Despite the benefits, RFID technology poses many critical security concerns. One of the most challenging security threats is tag cloning. This research is aimed at integrating the principles of model checking and ontology modelling in the intrusion detection paradigm so as to determine clone tags. The proposed methodology relies on: i) the definition of an ontology model that formalizes expected and actual profiles, based on tracking information of tagged objects; ii) the application of a model checking procedure, based on description logics underlying the ontology formalism, in order to verify the consistency between expected and actual profiles; iii) the detection of abnormal situations indicating tag cloning attacks, in cases where inconsistencies have occurred. This methodology has been implemented in a misuse detection system and tested in order to give a proof of its feasibility.
An Integrated Approach based on Ontology and Model-Checking to Detect Clone RFID Tags
Massimo Esposito
2010
Abstract
Despite the benefits, RFID technology poses many critical security concerns. One of the most challenging security threats is tag cloning. This research is aimed at integrating the principles of model checking and ontology modelling in the intrusion detection paradigm so as to determine clone tags. The proposed methodology relies on: i) the definition of an ontology model that formalizes expected and actual profiles, based on tracking information of tagged objects; ii) the application of a model checking procedure, based on description logics underlying the ontology formalism, in order to verify the consistency between expected and actual profiles; iii) the detection of abnormal situations indicating tag cloning attacks, in cases where inconsistencies have occurred. This methodology has been implemented in a misuse detection system and tested in order to give a proof of its feasibility.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


