Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/76501
Title: You can clone but you cannot hide : a survey of clone prevention and detection for RFID
Authors: Bu, K
Weng, MY
Zheng, Y
Xiao, B 
Liu, X
Keywords: RFID
IoT
Cloning attack
Prevention
Detection
Issue Date: 2017
Publisher: Institute of Electrical and Electronics Engineers
Source: IEEE communications surveys and tutorials, 2017, v. 19, no. 3, p. 1682-1700 How to cite?
Journal: IEEE communications surveys and tutorials 
Abstract: Radio-frequency identification (RFID) is one of the driving technologies for Internet of Things. The architecture-succinctness and cost-effectiveness of RFID tags promise their proliferation as well as allure security and privacy breaches. The cloning attack using clone tags to impersonate genuine tags can lead to unimaginable threats because RFID applications equate tag genuineness to the authenticity of tagged objects. Proposed countermeasures, however, keep showing limitations in effectiveness, efficiency, security, privacy, or applicability as new RFID applications emerge. The countermeasures therefore require constant review and improvement to stay at the leading edge. In this paper, we conduct the first comprehensive and systematic survey of RFID clone prevention and detection solutions. We systematically classify existing RFID cloning countermeasures over the period 2003-2016, sketch the main idea and highlight the strengths and weaknesses of each solution type, and summarize the similarity and difference among solution types. We find that RFID cloning countermeasures turn to be much more complex to design than they were thought in the literature. Prevention solutions can hardly thwart RFID cloning completely. Detection solutions may have specific application requirements to take effect. Many open issues further complicate the design of RFID cloning countermeasures. We hope that our survey can provide academic researchers and industrial engineers with useful references to combat RFID cloning and therefore to secure RFID ecosystem.
URI: http://hdl.handle.net/10397/76501
ISSN: 1553-877X
EISSN: 1553-877X
DOI: 10.1109/COMST.2017.2688411
Appears in Collections:Journal/Magazine Article

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

4
Citations as of Dec 13, 2018

WEB OF SCIENCETM
Citations

2
Last Week
0
Last month
Citations as of Dec 15, 2018

Page view(s)

26
Citations as of Dec 10, 2018

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.