Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Fast and scalable counterfeits estimation for large-scale RFID systems

Published: 01 April 2016 Publication History
  • Get Citation Alerts
  • Abstract

    Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, and the communication overhead and time cost grow linearly with increasing size of tags. We design a fast and scalable counterfeits estimation scheme, INformative Counting (INC), which achieves sublinear authentication time and communication cost in batch verifications. The key novelty of INC builds on an FM-Sketch variant authentication synopsis that can capture key counting information using only sublinear space. With the help of this well-designed data structure, INC is able to provide authentication results with accurate estimates of the number of counterfeiting tags and genuine tags, while previous batch authentication methods merely provide 0/1 results indicating the existence of counterfeits. We conduct detailed theoretical analysis and extensive experiments to examine this design and the results show that INC significantly outperforms previous work in terms of effectiveness and efficiency.

    References

    [1]
    T. Staake, F. Thiesse, and E. Fleisch, "Business strategies in the counterfeit market," J. Business Res., vol. 65, no. 5, pp. 658--665, 2012.
    [2]
    "Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights," Counterfeiting Intelligence Bureau, Int. Chamber of Commerce, Paris, France, 1997.
    [3]
    "The spread of counterfeiting: Knock-offs catch on," The Economist, Mar. 2010.
    [4]
    S. Weis, S. Sarma, R. Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," Security in Pervasive Computing, pp. 50--59, 2004.
    [5]
    L. Lu, J. Han, L. Hu, Y. Liu, and L. Ni, "Dynamic key-updating: Privacy-preserving authentication for RFID systems," in Proc. IEEE PERCOM, 2007.
    [6]
    L. Lu, J. Han, R. Xiao, and Y. Liu, "Action: Breaking the privacy barrier for RFID systems," in Proc. IEEE INFOCOM, 2009.
    [7]
    L. Yang, J. Han, Y. Qi, and Y. Liu, "Identification-free batch authentication for RFID tags," in Proc. IEEE ICNP, 2010.
    [8]
    L. Bolotnyy and G. Robins, "Physically unclonable function-based security and privacy in RFID systems," in Proc. IEEE PERCOM, 2007.
    [9]
    Y. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol," in Proc. IEEE RFID, 2008.
    [10]
    Y. Lee, L. Batina, and I. Verbauwhede, "Untraceable RFID authentication protocols: Revision of EC-RAC," in Proc. IEEE RFID, 2009.
    [11]
    L. Roberts, "Aloha packet system with and without slots and capture," ACM SIGCOMM Comput. Commun. Rev., vol. 5, no. 2, pp. 28--42, 1975.
    [12]
    B. Sheng, Q. Li, and W. Mao, "Efficient continuous scanning in RFID systems," in Proc. IEEE INFOCOM, 2010.
    [13]
    D. Benedetti, G. Maselli, and C. Petrioli, "Fast identification of mobile RFID tags," in Proc. IEEE MASS, 2012.
    [14]
    T. La Porta, G. Maselli, and C. Petrioli, "Anticollision protocols for single-reader RFID systems: Temporal analysis and optimization," IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 267--279, 2011.
    [15]
    R. Kumar, T. La Porta, G. Maselli, and C. Petrioli, "Interference cancellation-based RFID tags identification," in Proc. ACM MSWiM, 2011.
    [16]
    J. Capetanakis, "Tree algorithms for packet broadcast channels," IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 505--515, 1979.
    [17]
    J. Myung and W. Lee, "Adaptive splitting protocols for RFID tag collision arbitration," in Proc. ACM MobiHoc, 2006.
    [18]
    Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz--960 MHz, EPCglobal Inc., 2008 {Online}. Available: http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf
    [19]
    Information Technology Radio Frequency Identification for Item Management Part 6: Parameters for Air Interface Communications at 860 MHz to 960 MHz, ISO.org, 2010 {Online}. Available: www.iso.org/iso/RFID_toc.pdf
    [20]
    T. Dimitriou, "A secure and efficient RFID protocol that could make Big Brother (partially) obsolete," in Proc. IEEE PERCOM, 2006.
    [21]
    L. Lu, Y. Liu, and X.-Y. Li, "Refresh: Weak privacy model for RFID systems," in Proc. IEEE INFOCOM, 2010.
    [22]
    M. Kodialam and T. Nandagopal, "Fast and reliable estimation schemes in RFID systems," in Proc. ACM MOBICOM, 2006.
    [23]
    C. Qian, H. Ngan, Y. Liu, and L. Ni, "Cardinality estimation for large-scale RFID systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 9, pp. 1441--1454, 2011.
    [24]
    Y. Zheng and M. Li, "PET: Probabilistic estimating tree for large-scale RFID estimation," IEEE Trans. Mobile Comput., vol. 11, no. 11, pp. 1763--1774, 2012.
    [25]
    M. Shahzad and A. Liu, "Every bit counts---Fast and scalable RFID estimation," in Proc. ACM MOBICOM, 2012.
    [26]
    T. Li, S. S. Wu, S. Chen, and M. C. K. Yang, "Generalized energy-efficient algorithms for the RFID estimation problem," IEEE/ACM Trans. Networking, vol. 20, no. 6, pp. 1978--1990, Dec. 2012.
    [27]
    Y. Zheng and M. Li, "Zoe: Fast cardinality estimation for large-scale RFID systems," in Proc. IEEE INFOCOM, 2013.
    [28]
    B. Chen, Z. Zhou, and H. Yu, "Understanding RFID counting protocols," in Proc. ACM MOBICOM, 2013.
    [29]
    P. Cole and D. Ranasinghe, "Networked RFID systems," Networked RFID Systems and Lightweight Cryptography, pp. 45--58, 2008.
    [30]
    S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, "Design and implementation of puf-based unclonable RFID ics for anti-counterfeiting and security applications," in Proc. IEEE RFID, 2008.
    [31]
    R. Zhang, Y. Liu, Y. Zhang, and J. Sun, "Fast identification of the missing tags in a large RFID system," in Proc. IEEE SECON, 2011.
    [32]
    P. Flajolet and G. Nigel Martin, "Probabilistic counting algorithms for data base applications," J. Comput. Syst. Sci., vol. 31, no. 2, pp. 182--209, 1985.
    [33]
    R. Motwani and P. Raghavan, Randomized Algorithms. London, U.K.: Chapman & Hall/CRC, 2010.
    [34]
    P. Bullen, Handbook of Means and Their Inequalities. New York, NY, USA: Springer, 2003.
    [35]
    S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, and V. Khandelwal, "Design and implementation of puf-based unclonable RFID ics for anti-counterfeiting and security applications," in Proc. IEEE RFID, 2008.

