Tailing RFID Tags for Clone Detection

نویسندگان

  • Davide Zanetti
  • Srdjan Capkun
  • Ari Juels
چکیده

RFID (Radio-Frequency IDentification) is a key emerging technology for supply-chain monitoring and detection of counterfeit and grey-market goods. The most prevalent RFID tags are, however, simply “wireless barcodes,” themselves vulnerable to cloning and counterfeiting. While continuous monitoring can, in principle, detect cloning attacks, real-world supply chains often contain significant blind zones where tag readings are unavailable, allowing attackers to inject counterfeit goods with cloned tags into supply chains undetectably. This paper introduces tailing, a novel approach, both simple and practical, for detecting cloned RFID tags in supply chains. With tailing, RFID readers write random values to tags as they pass through a supply chain, creating in each tag a tail composed of random values. The tails of legitimate tags and cloned ones diverge over time, making cloning detectable by a centralized detector even across blind zones. We show that tailing works with existing barcode-type tags (e.g., EPC tags). The centralized detector is noninteractive, and requires no modification of existing supplychain data flows. We characterize the cloning-detection efficacy of tailing analytically and through supply-chain simulations, showing that tailing presents high detection rates and low false positive rates, as well as rate tradeoffs outperforming those of previous schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Clone Radio Frequency Identification Tags

Declaration This thesis contains no material which has been accepted for the award of any other degree or diploma in any tertiary institution, and to my knowledge and belief, this thesis contains no material previously published or written by another person except where due reference is made in the text of the thesis. Abstract II Abstract The theft of Radio Frequency Identification (RFID) tag i...

متن کامل

افزایش سرعت شناسایی در سیستم‌های RFID

Radio frequency identification (RFID) is a new generation of automatic identification systems, based on wireless communication technology. In these systems all the tags using one communication channel to communicate with the reader. When two or more tags transmit their data to the reader simultaneously, their transmitted signals will collide. Resolving this collision has a direct impact on the ...

متن کامل

Clone tag detection in distributed RFID systems

Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand d...

متن کامل

Detecting Cloning Attack in Low-Cost Passive RFID Tags An Analytic Comparison between KILL Passwords and Synchronized Secrets

Radio Frequency Identification (RFID) technology plays an important role in many sectors today without assuredly taking care of privacy and security issues. One of the most prevalent security issue in RFID is the cloning attack on tags. Most countries now use RFID as a means of verification in electronic passports (epassports). A terrorist that is able to successfully clone the RFID tag on a pa...

متن کامل

Securing RFID Systems by Detecting Tag Cloning

Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The security community and the RFID chip manufacturers are currently focused on the former by making tags hard to clone. This paper focuses on the latter by investigating a method to pinpoint tags with the same ID. This method is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013