Piece-wise constant models for RFID traffic
Document Type
Conference Proceeding
Publication Date
11-21-2016
Abstract
Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under 'normal' system state conditions and can consequently help identify security breaches not addressed by current standards. We consider the adaptation of two known piece-wise linear models for the purposes of modeling RFID command arrivals at a reader: Bayesian Blocks and Knuth's rule. Our preliminary results indicate that both methods could potentially be used to detect changes in system state (e.g. changes in the rate of command arrivals at a reader).
Publication Title
2016 IEEE International Conference on RFID Technology and Applications, RFID-TA 2016
First Page
144
Last Page
149
Digital Object Identifier (DOI)
10.1109/RFID-TA.2016.7750733
ISBN
9781509014088
Citation Information
Prodanoff, Alkadi, A., & Kreidl, P. (2016). Piece-wise constant models for RFID traffic. 2016 IEEE International Conference on RFID Technology and Applications (RFID-TA), 144–149. https://doi.org/10.1109/RFID-TA.2016.7750733