In the last decade, RFID systems have gained increasing popularity, but they also pose many critical security concerns. The most challenging security threat in several RFID applications is tag cloning. In this paper, we do not focus on preventing tag cloning, but propose the application of the intrusion detection model to identify when tag cloning has occurred. In particular, we present an ontology-based misuse detection system (IDS) that integrates information coming from RFID middleware layer to detect tag cloning. Ontologies and rules are applied to formalize the declarative and procedural knowledge required to implement a "track & trace" technique, with the final aim of modelling two levels of detection against tag cloning. An inference engine is used to provide the proposed IDS with the advanced capacity of automatically reasoning about ontologies and rules in order to actually apply the formalized model of detection and infer when a tagged object is cloned or victim of a cloning attack. © Springer Science+Business Media B.V. 2010.

An ontology-based intrusion detection for RFID systems

Esposito M;Esposito M;Della Vecchia G
2010

Abstract

In the last decade, RFID systems have gained increasing popularity, but they also pose many critical security concerns. The most challenging security threat in several RFID applications is tag cloning. In this paper, we do not focus on preventing tag cloning, but propose the application of the intrusion detection model to identify when tag cloning has occurred. In particular, we present an ontology-based misuse detection system (IDS) that integrates information coming from RFID middleware layer to detect tag cloning. Ontologies and rules are applied to formalize the declarative and procedural knowledge required to implement a "track & trace" technique, with the final aim of modelling two levels of detection against tag cloning. An inference engine is used to provide the proposed IDS with the advanced capacity of automatically reasoning about ontologies and rules in order to actually apply the formalized model of detection and infer when a tagged object is cloned or victim of a cloning attack. © Springer Science+Business Media B.V. 2010.
2010
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
9789048191505
ontology
RFID
misuse detection
tag clonation
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/302
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact