Abstract
Tag cloning attacks threaten a variety of Radio Frequency Identification (RFID) applications but are hard to prevent. To secure RFID applications that confine tagged objects in the same RFID system, this paper studies the cloned-tag identification problem. Although limited existing work has shed some light on the problem, designing fast cloned-tag identification protocols for applications in large-scale RFID systems is yet not thoroughly investigated. To this end, we propose leveraging broadcast and collisions to identify cloned tags. This approach relieves us from resorting to complex cryptography techniques and time-consuming transmission of tag IDs. Based on this approach, we derive a time lower bound on cloned-tag identification and propose a suite of time-efficient protocols toward approaching the time lower bound. The execution time of our protocol is only 1.4 times the value of the time lower bound, being up to 91% less than that of the existing protocol. The proposed protocols may benefit also RFID applications that distribute tagged objects across multiple places.
Original language | English |
---|---|
Title of host publication | 2012 IEEE 20th International Workshop on Quality of Service, IWQoS 2012 |
DOIs | |
Publication status | Published - 28 Sept 2012 |
Event | 2012 IEEE 20th International Workshop on Quality of Service, IWQoS 2012 - Coimbra, Portugal Duration: 4 Jun 2012 → 5 Jun 2012 |
Conference
Conference | 2012 IEEE 20th International Workshop on Quality of Service, IWQoS 2012 |
---|---|
Country/Territory | Portugal |
City | Coimbra |
Period | 4/06/12 → 5/06/12 |
ASJC Scopus subject areas
- Electrical and Electronic Engineering