In the last decade, RFID systems have gained increasing popularity, but they also pose many critical security concerns. The most challenging security threat in several RFID applications is tag cloning. In this paper, we do not focus on preventing tag cloning, but propose the application of the intrusion detection model to identify when tag cloning has occurred. In particular, we present an ontology-based misuse detection system (IDS) that integrates information coming from RFID middleware layer to detect tag cloning. Ontologies and rules are applied to formalize the declarative and procedural knowledge required to implement a "track & trace" technique, with the final aim of modelling two levels of detection against tag cloning. An inference engine is used to provide the proposed IDS with the advanced capacity of automatically reasoning about ontologies and rules in order to actually apply the formalized model of detection and infer when a tagged object is cloned or victim of a cloning attack. © Springer Science+Business Media B.V. 2010.

An ontology-based intrusion detection for RFID systems

Esposito M;Esposito M;Della Vecchia G
2010

Abstract

In the last decade, RFID systems have gained increasing popularity, but they also pose many critical security concerns. The most challenging security threat in several RFID applications is tag cloning. In this paper, we do not focus on preventing tag cloning, but propose the application of the intrusion detection model to identify when tag cloning has occurred. In particular, we present an ontology-based misuse detection system (IDS) that integrates information coming from RFID middleware layer to detect tag cloning. Ontologies and rules are applied to formalize the declarative and procedural knowledge required to implement a "track & trace" technique, with the final aim of modelling two levels of detection against tag cloning. An inference engine is used to provide the proposed IDS with the advanced capacity of automatically reasoning about ontologies and rules in order to actually apply the formalized model of detection and infer when a tagged object is cloned or victim of a cloning attack. © Springer Science+Business Media B.V. 2010.
2010
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
Inglese
Khaled Elleithy; Tarek Sobh; Magued Iskander; Vikram Kapila; Mohammad A. Karim; Ausif Mahmood
Technological Developments in Networking, Education and Automation
International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 09)
467
472
6
9789048191505
http://www.scopus.com/record/display.url?eid=2-s2.0-79955074822&origin=inward
Springer Science+Business Media
Berlin, Heidelberg
GERMANIA
Sì, ma tipo non specificato
2010
ontology
RFID
misuse detection
tag clonation
3
none
Esposito, M; Esposito, M; Della Vecchia, G
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/302
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact