Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2018 Mar 22;13(3):e0193951.
doi: 10.1371/journal.pone.0193951. eCollection 2018.

Clone tag detection in distributed RFID systems

Affiliations

Clone tag detection in distributed RFID systems

Hazalila Kamaludin et al. PLoS One. .

Abstract

Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

PubMed Disclaimer

Conflict of interest statement

Competing Interests: The authors have declared that no competing interests exist.

Figures

Fig 1
Fig 1. Multitier middleware architecture ([28]).
Fig 2
Fig 2. Distributed RFID supply chain system.
Fig 3
Fig 3. Mapping of base stream into modified count-min sketch.
Fig 4
Fig 4. CM sketch visualization of initial, map and update reading for three readers.
Fig 5
Fig 5. Execution time of MCH with 60% packing density and bucket sizes bs = 10, bs = 20, bs = 30, bs = 40 and bs = 50.
Fig 6
Fig 6. Comparison of execution times for detecting clone tag.
Fig 7
Fig 7. Comparison of clone detection accuracy between DeClone and BASE in varying number of clone IDs.
Fig 8
Fig 8. Comparison of clone detection accuracy between MCH, DeClone and BASE in varying number of clone IDs.

Similar articles

Cited by

References

    1. J. Abawajy, “Enhancing RFID tag resistance against cloning attack,” in Network and System Security, 2009. NSS’09. Third International Conference on, 2009, pp. 18–23.
    1. Huang Y., Xu Y., Qi S., Fang X., and Yin X., “Recent Patents on RFID-Based Logistics Management Systems,” Recent Patents Mech. Eng., vol. 9, no. 1, pp. 26–36, 2016.
    1. Kamaludin H., Mahdin H., and Abawajy J. H., “Filtering Redundant Data from RFID Data Streams,” J. Sensors, vol. 2016, 2015. - PMC - PubMed
    1. Mahdin H., Kamaludin H., Saedudin R. D. R., Omar A. H., Kasim S., and Jailani J., “The Application of RFID System in Water Level Monitoring,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 7, no. 4–2, pp. 1522–1527, 2017.
    1. N. Alzahrani and N. Bulusu, “Securing Pharmaceutical and High-Value Products against Tag Reapplication Attacks Using NFC Tags,” in Smart Computing (SMARTCOMP), 2016 IEEE International Conference on, 2016, pp. 1–6.

Publication types

MeSH terms

LinkOut - more resources