Menu
Publications
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
Editor-in-Chief
Nikiforov
Vladimir O.
D.Sc., Prof.
Partners
doi: 10.17586/2226-1494-2022-22-1-67-73
An algorithm for detecting RFID-duplicates
Read the full article ';
Article in Russian
For citation:
Abstract
For citation:
Voloshina N.V., Lavrinovich A.A. An algorithm for detecting RFID duplicates. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 1, pp. 67–73 (in Russian). doi: 10.17586/2226-1494-2022-22-1-67-73
Abstract
The problem of using duplicate RFID tags by attackers is becoming more and more actual with the expansion of RFID technology for marking imported goods. The duplicate may contain information about goods, which differs from their actual characteristics. This paper proposes an algorithm for detecting RFID duplicates as a method for achieving the integrity of information that enters the information systems of international goods transportation. The relevance of creating an algorithm deals with the need to reduce the risk of creating and using RFID duplicates by importers during the cross-border movement of marked goods. Existing duplicate detection algorithms are unsuitable for use in the RFID-marking system of goods imported into Russia. The algorithm hinders an attacker from reading data from the original RFID tag, which is necessary to create an RFID duplicate. The proposed algorithm is based on dividing the EPC memory area of an RFID tag into parts and using the tag self-destruction command (kill) to prevent unauthorized readings. The authors considered the scenarios for implementing the algorithm and identified the risks of using the algorithm. The algorithm is presented as a graphical model based on BPMN notation. The efficiency of the proposed algorithm was evaluated using the hypergeometric probability formula. The results of a selective check of RFID tags by the customs authorities were taken as the initial data. It is shown that, in comparison with the existing approach, the implementation of the algorithm in software and hardware complex increases the probability of detecting RFID duplicates, provided that control is carried out only in relation to high-risk declarants. The use of the algorithm reduces the risk of receiving distorted or inaccurate data in the information systems dealing with international goods transportation and increases the validity of legal and economic decisions taken in the information systems of customs authorities.
Keywords: RFID technology, RFID mark, RFID duplicate, RFID marking, information system, EPC memory, kill command, information integrity, marking of goods
References
References
-
Kamaludin H., Mahdin H., Abawajy J.H. Clone tag detection in distributed RFID systems. PLoS ONE, 2018, vol. 13, no. 3, pp. e0193951. https://doi.org/10.1371/journal.pone.0193951
-
Zanetti D., Capkun S., Juels A. Tailing RFID tags for clone detection. NDSS Symposium, 2013.
-
Lehtonen M., Ostojic D., Ilic A., Michahelles F. Securing RFID systems by detecting tag cloning. Lecture Notes in Computer Science, 2009, vol. 5538, pp. 291–308. https://doi.org/10.1007/978-3-642-01516-8_20
-
Jokhio I., Jokhio S.H., Baloch J.A. A novel security method to protect RFID cloning attacks. 2012. Available at: accessed: 28.07.2021).
-
Shi J., Kywe S.M., Li Y. Batch clone detection in RFID-enabled supply chain. Proc. of the 2014 IEEE International Conference on RFID (IEEE RFID), Orlando, FL, USA, 2014, pp. 118–125. https://doi.org/10.1109/RFID.2014.6810721
-
Chen X., Liu J., Wang X., Zhang X., Wang Y., Chen L. Combating tag cloning with COTS RFID devices. Proc. of the 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2018, pp. 1–9. https://doi.org/10.1109/SAHCN.2018.8397134
-
Bu K., Xu M., Liu X., Luo J., Zhang S., Weng M. Deterministic detection of cloning attacks for anonymous RFID systems. IEEE Transactions on Industrial Informatics, 2015, vol. 11, no. 6, pp. 1255–1266. https://doi.org/10.1109/TII.2015.2482921
-
Jin B., Jin H. Security analysis of RFID based on multiple readers. Procedia Engineering, 2011, vol. 15, pp. 2598–2602. https://doi.org/10.1016/j.proeng.2011.08.488
-
Finkenzeller K. RFID Handbook Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication. Wiley, 2010, 480 p.
-
VoloshinaN.V., LavrinovichA.A. Recommendations for automatic detection RFID-mark duplicates by customs bodies. “Customs readings 2020. Strategy 2030: challenges, science and innovations”. Proceedings of the International scientific and practical conference. St. Petersburg, 2020, pp. 88–93. (in Russian)
-
Okpara O. Detecting Cloning Attack in Low-Cost Passive RFID Tags. 2015. Available at: https://www.researchgate.net/publication/280077859_Detecting_Cloning_Attack_in_Low-Cost_Passive_RFID_Tags(accessed: 28.07.2021). https://doi.org/10.13140/RG.2.1.1709.4240
-
Mitrokotsa A., Rieback M.R., Tanenbaum A.S. Classifying RFID attacks and defenses.Information Systems Frontiers, 2010, vol. 12, no. 5, pp. 491–505. https://doi.org/10.1007/s10796-009-9210-z
-
Huang W., Zhang Y., Feng Y. ACD: An adaptable approach for RFID cloning attack detection. Sensors, 2020, vol. 20, no. 8, pp. 2378. https://doi.org/10.3390/s20082378