Despite the benefits, RFID technology poses many critical security concerns. One of the most challenging security threats is tag cloning. This research is aimed at integrating the principles of model checking and ontology modelling in the intrusion detection paradigm so as to determine clone tags. The proposed methodology relies on: i) the definition of an ontology model that formalizes expected and actual profiles, based on tracking information of tagged objects; ii) the application of a model checking procedure, based on description logics underlying the ontology formalism, in order to verify the consistency between expected and actual profiles; iii) the detection of abnormal situations indicating tag cloning attacks, in cases where inconsistencies have occurred. This methodology has been implemented in a misuse detection system and tested in order to give a proof of its feasibility.

An Integrated Approach based on Ontology and Model-Checking to Detect Clone RFID Tags

Massimo Esposito
2010

Abstract

Despite the benefits, RFID technology poses many critical security concerns. One of the most challenging security threats is tag cloning. This research is aimed at integrating the principles of model checking and ontology modelling in the intrusion detection paradigm so as to determine clone tags. The proposed methodology relies on: i) the definition of an ontology model that formalizes expected and actual profiles, based on tracking information of tagged objects; ii) the application of a model checking procedure, based on description logics underlying the ontology formalism, in order to verify the consistency between expected and actual profiles; iii) the detection of abnormal situations indicating tag cloning attacks, in cases where inconsistencies have occurred. This methodology has been implemented in a misuse detection system and tested in order to give a proof of its feasibility.
2010
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
RFID
Tag Cloning
Model Checking
Ontology
Description Logics
Intrusion Detection
Misuse Intrusion Detection
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/36680
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact