
Deterministic cloned tag detection protocol for anonymous radio‐frequency identification systems
Author(s) -
Yimin Guo,
Shundong Li,
Jiawei Dou,
Sufang Zhou
Publication year - 2016
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2014.0504
Subject(s) - computer science , radio frequency identification , protocol (science) , pseudonym , cloning (programming) , identification (biology) , cryptographic protocol , computer network , computer security , cryptography , biology , medicine , botany , alternative medicine , pathology , political science , law , programming language
Tag cloning attack is a serious threat to the radio‐frequency identification (RFID) applications. Cloned tags detection is an effective security mechanism to prevent the attacks. To improve the accuracy and efficiency of detection for cloned tags, this study presents a deterministic cloned tags detection (DCTD) protocol for anonymous RFID systems to detect cloned tags, using a tree‐based anti‐collision algorithm to find irreconcilable collisions. This protocol, which uses the pseudonym of tags in the detecting process, can quickly detect all the cloned tags with a deterministic time without revealing the sensitive information. Experiments show that DCTD protocol, with less detection time and higher accuracy, outperforms the known detection protocols.