Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems

Tag cloning attack is a serious threat to the radio-frequency identification (RFID) applications. Cloned tags detection is an effective security mechanism to prevent the attacks. To improve the accuracy and efficiency of detection for cloned tags, this study presents a deterministic cloned tags detection (DCTD) protocol for anonymous RFID systems to detect cloned tags, using a tree-based anti-collision algorithm to find irreconcilable collisions. This protocol, which uses the pseudonym of tags in the detecting process, can quickly detect all the cloned tags with a deterministic time without revealing the sensitive information. Experiments show that DCTD protocol, with less detection time and higher accuracy, outperforms the known detection protocols.

[1]  Yu Zeng,et al.  Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision , 2013, IEEE Transactions on Parallel and Distributed Systems.

[2]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Klaus Finkenzeller,et al.  Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .

[4]  Quanyuan Feng,et al.  Stability Analysis of an Efficient Anti-Collision Protocol for RFID Tag Identification , 2012, IEEE Transactions on Communications.

[5]  Jemal H. Abawajy Enhancing RFID Tag Resistance against Cloning Attack , 2009, 2009 Third International Conference on Network and System Security.

[6]  XiaoLin Jia,et al.  An improved anti‐collision protocol for radio frequency identification tag , 2015, Int. J. Commun. Syst..

[7]  Basel Alomair,et al.  Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2010, IEEE Transactions on Parallel and Distributed Systems.

[8]  Mike Burmester,et al.  Lightweight RFID authentication with forward and backward security , 2011, TSEC.

[9]  David C. Yen,et al.  Taxonomy and survey of RFID anti-collision protocols , 2006, Comput. Commun..

[10]  Basel Alomair,et al.  Securing low-cost RFID systems: An unconditionally secure approach , 2011, J. Comput. Secur..

[11]  Kai Bu,et al.  Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Byeongchan Jeon,et al.  Multiple RFID Tags Identification with M-ary Query Tree Scheme , 2013, IEEE Communications Letters.

[13]  Min Young Chung,et al.  Identification of RFID Tags in Framed-Slotted ALOHA with Robust Estimation and Binary Selection , 2007, IEEE Communications Letters.

[14]  Srdjan Capkun,et al.  Tailing RFID Tags for Clone Detection , 2013, NDSS.

[15]  Kai Bu,et al.  Approaching the time lower bound on cloned-tag identification for large RFID systems , 2014, Ad Hoc Networks.

[16]  Florian Michahelles,et al.  Securing RFID Systems by Detecting Tag Cloning , 2009, Pervasive.

[17]  Wei Zhang,et al.  An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree , 2013, Int. J. Distributed Sens. Networks.