《计算机应用研究》|Application Research of Computers

基于多叉树的RFID克隆攻击快速检测

Cloning attack quickly identification based on multi-tree for RFID systems

免费全文下载 (已被下载 次)  
获取PDF全文
作者 郭奕旻,李顺东
机构 陕西师范大学 计算机科学学院,西安 710119
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2015)04-1123-04
DOI 10.3969/j.issn.1001-3695.2015.04.039
摘要 为了提高克隆标签检测的准确度和效率,提出了一个基于多叉树的RFID克隆攻击检测方法(MT-CAI)。MT-CAI用一个多叉树防碰撞算法来发现不可调解的碰撞,可以高效地发现所有的克隆标签。从性能分析和仿真实验可以看到,MT-CAI不仅能够检测出所有克隆标签,而且其执行时间远小于GREAT的执行时间。MT-CAI方法在检测时间和检测的准确度方面都优于现有的克隆标签检测协议。
关键词 克隆标签检测;无线射频识别;不可调解碰撞
基金项目 国家自然科学基金资助项目(61070189,61272435)
本文URL http://www.arocmag.com/article/01-2015-04-039.html
英文标题 Cloning attack quickly identification based on multi-tree for RFID systems
作者英文名 GUO Yi-min, LI Shun-dong
机构英文名 School of Computer Science, Shaanxi Normal University, Xi'an 710119, China
英文摘要 In order to improve the accuracy and efficiency of detection for cloned-tag, this paper presented a multi-tree cloning attack identification (MT-CAI) method for RFID systems. MT-CAI used a multi-tree-based anti-collision algorithm to detect irreconcilable collisions to find efficiently all cloning attacks. From the performance analysis and simulation, MT-CAI can not only detect all cloned tags, but its execution time is far less than the execution time of GREAT. The MT-CAI is superior to existing cloned tags identification protocols in the identification time and the identification accuracy.
英文关键词 cloned tags identification; RFID; irreconcilable collisions
参考文献 查看稿件参考文献
  [1] ALOMAIR B, LAZOS L, POOVENDRAN R. Securing low-cost RFID systems:an unconditionally secure approach[J] . Journal of Computer Security, 2011, 19(2):229-257.
[2] JUELS A. RFID security and privacy:a research survey[J] . IEEE Journal on Selected Areas in Communications, 2006, 24(2):381-394.
[3] GAO Li-juan, MA Mao-de, SHU Yan-tai, et al. A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems[J] . Wireless Personal Communications, 2013, 68(4):1943-1959.
[4] WU Zhen-yu, LIN S C, CHEN T L, et al. A secure RFID authentication scheme for medicine applications[C] // Proc of the 7th IEEE International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. [S. l. ] :IEEE Press, 2013:175-181.
[5] MARTN H, MILLAN E S, PERIS-LOPEZ P, et al. Efficient ASIC implementation and analysis of two EPC-C1G2 RFID authentication protocols[J] . Sensors Journal, 2013, 13(10):3537-3547.
[6] LEHTONEN M, OSTOJIC D, ILIC A, et al. Securing RFID systems by detecting tag cloning[C] // Proc of the 7th International Confe-rence on Pervasive Computing. Berlin:Springer, 2009:291-308.
[7] ZANETTI D, CAPKUN S, JUELS A. Tailing RFID tags for clone detection[C] // Proc of Network and Distributed System Security Symposium. 2013:1-17.
[8] BU Kai, LIU Xuan, XIAO Bin. Approaching the time lower bound on cloned-tag identification for large RFID systems[J] . Ad hoc Networks, 2014, 13(PartB):271-281.
[9] BU Kai, LIU Xuan, LUO Jia-qing, et al. Unreconciled collisions uncover cloning attacks in anonymous RFID systems[J] . IEEE Trans on Information Forensics and Security, 2013, 8(3):429-439.
[10] SHIH D H, SUN Po-ling, YEN D C, et al. Taxonomy and survey of RFID anti-collision protocols[J] . Computer Communication, 2006, 29(11):2150-2166.
[11] PARK J, CHUNG M Y, LEE T J. Identification of RFID tags in framed-slotted ALOHA with robust estimation and binary selection[J] . IEEE Communications Letters, 2007, 11(5):452-454.
[12] LIANG C K, CHIEN Y C, TSAI C H. A pre-detection query tree tag anti-collision scheme in RFID systems[C] // Proc of the 7th International Conference on Sensor Technologies and Applications. 2013:51-56.
[13] ZHANG Wei, GUO Ya-jun, TANG Xue-ming, et al. An efficient adaptive anticollision algorithm based on 4-ary pruning query tree[J] . International Journal of Distributed Sensor Networks, 2013, 2013:1-7
[14] WANG Gang, PENG Yong, ZHU Zhao-min. Anti-collision algorithm for RFID tag identification using fast query tree[C] // Proc of IEEE International Symposium on IT in Medicine and Education. [S. l. ] :IEEE Press, 2011:396-399.
[15] BURMESTER M, MUNILLA J. Lightweight RFID authentication with forward and backward security[J] . ACM Trans on Information and System Security, 2011, 14(1):1-29.
[16] ABAWAJY J. Enhancing RFID tag resistance against cloning attack[C] // Proc of the 3rd IEEE International Conference on Network and System Security. 2009:18-23.
收稿日期 2014/4/28
修回日期 2014/6/3
页码 1123-1126
中图分类号 TP309
文献标志码 A