ACD: An Adaptable Approach for RFID Cloning Attack Detection
With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genui...
Glavni autori: | , , |
---|---|
Format: | Članak |
Jezik: | English |
Izdano: |
MDPI AG
2020-04-01
|
Serija: | Sensors |
Teme: | |
Online pristup: | https://www.mdpi.com/1424-8220/20/8/2378 |
_version_ | 1827718173153034240 |
---|---|
author | Weiqing Huang Yanfang Zhang Yue Feng |
author_facet | Weiqing Huang Yanfang Zhang Yue Feng |
author_sort | Weiqing Huang |
collection | DOAJ |
description | With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios. |
first_indexed | 2024-03-10T20:18:39Z |
format | Article |
id | doaj.art-b51a04ffe0ae44e19765684d7cf7da3a |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T20:18:39Z |
publishDate | 2020-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-b51a04ffe0ae44e19765684d7cf7da3a2023-11-19T22:24:06ZengMDPI AGSensors1424-82202020-04-01208237810.3390/s20082378ACD: An Adaptable Approach for RFID Cloning Attack DetectionWeiqing Huang0Yanfang Zhang1Yue Feng2School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, ChinaInstitute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, ChinaInstitute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, ChinaWith the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios.https://www.mdpi.com/1424-8220/20/8/2378radio frequency identification (RFID)cloning detectionFloyd-Warshall algorithm |
spellingShingle | Weiqing Huang Yanfang Zhang Yue Feng ACD: An Adaptable Approach for RFID Cloning Attack Detection Sensors radio frequency identification (RFID) cloning detection Floyd-Warshall algorithm |
title | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_full | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_fullStr | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_full_unstemmed | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_short | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_sort | acd an adaptable approach for rfid cloning attack detection |
topic | radio frequency identification (RFID) cloning detection Floyd-Warshall algorithm |
url | https://www.mdpi.com/1424-8220/20/8/2378 |
work_keys_str_mv | AT weiqinghuang acdanadaptableapproachforrfidcloningattackdetection AT yanfangzhang acdanadaptableapproachforrfidcloningattackdetection AT yuefeng acdanadaptableapproachforrfidcloningattackdetection |