Abstract
Nowadays, Radio Frequency Identification (RFID) has become one of the most deployed Internet of Things (IoT) technologies. The security threats it facing are gaining more and more attention. In this paper, we focus on the intrusion based on unauthorized (malicious) readers by catching the information of tags and modifying the tags via a standard protocol. We design URTracker to realize the detection and localization of unauthorized readers. This system has two parts: For detection, we analyze the features of reader interference and the RFID signal channel model and propose a throughput-based method. For localization, we use the relationship between throughput and the position as fingerprints, model the localization process into a Markov Decision Process (MDP) for training via deep reinforcement learning (DRL). Experiment results show that URTracker can achieve high accuracy to detect unauthorized readers and low location error for tracking the trajectories.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Floyd, R.E.: RFID in animal-tracking applications. IEEE Potentials 34, 32–33 (2015)
Feng, T.: An agri-food supply chain traceability system for China based on RFID and blockchain technology. In: Proceedings of the 13th International Conference on Service Systems and Service Management, Kumming, China, 24–26 June 2016, pp. 1–6 (2016)
Barro-Torres, S.J., Fernández-Caramés, T.M., Pérez-Iglesias, H.J., Escudero, C.J.: Real-time personal protective equipment monitoring system. Comput. Commun. 36, 42–50 (2012)
EPCglobal. Specification for RFID air interface. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at, vol. 860, pp. 1–94 (2005)
EPCglobal. EPC radio-frequency identity protocols generation-2 UHF RFID; specification for RFID air interface protocol for communications at 860 MHz–960 MHz. EPCglobal Inc., November 2013
Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O’Hare, T.: Vulnerabilities in first-generation RFID-enabled credit cards. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 2–14. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77366-5_2
Ding, H., Han, J., Zhang, Y., et al.: Preventing unauthorized access on passive tags. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 1115–1123. IEEE (2018)
Ding, H., et al.: A platform for free-weight exercise monitoring with RFIDs. IEEE Trans. Mob. Comput. 16(12), 3279–3293 (2017)
Huang, W., Ding, C., Cui, Y., et al.: RFID air port intrusion detection technology based on malicious reader discovery. Acta Sinica Sinica 7 (2018)
Mohammadi, M., Al-Fuqaha, A., Guizani, M., Oh, J.-S.: Semisupervised deep reinforcement learning in support of IoT and smart city services. IEEE Internet Thing J. 5(2), 624–635 (2018)
Bekkali, A., Zou, S., Kadri, A., et al.: Performance analysis of passive UHF RFID systems under cascaded fading channels and interference effects. IEEE Trans. Wireless Commun. 14(3), 1421–1433 (2014)
Šolić, P., Maras, J., Radić, J., et al.: Comparing theoretical and experimental results in Gen2 RFID throughput. IEEE Trans. Autom. Sci. Eng. 14(1), 349–357 (2016)
Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (2018)
Hu, X., Liu, S., Chen, R., Wang, W., Wang, C.: A deep reinforcement learning-based framework for dynamic resource allocation in multibeam satellite systems. IEEE Commun. Lett. 22(8), 1612–1615 (2018)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-3_18
Henrici, A., Muller, P.: Hash-based enhancement of location privacy for radio- frequency identification devices using varying identifiers. In: International Workshop on Pervasive Computing and Communication Security PerSec, Orlando, Florida, USA, pp. 149–153 (2004)
Dhiman, V., Banerjee, S., Griffin, B., Siskind, J.M., Corso, J.J.: A critical investigation of deep reinforcement learning for navigation, January 2019. https://arxiv.org/abs/1802.02274
Zhang, J., Springenberg, J.T., Boedecker, J., Burgard, W.: Deep reinforcement learning with successor features for navigation across similar environments. In: Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems, Vancouver, BC, Canada, pp. 2371–2378, September 2017
Acknowledgement
This work was supported by the Youth Innovation Promotion Association of Chinese Academy of Sciences, No. Y9YY015104.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Sun, D., Cui, Y., Feng, Y., Xie, J., Wang, S., Zhang, Y. (2021). URTracker: Unauthorized Reader Detection and Localization Using COTS RFID. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12937. Springer, Cham. https://doi.org/10.1007/978-3-030-85928-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-85928-2_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-85927-5
Online ISBN: 978-3-030-85928-2
eBook Packages: Computer ScienceComputer Science (R0)