ACD: An Adaptable Approach for RFID Cloning Attack Detection

With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genui...

Cijeli opis

Bibliografski detalji
Glavni autori: Weiqing Huang, Yanfang Zhang, Yue Feng
Format: Članak
Jezik:English
Izdano: MDPI AG 2020-04-01
Serija:Sensors
Teme:
Online pristup:https://www.mdpi.com/1424-8220/20/8/2378
_version_ 1827718173153034240
author Weiqing Huang
Yanfang Zhang
Yue Feng
author_facet Weiqing Huang
Yanfang Zhang
Yue Feng
author_sort Weiqing Huang
collection DOAJ
description With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios.
first_indexed 2024-03-10T20:18:39Z
format Article
id doaj.art-b51a04ffe0ae44e19765684d7cf7da3a
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T20:18:39Z
publishDate 2020-04-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-b51a04ffe0ae44e19765684d7cf7da3a2023-11-19T22:24:06ZengMDPI AGSensors1424-82202020-04-01208237810.3390/s20082378ACD: An Adaptable Approach for RFID Cloning Attack DetectionWeiqing Huang0Yanfang Zhang1Yue Feng2School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, ChinaInstitute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, ChinaInstitute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, ChinaWith the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios.https://www.mdpi.com/1424-8220/20/8/2378radio frequency identification (RFID)cloning detectionFloyd-Warshall algorithm
spellingShingle Weiqing Huang
Yanfang Zhang
Yue Feng
ACD: An Adaptable Approach for RFID Cloning Attack Detection
Sensors
radio frequency identification (RFID)
cloning detection
Floyd-Warshall algorithm
title ACD: An Adaptable Approach for RFID Cloning Attack Detection
title_full ACD: An Adaptable Approach for RFID Cloning Attack Detection
title_fullStr ACD: An Adaptable Approach for RFID Cloning Attack Detection
title_full_unstemmed ACD: An Adaptable Approach for RFID Cloning Attack Detection
title_short ACD: An Adaptable Approach for RFID Cloning Attack Detection
title_sort acd an adaptable approach for rfid cloning attack detection
topic radio frequency identification (RFID)
cloning detection
Floyd-Warshall algorithm
url https://www.mdpi.com/1424-8220/20/8/2378
work_keys_str_mv AT weiqinghuang acdanadaptableapproachforrfidcloningattackdetection
AT yanfangzhang acdanadaptableapproachforrfidcloningattackdetection
AT yuefeng acdanadaptableapproachforrfidcloningattackdetection