| Literature DB >> 29565982 |
Hazalila Kamaludin1, Hairulnizam Mahdin1, Jemal H Abawajy2.
Abstract
Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.Entities:
Mesh:
Year: 2018 PMID: 29565982 PMCID: PMC5863942 DOI: 10.1371/journal.pone.0193951
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Multitier middleware architecture ([28]).
Fig 2Distributed RFID supply chain system.
Parameters for RFID tag clone detection in known and anonymous RFID systems.
| 1 | Synchronized Secrets Approach for RFID-enabled Anti-Counterfeiting [ | Yes | The same secret random number |
| On every web service invocation, a new random secret | |||
| 2 | Securing RFID systems by detecting tag cloning [ | Yes | The same secret random number |
| On every web service invocation, a new random secret | |||
| 3 | Fast cloned-tag identification protocols for large-scale RFID systems [ | Yes | Establish expected reading list and compare with actual reading list |
| 4 | Exposing Clone RFID Tags at the Reader [ | Yes | Clone tags are trivially evident on the basis that multiple EPC’s of the same value were obtained in a single inventory cycle (clones need to appear in the same tag group, and at the same reader in time) |
| 5 | DTD [ | Yes | 1st track—Verification information is written on tag as products flow along the supply chain which forming verification sequences |
| 2nd track—Check on consistency of business transaction performed during the supply chains | |||
| The verification sequence together with the sequence formed by business actions performed during the supply chains yield two tracks which can be assessed to detect the presence of clone tags | |||
| 6 | TDPS [ | Yes | Product e-pedigrees in manufacturing to facilitate RFID-based track-and-trace anti-counterfeiting. |
| 7 | Tailing RFID Tags for Clone Detection [ | Yes | RFID readers write random values to tags as they pass through a supply chain, creating in each tag a tail composed of random values. |
| The tails of legitimate tags and clone ones diverge over time, making cloning detectable by a centralized detector even across blind zones. | |||
| 1 | GREAT [ | Irreconcilable collisions | Using Aloha-based anti-collision protocol to find irreconcilable collisions. |
| GREAT used slotted Aloha | |||
| 2 | BASE [ | Irreconcilable collisions | ID cardinality and tag cardinality. |
| BASE used slotted Aloha | |||
| 3 | DeClone [ | Irreconcilable collisions | Uses a hybrid design of slotted Aloha and tree traversal (Breadth First tree traversal-BFS) to determine collisions. |
| DeClone used slotted Aloha | |||
| 4 | DCTD [ | Irreconcilable collisions | Using a Tree-based anti-collision algorithm to find irreconcilable collisions by dividing the tags that answer the query in collision time slots into many different groups until each group have only one ID. |
| Tags with the same ID are always divided into the same group, and then gives rise to an irreconcilable collision. | |||
| Adopt the Manchester code to speed up finding out irreconcilable collisions. | |||
| Each tag is preloaded with a unique secret pseudonym. After a successful authentication between a tag and the legal reader, the pseudonym stored both in the backend server and in the tag should be updated privately. | |||
| The reader sends a query prefix at first, and then the tags in the reader’s work range respond the query only if their own ID contains this prefix. | |||
Summary of RFID clone tag detection approaches.
| Approaches | Weaknesses | |
|---|---|---|
| 1 | DTD [ | The rules indicated still rely on a predefined structure of supply chain (business transaction) and therefore it is not flexible for dynamically change supply chain as the author claimed. |
| Great reliance on product movement information from e-pedigree. | ||
| 2 | Fast cloned-tag identification protocols for large-scale RFID systems [ | The approach involves establishing expected reading list and compare with actual reading list, thus it required more spaces to store the expected and actual reading list while comparison between the lists gives significant impact on the execution time especially for large scale systems. |
| 3 | GREAT [ | Cannot detect all clone tags completely and the detection performance is probabilistic because of bounded-ness of the frame slotted Aloha anti-collision adopted. |
| Find out irreconcilable collisions in a probabilistic way therefore tolerate only a few clones. | ||
| Execution time of GREAT tends to be infinite if used to detect 100% clone tags. | ||
| 4 | Securing RFID systems by detecting tag cloning [ | Used two parameters, similar EPC and secret random number on every tag to detect clone tag in which unsynchronized secrets are another proof of a tag cloning attack. |
| However the presented method still needs to be used together with a manual inspection to determine which of the objects is clone under different cases. | ||
| 5 | BASE [ | Tag and EPC quantity is compared because a cloning attack makes tag quantity exceed EPC quantity. BASE needs to count almost all tags until it detects the cloning attack. |
| Thus, it is less efficient for large scale (more than 1000 tags) because clone tags might respond at the very beginning of the protocol execution. | ||
| 6 | DeClone [ | Even though it claims that clone tag can be detected when at least one of the slots allocated get only one EPC hashed into, it still uncertain to differentiate which of the suspicious tag is clone and which is genuine. |
| 7 | DCTD [ | It still uncertain to differentiate which of the suspicious tag is clone and which is genuine. |
Fig 3Mapping of base stream into modified count-min sketch.
