Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach

Computer Networks - Tập 189 - Trang 107922 - 2021
Yue Feng1,2, Weiqing Huang1,2, Siye Wang1,2, Yanfang Zhang1,2, Shang Jiang1,2
1Institute of Information Engineering, Chinese Academy of Sciences, China
2School of Cyber Security, University of Chinese Academy of Sciences, China

Tài liệu tham khảo

Ilie-Zudor, 2011, A survey of applications and requirements of unique identification systems and RFID techniques, Comput. Ind., 62, 227, 10.1016/j.compind.2010.10.004 Bono, 2005, Security analysis of a cryptographically-enabled RFID device, 1 Garcia, 2008, Dismantling MIFARE classic, 97 Oswald, 2011, Breaking mifare DESFire MF3ICD40: Power analysis and templates in the real world, 207 Xu, 2018, Side-channel attack on a protected RFID card, IEEE Access, 6, 58395, 10.1109/ACCESS.2018.2870663 X. Chen, J. Liu, X. Wang, X. Zhang, Y. Wang, L. Chen, Combating tag cloning with COTS RFID devices, in: 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON, 2018, pp. 1–9. Garcia, 2008, Dismantling mifare classic, vol. 5283, 97, 10.1007/978-3-540-88313-5_7 G. Zhang, L. Xia, S. Jia, Y. Ji, Identification of cloned HF RFID proximity cards based on RF fingerprinting, in: 2016 IEEE Trustcom/BigDataSE/I SPA, 2016. Zanetti, 2010, 353 M. Krumnikl, P. Moravec, P. Olivka, D. Seidl, EM410x RFID cloned card detection system, in: 2015 International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS, 2015, pp. 76–82. Okpara, 2015 Zanetti, 2013 Lehtonen, 2009, Securing RFID systems by detecting tag cloning, 291 Bu, 2014, Approaching the time lower bound on cloned-tag identification for large RFID systems, Ad Hoc Netw., 13, 271, 10.1016/j.adhoc.2013.08.011 Bu, 2013, Unreconciled collisions uncover cloning attacks in anonymous RFID systems, IEEE Trans. Inf. Forensics Secur., 8, 429, 10.1109/TIFS.2012.2237395 Bu, 2015, Deterministic detection of cloning attacks for anonymous RFID systems, IEEE Trans. Ind. Inf., 11, 1255, 10.1109/TII.2015.2482921 J. Shi, S.M. Kywe, Y. Li, Batch clone detection in RFID-enabled supply chain, in: IEEE RFID 2014: IEEE International Conference on RFID, April 8–10, 2014, Orlando, Florida: Proceedings, 2014, pp. 118–125. Blass, 2010, Tracker: Security and privacy for RFID-based supply chains Elkhiyaoui, 2011, CHECKER: on-site checking in RFID-based supply chains, IACR Cryptol. ePrint Arch., 2011, 651 Maleki, 2016, LightSource: Ultra lightweight clone detection of RFID tags from software unclonable responses, IACR Cryptol. ePrint Arch., 2016, 608 Ouafi, 2009, Pathchecker: An RFID application for tracing products in Supply-chains Peichao, 2017, Analysis on abnormal behavior of insider threats based on accesslog mining, CAAI Trans. Intell. Syst. Burmester, 2018, Comments on “unreconciled collisions uncover cloning attacks in anonymous RFID systems”, IEEE Trans. Inf. Forensics Secur., 13, 2929, 10.1109/TIFS.2018.2834876 Huang, 2020, ACD: an adaptable approach for RFID cloning attack detection, Sensors, 20, 2378, 10.3390/s20082378 S. Broumi, A. Bakal, M. Talea, F. Smarandache, L. Vladareanu, Applying Dijkstra algorithm for solving neutrosophic shortest path problem, in: 2016 International Conference on Advanced Mechatronic Systems, ICAMechS, 2016, pp. 412–416. Swathika, 2016, Prims-aided Dijkstra algorithm for adaptive protection in microgrids, IEEE J. Emerg. Sel. Top. Power Electron., 4, 1279, 10.1109/JESTPE.2016.2581986 Zhang, 2018, When Dijkstra meets vanishing point: A stereo vision approach for road detection, IEEE Trans. Image Process., 27, 2176, 10.1109/TIP.2018.2792910 Subramanian, 2020, 48 G. Qing, Z. Zheng, X. Yue, Path-planning of automated guided vehicle based on improved Dijkstra algorithm, in: 2017 29th Chinese Control and Decision Conference, CCDC, 2017, pp. 7138–7143. Baeza, 2017, A comparison between ACO and Dijkstra algorithms for optimal ore concentrate pipeline routing, J. Cleaner Prod., 144, 149, 10.1016/j.jclepro.2016.12.084