Cargando…
ACD: An Adaptable Approach for RFID Cloning Attack Detection
With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genui...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219334/ https://www.ncbi.nlm.nih.gov/pubmed/32331407 http://dx.doi.org/10.3390/s20082378 |
_version_ | 1783532974706262016 |
---|---|
author | Huang, Weiqing Zhang, Yanfang Feng, Yue |
author_facet | Huang, Weiqing Zhang, Yanfang Feng, Yue |
author_sort | Huang, Weiqing |
collection | PubMed |
description | With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios. |
format | Online Article Text |
id | pubmed-7219334 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-72193342020-05-22 ACD: An Adaptable Approach for RFID Cloning Attack Detection Huang, Weiqing Zhang, Yanfang Feng, Yue Sensors (Basel) Article With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios. MDPI 2020-04-22 /pmc/articles/PMC7219334/ /pubmed/32331407 http://dx.doi.org/10.3390/s20082378 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Huang, Weiqing Zhang, Yanfang Feng, Yue ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_full | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_fullStr | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_full_unstemmed | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_short | ACD: An Adaptable Approach for RFID Cloning Attack Detection |
title_sort | acd: an adaptable approach for rfid cloning attack detection |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219334/ https://www.ncbi.nlm.nih.gov/pubmed/32331407 http://dx.doi.org/10.3390/s20082378 |
work_keys_str_mv | AT huangweiqing acdanadaptableapproachforrfidcloningattackdetection AT zhangyanfang acdanadaptableapproachforrfidcloningattackdetection AT fengyue acdanadaptableapproachforrfidcloningattackdetection |