Piece-wise constant models for RFID traffic

Document Type

Conference Proceeding

Publication Date

11-21-2016

Abstract

Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under 'normal' system state conditions and can consequently help identify security breaches not addressed by current standards. We consider the adaptation of two known piece-wise linear models for the purposes of modeling RFID command arrivals at a reader: Bayesian Blocks and Knuth's rule. Our preliminary results indicate that both methods could potentially be used to detect changes in system state (e.g. changes in the rate of command arrivals at a reader).

Publication Title

2016 IEEE International Conference on RFID Technology and Applications, RFID-TA 2016

First Page

144

Last Page

149

Digital Object Identifier (DOI)

10.1109/RFID-TA.2016.7750733

ISBN

9781509014088

Share

COinS