scholarly journals ACD: An Adaptable Approach for RFID Cloning Attack Detection

Sensors ◽  
2020 ◽  
Vol 20 (8) ◽  
pp. 2378
Author(s):  
Weiqing Huang ◽  
Yanfang Zhang ◽  
Yue Feng

With the rapid development of the internet of things, radio frequency identification (RFID) technology plays an important role in various fields. However, RFID systems are vulnerable to cloning attacks. This is the fabrication of one or more replicas of a genuine tag, which behave exactly as a genuine tag and fool the reader to gain legal authorization, leading to potential financial loss or reputation damage. Many advanced solutions have been proposed to combat cloning attacks, but they require extra hardware resources, or they cannot detect a clone tag in time. In this article, we make a fresh attempt to counterattack tag cloning based on spatiotemporal collisions. We propose adaptable clone detection (ACD), which can intuitively and accurately display the positions of abnormal tags in real time. It uses commercial off-the-shelf (COTS) RFID devices without extra hardware resources. We evaluate its performance in practice, and the results confirm its success at detecting cloning attacks. The average accuracy can reach 98.7%, and the recall rate can reach 96%. Extensive experiments show that it can adapt to a variety of RFID application scenarios.

2011 ◽  
Vol 141 ◽  
pp. 493-497 ◽  
Author(s):  
Xue Qi Xu ◽  
Cong Jin ◽  
Yu Dong Cao

Reverse supply chain (RSC) management, which is oriented towards the entire lifecycle of products, has been concerned with the emerging of green manufacturing. Based on radio frequency identification (RFID), sensing and intelligent technologies, the rapid development of the Internet of things (IoT) will form a kind of smart reverse supply chain (SRSC), which is able to enhance the reverse supply chain real-time information transmission, as well as reduce the uncertainty and complexity of the product recycling process. Some problems of RSC are analyzed in this paper, and then the SRSC system network topology is proposed. Furthermore, the technical integrated architecture and related key technologies are discussed.


2020 ◽  
Vol 12 (3) ◽  
pp. 8-16
Author(s):  
Chaofu Jing ◽  
Zhongqiang Luo ◽  
Yan Chen ◽  
Xingzhong Xiong

Radio Frequency Identification (RFID) is one of the critical technologies of the Internet of Things (IoT). With the rapid development of IoT and the extensive use of RFID in our life, the step of RFID development should be faster. However, the tags in an RFID system are more and more utilized, both of them communicate in the same channel. The signal the reader received is mixed, and the reader cannot get the correct message the tags send directly. This phenomenon is often called a collision, which is the main obstacle to the development of the RFID system. Traditionally, the algorithm to solve the collision problem is called the anti-collision algorithm, the widely used anti-collision algorithm is based on Time Division Multiple Access (TDMA) like ALOHA-based and Binary search-based anti-collision algorithm. The principle of the TDMA-based anti-collision algorithm is to narrow the response of tags to one in each query time. These avoidance anti-collision algorithms performance poor when the number of tags is huge, thus, some researchers proposed the Blind Source Separation (BSS)-based anti-collision algorithm. The blind anti-collision algorithms perform better than the TDMA-based algorithms; it is meaningful to do some more research about this filed. This paper uses several BSS algorithms like FastICA, PowerICA, ICA_p, and SNR_MAX to separate the mixed signals in the RFID system and compare the performance of them. Simulation results and analysis demonstrate that the ICA_p algorithm has the best comprehensive performance among the mentioned algorithms. The FastICA algorithm is very unstable, and has a lower separation success rate, and the SNR_MAX algorithm has the worst performance among the algorithms applied in the RFID system. Some advice for future work will be put up in the end.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2021 ◽  
pp. 1-10
Author(s):  
Jintao Tang ◽  
Lvqing Yang ◽  
Jiangsheng Zhao ◽  
Yishu Qiu ◽  
Yihui Deng

With the development of the Internet of Things and Radio Frequency Identification (RFID), indoor positioning technology as an important part of positioning technology, has been attracting much attention in recent years. In order to solve the problems of low precision, high cost and signal collision between readers, a new indoor positioning algorithm based on a single RFID reader combined with a Double-order Gated Recurrent Unit (GRU) are proposed in this paper. Firstly, the reader is moved along the specified direction to collect the sequential tag data. Then, the tag’s coordinate is taken as the target value to train models and compare them with existing algorithms. Finally, the best Gated Recurrent Unit positioning model is used to estimate the position of the tags. Experiment results show that the proposed algorithm can effectively improve positioning accuracy, reduce the number of readers, cut down the cost and eliminate the collisions of reader signals.


2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


Author(s):  
Isak Karabegović ◽  
Edina Karabegović ◽  
Mehmed Mahmic ◽  
Ermin Husak

From the very knowledge of Industry 4.0, its implementation is carried out in all segments of society, but we still do not fully understand the breadth and speed of its implementation. We are currently witnessing major changes in all industries, so new business methods are emerging. There is a transformation of production systems, a new form of consumption, delivery, and transportation, all thanks to the implementation of new technological discoveries that cover robotics and automation, the internet of things (IoT), 3D printers, smart sensors, radio frequency identification (RFID), etc. Robotic technology is one of the most important technologies in Industry 4.0, so that the robot application in the automation of production processes with the support of information technology brings us to smart automation (i.e., smart factories). The changes are so deep that, from the perspective of human history, there has never been a time of greater promise or potential danger.


Author(s):  
Mutwalibi Nambobi ◽  
Rajab Ssemwogerere ◽  
Badru K. Ramadhan

This is an interesting time to innovate around disruptive technologies like the internet of things (IoT), machine learning, blockchain. Autonomous assistants (IoT) are the electro-mechanical system that performs any prescribed task automatically with no human intervention through self-learning and adaptation to changing environments. This means that by acknowledging autonomy, the system has to perceive environments, actuate a movement, and perform tasks with a high degree of autonomy. This means the ability to make their own decisions in a given set of the environment. It is important to note that autonomous IoT using radio frequency identification (RFID) technology is used in educational sectors to boost the research the arena, improve customer service, ease book identification and traceability of items in the library. This chapter discusses the role, importance, the critical tools, applicability, and challenges of autonomous IoT in the library using RFID technology.


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


Author(s):  
Maurice Dawson

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5460 ◽  
Author(s):  
Franck Kimetya Byondi ◽  
Youchung Chung

This paper presents a passive cavity type Ultra High Frequency (UHF) Radio Frequency Identification (RFID) tag antenna having the longest read-range, and compares it with existing long-range UHF RFID tag antenna. The study also demonstrates mathematically and experimentally that our proposed longest-range UHF RFID cavity type tag antenna has a longer read-range than existing passive tag antennas. Our tag antenna was designed with 140 × 60 × 10 mm3 size, and reached 26 m measured read-range and 36.3 m mathematically calculated read-range. This UHF tag antenna can be applied to metal and non-metal objects. By adding a further sensing capability, it can have a great benefit for the Internet of Things (IoT) and wireless sensor networks (WSN).


Sign in / Sign up

Export Citation Format

Share Document