• DocumentCode
    1480366
  • Title

    Probabilistic Analysis of Blocking Attack in RFID Systems

  • Author

    Vahedi, Ehsan ; Shah-Mansouri, Vahid ; Wong, Vincent W S ; Blake, Ian F. ; Ward, Rabab K.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of British Columbia, Vancouver, BC, Canada
  • Volume
    6
  • Issue
    3
  • fYear
    2011
  • Firstpage
    803
  • Lastpage
    817
  • Abstract
    Radio-frequency identification (RFID) is a ubiquitous wireless technology which allows objects to be identified automatically. An RFID tag is a small electronic device with an antenna and has a unique serial number. Using RFID tags can simplify many applications and provide many benefits. Meanwhile, the privacy of the customers should be taken into account. A potential threat for the privacy of a user is that of anonymous readers obtaining information about the tags in the system. The use of a blocker tag has been proposed as a solution to avoid unwanted tag interrogations. A blocker tag can simulate all or a portion of tag IDs in the system. This prevents the malicious readers from identifying the tags and obtaining information from the system. Although this solution is simple to implement and has a low cost, it may add another threat to the RFID system if used as a malicious tool to attack the system. A malicious blocker tag can deteriorate the performance of an RFID system by simulating fake tag IDs. In this paper, we study the use of blocker tags for malicious attacks that can prevent nearby legitimate readers from correctly receiving the reply messages from the tags. The blocker attack is a medium access control (MAC)-layer denial of service (DoS) threat and we propose a lower-layer solution for this attack. We mathematically model the blocker attack for RFID systems which operate based on the binary tree walking or ALOHA singulation techniques. Using the developed analytical framework, we propose a probabilistic blocker tag detection (P-BTD) algorithm to detect the presence of an attacker in the RFID system. The P-BTD algorithm can detect the existence of a blocker tag using the information extracted from the interrogations performed by the reader. Simulation results show that our proposed algorithm has a better performance than the threshold-based detection algorithm in terms of the number of required interrogations.
  • Keywords
    probability; radiofrequency identification; telecommunication security; ALOHA singulation technique; RFID systems; RFID tag; blocking attack; electronic device; medium access control-layer denial of service threat; probabilistic analysis; probabilistic blocker tag detection; radio-frequency identification; ubiquitous wireless technology; Binary trees; Elliptic curve cryptography; Legged locomotion; Probabilistic logic; RFID tags; Binary tree walking; blocking attack; framed ALOHA; radio-frequency identification (RFID); tag singulation;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2011.2132129
  • Filename
    5738682