Abstract
The Radio Frequency Identification (RFID) is an important technology of the Internet of Things. Along with the rapid growth of the RFID technology, security issues have acquired much attention recently. However, most of the RFID security works focus on fake identity or information leaking problems. Researchers seldom care about the security of system mechanism, such as media access control. This paper focuses on the anti-collision mechanism of ISO15693. We analyze the 16-slot anti-collision in ISO15693 in detail, demonstrate access vulnerability, present a potential attack approach of similar-tags collision and validate the attack efficiency through simulation. Afterwards, an improved anti-collision paradigm is proposed to mitigate the similar-tags attack. The empirical study shows that the improved anti-collision tactic is much more efficient than that in ISO15693.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Atzoria, L., Ierab, A., Morabitoc, G.: The Internet of Things: A survey. Computer Networks 54(15), 2787–2805 (2010)
Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–393 (2006)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Mitrokotsa, A., Rieback, M., Tanenbaum, A.: Classifying RFID attacks and defenses. Information Systems Frontiers 12(5), 491–505 (2009)
Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. In: Pervasive Computing & Communications Workshops, pp. 149–153 (2004)
Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
Lee, S.M., Hwang, Y.J., Lee, D.-H., Lim, J.-I.: Efficient Authentication for Low-Cost RFID Systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005)
Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Saito, J., Ryou, J.-C., Sakurai, K.: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)
Domdouzis, K., Kumar, B., Anumba, C.: Radio-Frequency Identification (RFID) applications: A brief introduction. Advanced Engineering Informatics 21, 350–355 (2007)
David, N., Stephon, V.: Multi-access fading channels Part 1: Polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transaction on Information Theory 44(7), 2796–2815 (1998)
Jamil, Y., Li, Y.: Block reservation time division multiple access protocol for a high capacity wireless network. International Journal of Wireless Information Networks 7(4), 211–220 (2000)
Myung, J., Lee, W.: An adaptive memoryless tag anti-collision protocol for RFID networks. In: IEEE INFOCOM 2005, Poster Session, pp. 1096–1101 (2005)
Ali, K., Hassanein, H., Taha, A.: RFID anti-collision protocol for dense passive tag environments, pp. 819–824. IEEE Computer Society (2007)
Jiang, L., Lu, G., Xin, Y.: Research on anti-collision algorithm in radio frequency identification system. Computer Engineering and Applications 15, 29–32 (2007)
Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons (2003)
Shih, D., Sun, P., Yen, D., Huang, S.: Taxonomy and survey of RFID anti-collision protocols. Computer Communication 11(29), 2150–2166 (2006)
Law, C., Lee, K., Siu, K.: Efficient memory-less protocol for tag identification. In: Proc. 4th International Workshop on DIALM, pp. 75–84 (2000)
Du, H., Xu, K., Wang, W.: An anti-collision algorithm based on binary-tree searching of backtracking. Journal of Yunnan University 28, 133–136 (2006)
Shi, X., Huang, Q., Wei, F.: An enhanced binary anti-collision algorithm of backtracking in RFID system. Progress In Electromagnetics Research B 4, 263–271 (2008)
Jacomet, M., Ehrsam, A., Gehrig, U.: Contactless identification device with anticollision algorithm. In: Proceedings of the IEEE Conference on Circuits, Systems, Computer and Communications, pp. 75–84 (2000)
Juels, A., Rivest, R., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Conference on Computer and Communications Security, pp. 27–30 (2003)
Choi, H., Cha, J., Kim, J.: Fast wireless anti-collision algorithm in ubiquitous id system. In: Proc. of the 60th IEEE Vehicular Technology Conference, pp. 4589–4592 (2004)
Alsalih, W., Ali, K., Hassanein, H.: Optimal distance-based clustering for tag anti-collision in RFID systems. In: Proc. of 33rd IEEE Conference on Local Computer Networks (LCN), pp. 266–273 (2008)
Kim, S., Shin, M., Park, P.: A new tree-based tag anticollision protocol for RFID systems. In: Proc. of the 2006 International Conference on Communications in Computing, pp. 83–86 (2006)
Zhou, F., Jin, D., Huang, C., Min, H.: Optimize the power consumption of passive electronic tags for anti-collision schemes. In: Proc. of the 5th ASICON, pp. 1213–1217 (2003)
Zhou, F., Chen, C., Jin, D., Huang, C., Min, H.: Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems. In: ISLPED 2004: Proc. of the 2004 International Symposium on Low Power Electronics and Design, pp. 357–362 (2004)
Liu, L., Xie, Z., Xi, J., Lai, S.: An improved anti-collision algorithm in RFID system. In: Proc. of 2nd International Conference on Mobile Technology, Applications and System, pp. 1–5 (2005)
Law, C., Lee, K., Siu, K.: Scanning-based pre-processing for enhanced RFID tag anti-collision protocols. In: ISCIT 2006: Proc. of the 2006 International Symposium on Communications and Information Technologies, pp. 75–84 (2006)
Zhao, L., Zhou, C.: An anti-collision Arithmetic based on ISO15693 protocol and its realization. Microcomputer Information 24, 170–172 (2008)
International Standards Organization. ISO/IEC 15693-2: Identification cards-Contactless integrated crcuit(s) cards-Vicinity cards-Part2: Air interface and initialization (2000)
International Standards Organization. ISO/IEC 15693-3: Identification cards-Contactless integrated crcuit(s) cards-Vicinity cards-Part 3: Anticollision and transmission protocol (2000)
Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. IEEE Security and Privacy for Emerging Areas in Communications, Networks, 59–66 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, L., Wang, X., Fu, W., Liu, X., Qin, Z. (2012). An Improved Anti-collision Algorithm for ISO15693 RFID Systems. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-35362-8_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35361-1
Online ISBN: 978-3-642-35362-8
eBook Packages: Computer ScienceComputer Science (R0)