阻塞阻塞器:密集RFID系统中基于aloha的阻塞标签不可知标签读取协议

Mahendran Veeramani, Chandrika J. Satyavolu, S. Radhakrishnan, V. Sarangan
{"title":"阻塞阻塞器:密集RFID系统中基于aloha的阻塞标签不可知标签读取协议","authors":"Mahendran Veeramani, Chandrika J. Satyavolu, S. Radhakrishnan, V. Sarangan","doi":"10.1109/ANTS.2014.7057281","DOIUrl":null,"url":null,"abstract":"Blocker tags are special-tags conceived to protect the customers privacy from unauthorized readers that viciously attempt to read the RFID tagged products carried by them. Unlike normal RFID tags, the blocker tag participates repeatedly in a tag-reading process and generates fake tag-IDentifiers (IDs). In all other respects it behaves well like a normal tag so that a reader invariably treats each fake ID as if it were a true ID from an actual tag. In other words, the blocker tag emulates multiple tags in the system. The reader's output is therefore obscured with an indistinguishable mix of fake-IDs and actual tag IDs. In an ALOHA-based tag reading system, a blocker tag probabilistically participates in the MAC protocol arbitrated by the reader. The higher the probability more contaminated the reader's result (with fake-IDs), and higher degree of protection from privacy snooping. Despite the salient use of the blocker tags, they can also be used maliciously to perform a Denial-of-Service attack on a trusted reader. As a result, the reader indefinitely interrogates the tags, and also incapable of isolating the actual tags in the system. While existing works detect and/or identify blocker tags in the system; to the best of our knowledge, there is no automated solution proposed to enable an authorized industry-compatible ALOHA-based RFID reader to perform a time-bounded effective tag-reading in the presence of a malicious blocker tag. In this paper, we present a simple yet novel solution to detect and jam the blocker tag from interrupting an on-going ALOHA-based tag-reading process. Through mathematical investigation and subsequent validation by simulation, we demonstrate the effectiveness of our solution.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Block the blocker: A blocker-tag agnostic ALOHA-based tag reading protocol in dense RFID system\",\"authors\":\"Mahendran Veeramani, Chandrika J. Satyavolu, S. Radhakrishnan, V. Sarangan\",\"doi\":\"10.1109/ANTS.2014.7057281\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Blocker tags are special-tags conceived to protect the customers privacy from unauthorized readers that viciously attempt to read the RFID tagged products carried by them. Unlike normal RFID tags, the blocker tag participates repeatedly in a tag-reading process and generates fake tag-IDentifiers (IDs). In all other respects it behaves well like a normal tag so that a reader invariably treats each fake ID as if it were a true ID from an actual tag. In other words, the blocker tag emulates multiple tags in the system. The reader's output is therefore obscured with an indistinguishable mix of fake-IDs and actual tag IDs. In an ALOHA-based tag reading system, a blocker tag probabilistically participates in the MAC protocol arbitrated by the reader. The higher the probability more contaminated the reader's result (with fake-IDs), and higher degree of protection from privacy snooping. Despite the salient use of the blocker tags, they can also be used maliciously to perform a Denial-of-Service attack on a trusted reader. As a result, the reader indefinitely interrogates the tags, and also incapable of isolating the actual tags in the system. While existing works detect and/or identify blocker tags in the system; to the best of our knowledge, there is no automated solution proposed to enable an authorized industry-compatible ALOHA-based RFID reader to perform a time-bounded effective tag-reading in the presence of a malicious blocker tag. In this paper, we present a simple yet novel solution to detect and jam the blocker tag from interrupting an on-going ALOHA-based tag-reading process. Through mathematical investigation and subsequent validation by simulation, we demonstrate the effectiveness of our solution.\",\"PeriodicalId\":333503,\"journal\":{\"name\":\"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)\",\"volume\":\"128 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANTS.2014.7057281\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2014.7057281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

拦截标签是一种特殊的标签,旨在保护客户的隐私,防止未经授权的读取器恶意尝试读取他们携带的RFID标签产品。与普通的RFID标签不同,拦截器标签反复参与标签读取过程,并生成假的标签标识符(id)。在所有其他方面,它都表现得像一个正常的标签,因此阅读器总是将每个假ID视为来自实际标签的真实ID。换句话说,拦截器标签模拟系统中的多个标签。因此,阅读器的输出被假id和实际标签id的难以区分的混合所掩盖。在基于aloha的标签读取系统中,拦截器标签有可能参与由阅读器仲裁的MAC协议。概率越高,读者的结果就越受污染(假id),对隐私窥探的保护程度也越高。尽管拦截器标签的显著用途,但它们也可以恶意地用于对受信任的读取器执行拒绝服务攻击。因此,阅读器无限期地询问标签,并且也无法隔离系统中的实际标签。当现有工作检测和/或识别系统中的拦截标签时;据我们所知,目前还没有提出自动化的解决方案,使授权的行业兼容的基于aloha的RFID读取器能够在存在恶意拦截器标签的情况下执行有时间限制的有效标签读取。在本文中,我们提出了一个简单而新颖的解决方案,以检测和干扰拦截器标签中断正在进行的基于aloha的标签读取过程。通过数学研究和随后的仿真验证,我们证明了我们的解决方案的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Block the blocker: A blocker-tag agnostic ALOHA-based tag reading protocol in dense RFID system
Blocker tags are special-tags conceived to protect the customers privacy from unauthorized readers that viciously attempt to read the RFID tagged products carried by them. Unlike normal RFID tags, the blocker tag participates repeatedly in a tag-reading process and generates fake tag-IDentifiers (IDs). In all other respects it behaves well like a normal tag so that a reader invariably treats each fake ID as if it were a true ID from an actual tag. In other words, the blocker tag emulates multiple tags in the system. The reader's output is therefore obscured with an indistinguishable mix of fake-IDs and actual tag IDs. In an ALOHA-based tag reading system, a blocker tag probabilistically participates in the MAC protocol arbitrated by the reader. The higher the probability more contaminated the reader's result (with fake-IDs), and higher degree of protection from privacy snooping. Despite the salient use of the blocker tags, they can also be used maliciously to perform a Denial-of-Service attack on a trusted reader. As a result, the reader indefinitely interrogates the tags, and also incapable of isolating the actual tags in the system. While existing works detect and/or identify blocker tags in the system; to the best of our knowledge, there is no automated solution proposed to enable an authorized industry-compatible ALOHA-based RFID reader to perform a time-bounded effective tag-reading in the presence of a malicious blocker tag. In this paper, we present a simple yet novel solution to detect and jam the blocker tag from interrupting an on-going ALOHA-based tag-reading process. Through mathematical investigation and subsequent validation by simulation, we demonstrate the effectiveness of our solution.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信