doi: 10.17586/2226-1494-2022-22-1-67-73


An algorithm for detecting RFID-duplicates

N. V. Voloshina, A. A. Lavrinovich


Read the full article  ';
Article in Russian

For citation:
Voloshina N.V., Lavrinovich A.A. An algorithm for detecting RFID duplicates. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 1, pp. 67–73 (in Russian). doi: 10.17586/2226-1494-2022-22-1-67-73


Abstract
The problem of using duplicate RFID tags by attackers is becoming more and more actual with the expansion of RFID technology for marking imported goods. The duplicate may contain information about goods, which differs from their actual characteristics. This paper proposes an algorithm for detecting RFID duplicates as a method for achieving the integrity of information that enters the information systems of international goods transportation. The relevance of creating an algorithm deals with the need to reduce the risk of creating and using RFID duplicates by importers during the cross-border movement of marked goods. Existing duplicate detection algorithms are unsuitable for use in the RFID-marking system of goods imported into Russia. The algorithm hinders an attacker from reading data from the original RFID tag, which is necessary to create an RFID duplicate. The proposed algorithm is based on dividing the EPC memory area of an RFID tag into parts and using the tag self-destruction command (kill) to prevent unauthorized readings. The authors considered the scenarios for implementing the algorithm and identified the risks of using the algorithm. The algorithm is presented as a graphical model based on BPMN notation. The efficiency of the proposed algorithm was evaluated using the hypergeometric probability formula. The results of a selective check of RFID tags by the customs authorities were taken as the initial data. It is shown that, in comparison with the existing approach, the implementation of the algorithm in software and hardware complex increases the probability of detecting RFID duplicates, provided that control is carried out only in relation to high-risk declarants. The use of the algorithm reduces the risk of receiving distorted or inaccurate data in the information systems dealing with international goods transportation and increases the validity of legal and economic decisions taken in the information systems of customs authorities.

Keywords: RFID technology, RFID mark, RFID duplicate, RFID marking, information system, EPC memory, kill command, information integrity, marking of goods

References
  1. Kamaludin H., Mahdin H., Abawajy J.H. Clone tag detection in distributed RFID systems. PLoS ONE, 2018, vol. 13, no. 3, pp. e0193951. https://doi.org/10.1371/journal.pone.0193951
  2. Zanetti D., Capkun S., Juels A. Tailing RFID tags for clone detection. NDSS Symposium, 2013.
  3. Lehtonen M., Ostojic D., Ilic A., Michahelles F. Securing RFID systems by detecting tag cloning. Lecture Notes in Computer Science, 2009, vol. 5538, pp. 291–308. https://doi.org/10.1007/978-3-642-01516-8_20
  4. Jokhio I., Jokhio S.H., Baloch J.A. A novel security method to protect RFID cloning attacks. 2012. Available at: accessed: 28.07.2021).
  5. Shi J., Kywe S.M., Li Y. Batch clone detection in RFID-enabled supply chain. Proc. of the 2014 IEEE International Conference on RFID (IEEE RFID), Orlando, FL, USA, 2014, pp. 118–125. https://doi.org/10.1109/RFID.2014.6810721
  6. Chen X., Liu J., Wang X., Zhang X., Wang Y., Chen L. Combating tag cloning with COTS RFID devices. Proc. of the 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2018, pp. 1–9. https://doi.org/10.1109/SAHCN.2018.8397134
  7. Bu K., Xu M., Liu X., Luo J., Zhang S., Weng M. Deterministic detection of cloning attacks for anonymous RFID systems. IEEE Transactions on Industrial Informatics, 2015, vol. 11, no. 6, pp. 1255–1266. https://doi.org/10.1109/TII.2015.2482921
  8. Jin B., Jin H. Security analysis of RFID based on multiple readers. Procedia Engineering, 2011, vol. 15, pp. 2598–2602. https://doi.org/10.1016/j.proeng.2011.08.488
  9. Finkenzeller K. RFID Handbook Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication. Wiley, 2010, 480 p.
  10. VoloshinaN.V., LavrinovichA.A. Recommendations for automatic detection RFID-mark duplicates by customs bodies. “Customs readings 2020. Strategy 2030: challenges, science and innovations”. Proceedings of the International scientific and practical conference. St. Petersburg, 2020, pp. 88–93. (in Russian)
  11. Okpara O. Detecting Cloning Attack in Low-Cost Passive RFID Tags. 2015. Available at: https://www.researchgate.net/publication/280077859_Detecting_Cloning_Attack_in_Low-Cost_Passive_RFID_Tags(accessed: 28.07.2021). https://doi.org/10.13140/RG.2.1.1709.4240
  12. Mitrokotsa A., Rieback M.R., Tanenbaum A.S. Classifying RFID attacks and defenses.Information Systems Frontiers, 2010, vol. 12, no. 5, pp. 491–505. https://doi.org/10.1007/s10796-009-9210-z
  13. Huang W., Zhang Y., Feng Y. ACD: An adaptable approach for RFID cloning attack detection. Sensors, 2020, vol. 20, no. 8, pp. 2378. https://doi.org/10.3390/s20082378


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика