE EMBEDDED AND UBIQUITOUS SYSTEMS AND THE SECOND INTERNATIONAL WORKSHOP ON COLLABORATIVE COMPUTING, INTEGRATION, AND ASSURANCE, PROCEEDINGS, 2006, : 115 - +
  • [46] Detecting relay attacks on RFID communication systems using quantum bits
    Hoda Jannati
    Ebrahim Ardeshir-Larijani
    Quantum Information Processing, 2016, 15 : 4759 - 4771
  • [47] Detecting Relay Attacks in RFID Systems Using Physical Layer Characteristics
    Tmar-Ben Hamida, S.
    Thevenon, P-H.
    Pierrot, J-B.
    Savry, O.
    Castelluccia, C.
    2013 6TH JOINT IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2013), 2013,
  • [48] Mstream attack detection approach based on probabilistic fuzzy cognitive map
    Yang, Feng
    Zhong, Cheng
    Li, Zhi
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (10): : 125 - 127
  • [49] An attack graph-based probabilistic computing approach of network security
    Ye Y.
    Xu X.-S.
    Jia Y.
    Qi Z.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (10): : 1987 - 1996
  • [50] Capture-Aware Couple-Resolution Blocking Protocol in RFID Systems
    Choi, Hae-il
    Kim, Hyung-jik
    Choi, Sunwoong
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (04) : 969 - 986