    Cited By

    View all
    • (2024)i-Sample: Augment Domain Adversarial Adaptation Models for WiFi-based HARACM Transactions on Sensor Networks10.1145/361649420:2(1-20)Online publication date: 10-Jan-2024
    • (2024)Bidirectional Bluetooth Backscatter With EdgesIEEE Transactions on Mobile Computing10.1109/TMC.2023.324120223:2(1601-1612)Online publication date: 1-Feb-2024
    • (2022)Content-agnostic backscatter from thin airProceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services10.1145/3498361.3538930(343-356)Online publication date: 27-Jun-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image IEEE/ACM Transactions on Networking
    IEEE/ACM Transactions on Networking  Volume 24, Issue 2
    April 2016
    646 pages
    ISSN:1063-6692
    Issue’s Table of Contents

    Publisher

    IEEE Press

    Publication History

    Published: 01 April 2016
    Published in TON Volume 24, Issue 2

    Author Tags

    1. RFID tags
    2. counterfeits estimation
    3. informative counting

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)i-Sample: Augment Domain Adversarial Adaptation Models for WiFi-based HARACM Transactions on Sensor Networks10.1145/361649420:2(1-20)Online publication date: 10-Jan-2024
    • (2024)Bidirectional Bluetooth Backscatter With EdgesIEEE Transactions on Mobile Computing10.1109/TMC.2023.324120223:2(1601-1612)Online publication date: 1-Feb-2024
    • (2022)Content-agnostic backscatter from thin airProceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services10.1145/3498361.3538930(343-356)Online publication date: 27-Jun-2022
    • (2017)Efficient Unknown Tag Detection in Large-Scale RFID Systems With Unreliable ChannelsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2017.269968325:4(2528-2539)Online publication date: 1-Aug-2017
    • (2017)Toward More Rigorous and Practical Cardinality Estimation for Large-Scale RFID SystemsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2016.263455125:3(1347-1358)Online publication date: 1-Jun-2017
    • (2016)Fast Composite Counting in RFID SystemsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2015.248368124:5(2756-2767)Online publication date: 1-Oct-2016

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media