Tag reading data.
| Reader 1 | Reader 2 | Reader 3 | ||||||
|---|---|---|---|---|---|---|---|---|
| EPC | Read Count | Time | EPC | Read Count | Time | EPC | Read Count | Time |
| 1 | 10 | t1 | 7 | 10 | t2 | 6 | 7 | t3 |
| 2 | 7 | t1 | 8 | 10 | t2 | 12 | 9 | t1 |
| 3 | 9 | t1 | 5 | 2 | t4 | 17 | 8 | t2 |
| 4 | 10 | t1 | 6 | 1 | t4 | 18 | 10 | t1 |
| 2 | 7 | t2 | 2 | 3 | t4 | 5 | 8 | t2 |
| 6 | 8 | t2 | ||||||
| 2 | 7 | t3 | ||||||
| 7 | 2 | t3 | ||||||
| 8 | 3 | t3 | ||||||
| 5 | 9 | t3 | ||||||
Fig 4CM sketch visualization of initial, map and update reading for three readers.
Print vector content.
| Reader 1 | Reader 2 | Reader 3 |
|---|---|---|
| 2 → 6 → 8 → | ||
| 1 → | 6 → 2 → 8 → | 6 → |
| 4 → | 7 → | 17 → 18 → |
| 7 → | 5 → | 12 → 5 → |
| 3 → | 6 → | 6 → 17 → |
| 5 → | 7 → | 12 → 18 → 5 → |
| 6 → | 5 → | |
| 1 → 7 → | 2 → 8 → | |
| 4 → | ||
| 5 → | ||
| 2 → 8 → | ||
| 3 → |
Clone check results at three readers.
| 2 → 1st trace of clone at r2 |
| 2 → 2nd trace of clone at r2 |
| 5 → 1st trace of clone at r2 |
| 5 → 2nd trace of clone at r2 |
| 6 → 1st trace of clone at r2 |
| 6 → 2nd trace of clone at r2 |
| 7 → 1st trace of clone at r1 |
| 7 → 2nd trace of clone at r1 |
| 8 → 1st trace of clone at r1 |
| 8 → 2nd trace of clone at r1 |
| 5 → 1st trace of clone at r3 |
| 5 → 2nd trace of clone at r3 |
| 6 → 1st trace of clone at r3 |
| 6 → 2nd trace of clone at r3 |
| 5 → 1st trace of clone at r2 |
| 5 → 2nd trace of clone at r2 |
| 6 → 1st trace of clone at r2 |
| 6 → 2nd trace of clone at r2 |
Tag reading in particular CM sketch with updated reading rate.
| Reader 1 | Reader 2 | Reader 3 |
|---|---|---|
| r1[0][222] → 8(read: 3) | ||
| r1[1][48] → 5(read: 9) |
Home bucket quantity for bucket size = 10.
| Bucket Size, bs = 10 | |||||
|---|---|---|---|---|---|
| Number of records, M | % Packing Density | ||||
| 50 | 55 | 60 | 65 | 70 | |
| Home Bucket Quantity, K | |||||
| 1,000 | 200 | 182 | 167 | 154 | 143 |
| 2,000 | 400 | 364 | 333 | 308 | 286 |
| 3,000 | 600 | 545 | 500 | 462 | 429 |
| 4,000 | 800 | 727 | 667 | 615 | 571 |
| 5,000 | 1000 | 909 | 833 | 769 | 714 |
| 6,000 | 1200 | 1091 | 1000 | 923 | 857 |
| 7,000 | 1400 | 1273 | 1167 | 1077 | 1000 |
| 8,000 | 1600 | 1455 | 1333 | 1231 | 1143 |
| 9,000 | 1800 | 1636 | 1500 | 1385 | 1286 |
| 10,000 | 2000 | 1818 | 1667 | 1538 | 1429 |
| : | : | : | : | : | : |
| 20,000 | 4000 | 3636 | 3333 | 3077 | 2857 |
Fig 5Execution time of MCH with 60% packing density and bucket sizes bs = 10, bs = 20, bs = 30, bs = 40 and bs = 50.
Fig 6Comparison of execution times for detecting clone tag.
Fig 7Comparison of clone detection accuracy between DeClone and BASE in varying number of clone IDs.
Fig 8Comparison of clone detection accuracy between MCH, DeClone and BASE in varying number of clone IDs.