Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems

Radio-Frequency Identification (RFID) is an emerging technology which has been widely applied in various scenarios, such as tracking, object monitoring, and social networks, etc. Cloning attacks can severely disturb the RFID systems, such as missed detection for the missing tags. Although there are some techniques with physical architecture design or complicated encryption and cryptography proposed to prevent the tags from being cloned, it is difficult to definitely avoid the cloning attack. Therefore, cloning attack detection and identification are critical for the RFID systems. Prior works rely on that each clone tag will reply to the reader when its corresponding genuine tag is queried. In this article, we consider a more general attack model, in which each clone tag replies to the reader’s query with a predefined probability, i.e., attack probability. We concentrate on identifying the tags being attacked with the probability no less than a threshold $P_{t}$ with the required identification reliability $\alpha $ . We first propose a basic protocol to Identify the Probabilistic Cloning Attacks with required identification reliability for the large-scale RFID systems called IPCA. Then we propose two enhanced protocols called MS-IPCA and S-IPCA respectively to improve the identification efficiency. We theoretically analyze the parameters of the proposed IPCA, MS-IPCA and S-IPCA protocols to maximize the identification efficiency. Finally we conduct extensive simulations to validate the effectiveness of the proposed protocols.

[1]  Bin Xiao,et al.  Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems , 2017, IEEE Transactions on Communications.

[2]  Jie Wu,et al.  Fast Identification of Blocked RFID Tags , 2018, IEEE Transactions on Mobile Computing.

[3]  Shigang Chen,et al.  Missing-Tag Detection and Energy–Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels , 2014, IEEE/ACM Transactions on Networking.

[4]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[5]  Hairong Qi,et al.  Cost-effective barrier coverage formation in heterogeneous wireless sensor networks , 2017, Ad Hoc Networks.

[6]  Keqiu Li,et al.  Time- and Energy-Efficient Detection of Unknown Tags in Large-Scale RFID Systems , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[7]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[8]  Tony Q. S. Quek,et al.  Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions , 2018, IEEE Transactions on Information Forensics and Security.

[9]  Feng Xia,et al.  Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems , 2018, IEEE Internet of Things Journal.

[10]  Feng Xia,et al.  Mobility Dataset Generation for Vehicular Social Networks Based on Floating Car Data , 2018, IEEE Transactions on Vehicular Technology.

[11]  Alex X. Liu,et al.  Every bit counts: fast and scalable RFID estimation , 2012, Mobicom '12.

[12]  Bo Sheng,et al.  Efficient techniques for monitoring missing RFID tags , 2010, IEEE Transactions on Wireless Communications.

[13]  Qian Wang,et al.  Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing , 2019, IEEE Communications Magazine.

[14]  Feng Xia,et al.  On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks , 2018, IEEE Transactions on Emerging Topics in Computing.

[15]  Rui Zhang,et al.  Fast identification of the missing tags in a large RFID system , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[16]  Chong Wang,et al.  RFID-Based 3-D Positioning Schemes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[17]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[18]  Srdjan Capkun,et al.  Physical-layer identification of UHF RFID tags , 2010, MobiCom.

[19]  Honglong Chen,et al.  Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags , 2017, IEEE Internet of Things Journal.

[20]  Jorge Munilla,et al.  HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.

[21]  Kai Bu,et al.  Approaching the time lower bound on cloned-tag identification for large RFID systems , 2014, Ad Hoc Networks.

[22]  A.R. Harish,et al.  Analysis of low range Indoor Location Tracking techniques using Passive UHF RFID tags , 2008, 2008 IEEE Radio and Wireless Symposium.

[23]  Jie Wu,et al.  RFID Estimation With Blocker Tags , 2017, IEEE/ACM Transactions on Networking.

[24]  Rabab Kreidieh Ward,et al.  Probabilistic Analysis of Blocking Attack in RFID Systems , 2011, IEEE Transactions on Information Forensics and Security.

[25]  Sherali Zeadally,et al.  An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.

[26]  Lei Yang,et al.  Season: Shelving interference and joint identification in large-scale RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.

[27]  Shigang Chen,et al.  Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.

[28]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[29]  Yuguang Fang,et al.  An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel , 2013, IEEE/ACM Transactions on Networking.

[30]  Hung-Yu Chien,et al.  SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.

[31]  Lei Yang,et al.  Tash: Toward Selective Reading as Hash Primitives for Gen2 RFIDs , 2019, IEEE/ACM Transactions on Networking.

[32]  Weiping Zhu,et al.  Accurate and Efficient Object Tracking Based on Passive RFID , 2015, IEEE Transactions on Mobile Computing.

[33]  Shigeng Zhang,et al.  Deterministic Detection of Cloning Attacks for Anonymous RFID Systems , 2015, IEEE Transactions on Industrial Informatics.

[34]  Hairong Qi,et al.  Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server , 2019, IEEE Transactions on Mobile Computing.

[35]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[36]  Jiangchuan Liu,et al.  Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable Channels , 2017, IEEE/ACM Transactions on Networking.

[37]  Da-Zhi Sun,et al.  A hash-based RFID security protocol for strong privacy protection , 2012, IEEE Transactions on Consumer Electronics.

[38]  Xiaohu Tang,et al.  A Time-Efficient Pair-Wise Collision-Resolving Protocol for Missing Tag Identification , 2017, IEEE Transactions on Communications.

[39]  Lu Liu,et al.  Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags , 2018, IEEE Access.

[40]  Jiguo Yu,et al.  MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems , 2018, IEEE Transactions on Vehicular Technology.

[41]  Kai Bu,et al.  Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems , 2013, IEEE Transactions on Information Forensics and Security.

[42]  Xiang Li,et al.  DTD: A Novel Double-Track Approach to Clone Detection for RFID-Enabled Supply Chains , 2017, IEEE Transactions on Emerging Topics in Computing.

[43]  Hairong Qi,et al.  Achieving location error tolerant barrier coverage for wireless sensor networks , 2017, Comput. Networks.

[44]  Jiguo Yu,et al.  RMTS: A robust clock synchronization scheme for wireless sensor networks , 2019, J. Netw. Comput. Appl..

[45]  Wei Gong,et al.  Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems , 2017, Secur. Commun. Networks.

[46]  Lei Yang,et al.  Analog On-Tag Hashing: Towards Selective Reading as Hash Primitives in Gen2 RFID Systems , 2017, MobiCom.

[47]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.