An Improved Anti-collision Algorithm for ISO15693 RFID Systems

  • Leyi Shi
  • Xiaorui Wang
  • Wenjing Fu
  • Xin Liu
  • Zhen Qin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7672)


The Radio Frequency Identification (RFID) is an important technology of the Internet of Things. Along with the rapid growth of the RFID technology, security issues have acquired much attention recently. However, most of the RFID security works focus on fake identity or information leaking problems. Researchers seldom care about the security of system mechanism, such as media access control. This paper focuses on the anti-collision mechanism of ISO15693. We analyze the 16-slot anti-collision in ISO15693 in detail, demonstrate access vulnerability, present a potential attack approach of similar-tags collision and validate the attack efficiency through simulation. Afterwards, an improved anti-collision paradigm is proposed to mitigate the similar-tags attack. The empirical study shows that the improved anti-collision tactic is much more efficient than that in ISO15693.


RFID ISO15693 Anti-collision Similar-Tags attack 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Atzoria, L., Ierab, A., Morabitoc, G.: The Internet of Things: A survey. Computer Networks 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  2. 2.
    Juels, A.: RFID Security and Privacy: A Research Survey. IEEE Journal on Selected Areas in Communications 24(2), 381–393 (2006)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)Google Scholar
  4. 4.
    Mitrokotsa, A., Rieback, M., Tanenbaum, A.: Classifying RFID attacks and defenses. Information Systems Frontiers 12(5), 491–505 (2009)CrossRefGoogle Scholar
  5. 5.
    Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers. In: Pervasive Computing & Communications Workshops, pp. 149–153 (2004)Google Scholar
  7. 7.
    Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Lee, S.M., Hwang, Y.J., Lee, D.-H., Lim, J.-I.: Efficient Authentication for Low-Cost RFID Systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 619–627. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Saito, J., Ryou, J.-C., Sakurai, K.: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  11. 11.
    Domdouzis, K., Kumar, B., Anumba, C.: Radio-Frequency Identification (RFID) applications: A brief introduction. Advanced Engineering Informatics 21, 350–355 (2007)CrossRefGoogle Scholar
  12. 12.
    David, N., Stephon, V.: Multi-access fading channels Part 1: Polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transaction on Information Theory 44(7), 2796–2815 (1998)CrossRefzbMATHGoogle Scholar
  13. 13.
    Jamil, