Skip to main content

URTracker: Unauthorized Reader Detection and Localization Using COTS RFID

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12937))

Abstract

Nowadays, Radio Frequency Identification (RFID) has become one of the most deployed Internet of Things (IoT) technologies. The security threats it facing are gaining more and more attention. In this paper, we focus on the intrusion based on unauthorized (malicious) readers by catching the information of tags and modifying the tags via a standard protocol. We design URTracker to realize the detection and localization of unauthorized readers. This system has two parts: For detection, we analyze the features of reader interference and the RFID signal channel model and propose a throughput-based method. For localization, we use the relationship between throughput and the position as fingerprints, model the localization process into a Markov Decision Process (MDP) for training via deep reinforcement learning (DRL). Experiment results show that URTracker can achieve high accuracy to detect unauthorized readers and low location error for tracking the trajectories.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Floyd, R.E.: RFID in animal-tracking applications. IEEE Potentials 34, 32–33 (2015)

    Article  Google Scholar 

  2. Feng, T.: An agri-food supply chain traceability system for China based on RFID and blockchain technology. In: Proceedings of the 13th International Conference on Service Systems and Service Management, Kumming, China, 24–26 June 2016, pp. 1–6 (2016)

    Google Scholar 

  3. Barro-Torres, S.J., Fernández-Caramés, T.M., Pérez-Iglesias, H.J., Escudero, C.J.: Real-time personal protective equipment monitoring system. Comput. Commun. 36, 42–50 (2012)

    Article  Google Scholar 

  4. EPCglobal. Specification for RFID air interface. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at, vol. 860, pp. 1–94 (2005)

    Google Scholar 

  5. EPCglobal. EPC radio-frequency identity protocols generation-2 UHF RFID; specification for RFID air interface protocol for communications at 860 MHz–960 MHz. EPCglobal Inc., November 2013

    Google Scholar 

  6. Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O’Hare, T.: Vulnerabilities in first-generation RFID-enabled credit cards. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 2–14. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77366-5_2

    Chapter  Google Scholar 

  7. Ding, H., Han, J., Zhang, Y., et al.: Preventing unauthorized access on passive tags. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 1115–1123. IEEE (2018)

    Google Scholar 

  8. Ding, H., et al.: A platform for free-weight exercise monitoring with RFIDs. IEEE Trans. Mob. Comput. 16(12), 3279–3293 (2017)

    Article  Google Scholar 

  9. Huang, W., Ding, C., Cui, Y., et al.: RFID air port intrusion detection technology based on malicious reader discovery. Acta Sinica Sinica 7 (2018)

    Google Scholar 

  10. Mohammadi, M., Al-Fuqaha, A., Guizani, M., Oh, J.-S.: Semisupervised deep reinforcement learning in support of IoT and smart city services. IEEE Internet Thing J. 5(2), 624–635 (2018)

    Article  Google Scholar 

  11. Bekkali, A., Zou, S., Kadri, A., et al.: Performance analysis of passive UHF RFID systems under cascaded fading channels and interference effects. IEEE Trans. Wireless Commun. 14(3), 1421–1433 (2014)

    Article  Google Scholar 

  12. Šolić, P., Maras, J., Radić, J., et al.: Comparing theoretical and experimental results in Gen2 RFID throughput. IEEE Trans. Autom. Sci. Eng. 14(1), 349–357 (2016)

    Article  Google Scholar 

  13. Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (2018)

    MATH  Google Scholar 

  14. Hu, X., Liu, S., Chen, R., Wang, W., Wang, C.: A deep reinforcement learning-based framework for dynamic resource allocation in multibeam satellite systems. IEEE Commun. Lett. 22(8), 1612–1615 (2018)

    Article  Google Scholar 

  15. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-3_18

    Chapter  Google Scholar 

  16. Henrici, A., Muller, P.: Hash-based enhancement of location privacy for radio- frequency identification devices using varying identifiers. In: International Workshop on Pervasive Computing and Communication Security PerSec, Orlando, Florida, USA, pp. 149–153 (2004)

    Google Scholar 

  17. Dhiman, V., Banerjee, S., Griffin, B., Siskind, J.M., Corso, J.J.: A critical investigation of deep reinforcement learning for navigation, January 2019. https://arxiv.org/abs/1802.02274

  18. Zhang, J., Springenberg, J.T., Boedecker, J., Burgard, W.: Deep reinforcement learning with successor features for navigation across similar environments. In: Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems, Vancouver, BC, Canada, pp. 2371–2378, September 2017

    Google Scholar 

Download references

Acknowledgement

This work was supported by the Youth Innovation Promotion Association of Chinese Academy of Sciences, No. Y9YY015104.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siye Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sun, D., Cui, Y., Feng, Y., Xie, J., Wang, S., Zhang, Y. (2021). URTracker: Unauthorized Reader Detection and Localization Using COTS RFID. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12937. Springer, Cham. https://doi.org/10.1007/978-3-030-85928-2_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-85928-2_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-85927-5

  • Online ISBN: 978-3-030-85928-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics