Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Fast and scalable counterfeits estimation for large-scale RFID systems

Published: 01 April 2016 Publication History

Abstract

Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, and the communication overhead and time cost grow linearly with increasing size of tags. We design a fast and scalable counterfeits estimation scheme, INformative Counting (INC), which achieves sublinear authentication time and communication cost in batch verifications. The key novelty of INC builds on an FM-Sketch variant authentication synopsis that can capture key counting information using only sublinear space. With the help of this well-designed data structure, INC is able to provide authentication results with accurate estimates of the number of counterfeiting tags and genuine tags, while previous batch authentication methods merely provide 0/1 results indicating the existence of counterfeits. We conduct detailed theoretical analysis and extensive experiments to examine this design and the results show that INC significantly outperforms previous work in terms of effectiveness and efficiency.

References

[1]
T. Staake, F. Thiesse, and E. Fleisch, "Business strategies in the counterfeit market," J. Business Res., vol. 65, no. 5, pp. 658--665, 2012.
[2]
"Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights," Counterfeiting Intelligence Bureau, Int. Chamber of Commerce, Paris, France, 1997.
[3]
"The spread of counterfeiting: Knock-offs catch on," The Economist, Mar. 2010.
[4]
S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," Security in Pervasive Computing, pp. 50--59, 2004.
[5]
L. Lu, J. Han, L. Hu, Y. Liu, and L. Ni, "Dynamic key-updating: Privacy-preserving authentication for RFID systems," in Proc. IEEE PERCOM, 2007.
[6]
L. Lu, J. Han, R. Xiao, and Y. Liu, "Action: Breaking the privacy barrier for RFID systems," in Proc. IEEE INFOCOM, 2009.
[7]
L. Yang, J. Han, Y. Qi, and Y. Liu, "Identification-free batch authentication for RFID tags," in Proc. IEEE ICNP, 2010.
[8]
L. Bolotnyy and G. Robins, "Physically unclonable function-based security and privacy in RFID systems," in Proc. IEEE PERCOM, 2007.
[9]
Y. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol," in Proc. IEEE RFID, 2008.
[10]
Y. Lee, L. Batina, and I. Verbauwhede, "Untraceable RFID authentication protocols: Revision of EC-RAC," in Proc. IEEE RFID, 2009.
[11]
L. Roberts, "Aloha packet system with and without slots and capture," ACM SIGCOMM Comput. Commun. Rev., vol. 5, no. 2, pp. 28--42, 1975.
[12]
B. Sheng, Q. Li, and W. Mao, "Efficient continuous scanning in RFID systems," in Proc. IEEE INFOCOM, 2010.
[13]
D. Benedetti, G. Maselli, and C. Petrioli, "Fast identification of mobile RFID tags," in Proc. IEEE MASS, 2012.
[14]
T. La Porta, G. Maselli, and C. Petrioli, "Anticollision protocols for single-reader RFID systems: Temporal analysis and optimization," IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 267--279, 2011.
[15]
R. Kumar, T. La Porta, G. Maselli, and C. Petrioli, "Interference cancellation-based RFID tags identification," in Proc. ACM MSWiM, 2011.
[16]
J. Capetanakis, "Tree algorithms for packet broadcast channels," IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 505--515, 1979.
[17]
J. Myung and W. Lee, "Adaptive splitting protocols for RFID tag collision arbitration," in Proc. ACM MobiHoc, 2006.
[18]
Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz--960 MHz, EPCglobal Inc., 2008 {Online}. Available: http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf
[19]
Information Technology Radio Frequency Identification for Item Management Part 6: Parameters for Air Interface Communications at 860 MHz to 960 MHz, ISO.org, 2010 {Online}. Available: www.iso.org/iso/RFID_toc.pdf
[20]
T. Dimitriou, "A secure and efficient RFID protocol that could make Big Brother (partially) obsolete," in Proc. IEEE PERCOM, 2006.
[21]
L. Lu, Y. Liu, and X.-Y. Li, "Refresh: Weak privacy model for RFID systems," in Proc. IEEE INFOCOM, 2010.
[22]
M. Kodialam and T. Nandagopal, "Fast and reliable estimation schemes in RFID systems," in Proc. ACM MOBICOM, 2006.
[23]
C. Qian, H. Ngan, Y. Liu, and L. Ni, "Cardinality estimation for large-scale RFID systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 9, pp. 1441--1454, 2011.
[24]
Y. Zheng and M. Li, "PET: Probabilistic estimating tree for large-scale RFID estimation," IEEE Trans. Mobile Comput., vol. 11, no. 11, pp. 1763--1774, 2012.
[25]
M. Shahzad and A. Liu, "Every bit counts---Fast and scalable RFID estimation," in Proc. ACM MOBICOM, 2012.
[26]
T. Li, S. S. Wu, S. Chen, and M. C. K. Yang, "Generalized energy-efficient algorithms for the RFID estimation problem," IEEE/ACM Trans. Networking, vol. 20, no. 6, pp. 1978--1990, Dec. 2012.
[27]
Y. Zheng and M. Li, "Zoe: Fast cardinality estimation for large-scale RFID systems," in Proc. IEEE INFOCOM, 2013.
[28]
B. Chen, Z. Zhou, and H. Yu, "Understanding RFID counting protocols," in Proc. ACM MOBICOM, 2013.
[29]
P. Cole and D. Ranasinghe, "Networked RFID systems," Networked RFID Systems and Lightweight Cryptography, pp. 45--58, 2008.
[30]
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, "Design and implementation of puf-based unclonable RFID ics for anti-counterfeiting and security applications," in Proc. IEEE RFID, 2008.
[31]
R. Zhang, Y. Liu, Y. Zhang, and J. Sun, "Fast identification of the missing tags in a large RFID system," in Proc. IEEE SECON, 2011.
[32]
P. Flajolet and G. Nigel Martin, "Probabilistic counting algorithms for data base applications," J. Comput. Syst. Sci., vol. 31, no. 2, pp. 182--209, 1985.
[33]
R. Motwani and P. Raghavan, Randomized Algorithms. London, U.K.: Chapman & Hall/CRC, 2010.
[34]
P. Bullen, Handbook of Means and Their Inequalities. New York, NY, USA: Springer, 2003.
[35]
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, "Design and implementation of puf-based unclonable RFID ics for anti-counterfeiting and security applications," in Proc. IEEE RFID, 2008.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 24, Issue 2
April 2016
646 pages
ISSN:1063-6692
Issue’s Table of Contents

Publisher

IEEE Press

Publication History

Published: 01 April 2016
Published in TON Volume 24, Issue 2

Author Tags

  1. RFID tags
  2. counterfeits estimation
  3. informative counting

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)i-Sample: Augment Domain Adversarial Adaptation Models for WiFi-based HARACM Transactions on Sensor Networks10.1145/361649420:2(1-20)Online publication date: 10-Jan-2024
  • (2024)Bidirectional Bluetooth Backscatter With EdgesIEEE Transactions on Mobile Computing10.1109/TMC.2023.324120223:2(1601-1612)Online publication date: 1-Feb-2024
  • (2023)Heartbeating With LTE Networks for Ambient BackscatterIEEE Transactions on Mobile Computing10.1109/TMC.2023.329029823:5(4246-4258)Online publication date: 28-Jun-2023
  • (2022)Content-agnostic backscatter from thin airProceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services10.1145/3498361.3538930(343-356)Online publication date: 27-Jun-2022
  • (2017)Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable ChannelsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2017.269968325:4(2528-2539)Online publication date: 1-Aug-2017
  • (2017)Toward More Rigorous and Practical Cardinality Estimation for Large-Scale RFID SystemsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2016.263455125:3(1347-1358)Online publication date: 1-Jun-2017
  • (2016)Fast Composite Counting in RFID SystemsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2015.248368124:5(2756-2767)Online publication date: 1-Oct-2016

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media