Fast and Scalable Counterfeits Estimation for Large-Scale RFID Systems

Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, and the communication overhead and time cost grow linearly with increasing size of tags. We design a fast and scalable counterfeits estimation scheme, INformative Counting (INC), which achieves sublinear authentication time and communication cost in batch verifications. The key novelty of INC builds on an FM-Sketch variant authentication synopsis that can capture key counting information using only sublinear space. With the help of this well-designed data structure, INC is able to provide authentication results with accurate estimates of the number of counterfeiting tags and genuine tags, while previous batch authentication methods merely provide 0/1 results indicating the existence of counterfeits. We conduct detailed theoretical analysis and extensive experiments to examine this design and the results show that INC significantly outperforms previous work in terms of effectiveness and efficiency.

[1]  Lawrence G. Roberts,et al.  ALOHA packet system with and without slots and capture , 1975, CCRV.

[2]  Lei Yang,et al.  Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.

[3]  Alex X. Liu,et al.  Every bit counts: fast and scalable RFID estimation , 2012, Mobicom '12.

[4]  Binbin Chen,et al.  Understanding RFID Counting Protocols , 2016, IEEE/ACM Transactions on Networking.

[5]  Lei Hu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[6]  Philippe Flajolet,et al.  Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..

[7]  Rajeev Motwani,et al.  Randomized Algorithms , 1995, SIGA.

[8]  Wonjun Lee,et al.  Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.

[9]  Thomas F. La Porta,et al.  Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization , 2011, IEEE Transactions on Mobile Computing.

[10]  T. Staake,et al.  Business strategies in the counterfeit market , 2012 .

[11]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[12]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[13]  Rui Zhang,et al.  Fast identification of the missing tags in a large RFID system , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[14]  Lejla Batina,et al.  Untraceable RFID authentication protocols: Revision of EC-RAC , 2009, 2009 IEEE International Conference on RFID.

[15]  Thomas F. La Porta,et al.  Interference cancellation-based RFID tags identification , 2011, MSWiM '11.

[16]  Yunhao Liu,et al.  Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..

[17]  Mo Li,et al.  ZOE: Fast cardinality estimation for large-scale RFID systems , 2013, 2013 Proceedings IEEE INFOCOM.

[18]  Chiara Petrioli,et al.  Fast identification of mobile RFID tags , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[19]  P. Bullen Handbook of means and their inequalities , 1987 .

[20]  Mo Li,et al.  PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation , 2011, IEEE Transactions on Mobile Computing.

[21]  Murali S. Kodialam,et al.  Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.

[22]  Yunhao Liu,et al.  ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.

[23]  L. Batina,et al.  EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol , 2008, 2008 IEEE International Conference on RFID.

[24]  Tassos Dimitriou,et al.  A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).

[25]  Bo Sheng,et al.  Efficient Continuous Scanning in RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[26]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[27]  John Capetanakis,et al.  Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.

[28]  Damith C. Ranasinghe,et al.  Networked RFID systems , 2008 .

[29]  Yunhao Liu,et al.  Refresh: Weak Privacy Model for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.