LI Peng, WANG Zhen, XU He, ZHU Feng, WANG Ruchuan. Intrusion Detection Methods Based on Incomplete RFID Traces[J]. Chinese Journal of Electronics, 2017, 26(4): 675-680. doi: 10.1049/cje.2017.03.011
Citation: LI Peng, WANG Zhen, XU He, ZHU Feng, WANG Ruchuan. Intrusion Detection Methods Based on Incomplete RFID Traces[J]. Chinese Journal of Electronics, 2017, 26(4): 675-680. doi: 10.1049/cje.2017.03.011

Intrusion Detection Methods Based on Incomplete RFID Traces

doi: 10.1049/cje.2017.03.011
Funds:  This work is supported by the National Natural Science Foundation of China (No.61572260, No.61572261, No.61672296, No.61602261), the Natural Science Foundation of Jiangsu Province (No.BK20140886, No.BK20140888), Scientific & Technological Support Project of Jiangsu Province (No.BE2015702, No.BE2016777, No.BE2016185), Natural Science Key Fund for Colleges and Universities in Jiangsu Province (No.12KJA520002), China Postdoctoral Science Foundation (No.2014M551636, No.2014M561696), Jiangsu Planned Projects for Postdoctoral Research Funds (No.1302090B, No.1401005B), and Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Foundation (No.WSNLBZY201508).
  • Received Date: 2016-04-18
  • Rev Recd Date: 2016-08-01
  • Publish Date: 2017-07-10
  • According to the Radio frequency identification (RFID) tag cloning attack problems of RFID system and the existing problems of intrusion detection research based on incomplete RFID traces, this paper proposes a method of intrusion detection by combining the Markov chain technology and probability statistics technology. We use this method to calculate the threshold that is used to determine whether the tag event is a cloning tag intrusion one. Current research focuses on RFID intrusion detection under the condition of complete RFID traces, such as encryption algorithm improvement, tag authentication protocol improvement, and track and trace technology in RFID supply chain. RFID traces are occasionally to be incomplete, which causes the above methods to be inefficient. Our method proposed in this paper is the solution to incomplete RFID traces which makes up for the study of RFID intrusion detection research.
  • loading
  • A. Juels, “RFID security and privacy: A research survey”, Selected Areas in Communications (IEEE 2006), Vol.24, No.2, pp.381-394, 2006.
    M. Esposito and G.D. Vecchia, “An ontology-based intrusion detection for RFID systems”, Technological Developments in Networking, Education and Automation, Springer, Netherlands, pp.467-472, 2010.
    W. Jakkhupan, S. Arch-Int and Y. Li, “Business process analysis and simulation for the RFID and EPC global Network enabled supply chain: A proof-of-concept approach”, Journal of Network & Computer Applications, Vol.34, No.3, pp.949-957, 2011.
    D. Rumley, S. Chaturvedi and V. Sakhuja V, “RFID data management: Challenges and opportunities”, IEEE International Conference on RFID (IEEE ICR 2007), Vol.14, No.1, pp.175-182, 2007.
    S.R. Jeffery, M. Garofalakis and M.J. Franklin, “Adaptive cleaning for RFID data streams”, International Conference on Very Large Data Bases, Seoul, Korea, pp.163-174, 2007.
    A. Boryssenko and E. Boryssenko, “Antenna array design for HF RFID smart cabinet”, Microwaves, Communications, Antennas and Electronics Systems (IEEE COMCAS 2011), pp.1-3, 2011.
    J. Patton, “RFID as electronic article surveillance: Feasibility assessment”, Dissertations & Theses-Gradworks, pp.101-103, 2008.
    J. Brusey, C. Floerkemeier, M. Harrison, et al., “Reasoning about uncertainty in location identification with RFID”, Workshop on Reasoning with Uncertainty in Robotics at IJCAI-2003, pp.53-55, 2004.
    S.R. Jeffery, G. Alonso, M.J. Franklin, et al., “Declarative support for sensor data cleaning”, Lecture Notes in Computer Science (LNCS 2006), Vol.3968, pp.83-100, 2006.
    X.M. Yang, X. Zhang, J.H. Wang, et al., “RFID intrusion detection with finite automation”, Journal of University of Electronic Science & Technology of China (UESTC 2014), Vol.5, No.8, pp.32-34, 2014.
    L.I. Xiongfeng and G. Guan, “A hybrid fuzzy/genetic algorithm for intrusion detection in RFID systems”, RFID Systems Cloning Detection Hybrid Genetic Fuzzy Systems Fuzzy Logic Fuzzy Systems Soft Computing Genetic Algorithms, Vol.26, No.9, pp.1037-1040, 2012.
    M. Humayun, M.Z. Degefa, B.J.O. Sousa, et al., “Markov model based assessment for redundancy mitigation in high voltage grids using demand response”, International Review of Electrical Engineering (IREE 2013), Vol.8, No.8, pp.1349-1362, 2013.
    J. Shi, Y. Li, W. He, et al., “SecTTS: A secure track & trace system for RFID-enabled supply chains”, Computers in Industry (CI 2012), Vol.63, No.6, pp.574-585, 2012.
    Wang Xao-yan, Dong Lu, Xu Chao, et al., “Location privacyh protecting based on anonymous technology in wireless sensor networks”, The Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP 2015), Nanjing, China, pp.229-235, 2015.
    G. Thamilarasu and R. Sridhar, “Intrusion detection in RFID systems”, International Journal on Computer Science & Engineering (IJCSE 2008), Vol.20, No.1, pp.676-683, 2008.
    S.A. Zonouz, H. Khurana, W.H. Sanders, et al., “RRE: A gametheoretic intrusion response and recovery engine”, IEEE Transactions on Parallel & Distributed Systems (IEEE TPDS 2014), Vol.25, No.2, pp.395-406, 2014.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1910) PDF downloads(405) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint