Anomaly Detection in RFID Networks Using Bayesian Blocks and DBSCAN

The use of modeling techniques such as Knuth's Rule or Bayesian Blocks for the purposes of real-time traffic characterization in RFID networks has been proposed already. This study examines the applicability of using Voronoi polygon maps or alternatively, DBSCAN clustering, as initial density estimation techniques when computing 2-Dimentional Bayesian Blocks models of RFID traffic. Our results are useful for the purposes of extending the constant-piecewise adaptation of Bayesian Blocks into 2D piecewise models for the purposes of more precise detection of anomalies in RFID traffic based on multiple log features such as command type, location, UID values, security support, etc. Automatic anomaly detection of RFID networks is an essential first step in the implementation of intrusion detection as well as a timely response to equipment malfunction such as tag hardware failure.

[1]  S. Promwong,et al.  Indoor measurement and modeling of RFID transmission loss at 5.8 GHz with human body , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[2]  Michael Smith,et al.  Quantitative comparison of indoor RFID channel models using bootstrap techniques , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[3]  Gang Li,et al.  Bandwidth dependence of CW ranging to UHF RFID tags in severe multipath environments , 2011, 2011 IEEE International Conference on RFID.

[4]  Al Alkadi,et al.  Piece-wise constant models for RFID traffic , 2016, 2016 IEEE International Conference on RFID Technology and Applications (RFID-TA).

[5]  Ernst Haselsteiner Security in Near Field Communication ( NFC ) Strengths and Weaknesses , 2006 .

[6]  Cheng-Xiang Wang,et al.  Channel Modeling of Information Transmission Over Cognitive Interrogator-Sensor Networks , 2011, IEEE Transactions on Vehicular Technology.

[7]  Franz Aurenhammer,et al.  Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.

[8]  M. Pecht,et al.  A Wireless Sensor System for Prognostics and Health Management , 2010, IEEE Sensors Journal.

[9]  J. Scargle Bayesian Blocks: Divide and Conquer, MCMC, and Cell Coalescence Approaches , 2000, physics/0009033.

[10]  Tiago M. Fernández-Caramés,et al.  Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications , 2016, Sensors.

[11]  Hongmei Chi,et al.  Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection , 2018, SoutheastCon 2018.

[12]  Jürgen Götze,et al.  Modeling and simulation of MISO diversity for UHF RFID communication , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).

[13]  R. Khan,et al.  Sequential Tests of Statistical Hypotheses. , 1972 .

[14]  Klaus Witrisal,et al.  UWB channel sounding for ranging and positioning in passive UHF RFID , 2010 .

[15]  Jianhua Guo,et al.  Collaborative RFID intrusion detection with an artificial immune system , 2011, Journal of Intelligent Information Systems.