Detecting Clone Radio Frequency Identification Tags
نویسنده
چکیده
Declaration This thesis contains no material which has been accepted for the award of any other degree or diploma in any tertiary institution, and to my knowledge and belief, this thesis contains no material previously published or written by another person except where due reference is made in the text of the thesis. Abstract II Abstract The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning, is a serious threat to RFID systems. It can enable an attacker to gain access to a secure facility, make fraudulent purchases, or disrupt supply chains. It may even enable crimes like financial gain, people smuggling, and drug trafficking, terrorism and money laundering. Presently there is no practical solution to defend against tag cloning. This thesis details research that aims to detect the presence of clone tags which may be the first step in defending against them and preventing RFID-enabled crimes from occurring. An intrusion detection system has been developed using statistical anomaly detection to identify clone tags. The feasibility of the approach has been tested by evaluating its performance in detecting synthesized attacks inside a sanitized RFID audit log. The results suggest that intrusion detection systems can be used to detect cloned tags but that the weaknesses of statistical anomaly detection are also apparent when used on RFID data.
منابع مشابه
Detecting Cloning Attack in Low-Cost Passive RFID Tags An Analytic Comparison between KILL Passwords and Synchronized Secrets
Radio Frequency Identification (RFID) technology plays an important role in many sectors today without assuredly taking care of privacy and security issues. One of the most prevalent security issue in RFID is the cloning attack on tags. Most countries now use RFID as a means of verification in electronic passports (epassports). A terrorist that is able to successfully clone the RFID tag on a pa...
متن کاملTailing RFID Tags for Clone Detection
RFID (Radio-Frequency IDentification) is a key emerging technology for supply-chain monitoring and detection of counterfeit and grey-market goods. The most prevalent RFID tags are, however, simply “wireless barcodes,” themselves vulnerable to cloning and counterfeiting. While continuous monitoring can, in principle, detect cloning attacks, real-world supply chains often contain significant blin...
متن کاملA Knowledge-Based Registration System Using Radio-Frequency Identification
Attaching visual tags such as barcodes to some elements in a scene allows applications such as navigation, handling industrial objects, or augmented reality. In the past few years, a new type of non-visual tags has been the object of intensive developments: Radio-Frequency (RF) Tags. In this paper we present the architecture of a machine vision system that uses RF Tag identification (RFID). RFI...
متن کاملClone Resistant Mutual Authentication for Low-Cost RFID and Contactless Credit Cards
With Radio Frequency Identification (RFID) tags being used to secure contactless credit cards, great benefits but also serious security and information privacy issues have arisen. Recently many attempts have been made to resolve these issues. In particular, attempts have been made to provide a means for authentication between tag and reader. However, none have yet have been able to provide resi...
متن کاملAn Analysis of Authentication for Passive RFID Tags
RFID (Radio Frequency Identification) tags have become pervasive for identifying objects, people and pets, automated payment and theftdeterrents. However, assurance of tag identity has not been built into the RFID environment. Privacy by means of encryption can prevent the data from being human readable but cannot stop a clone being created. This paper considers recent approaches that have been...
متن کامل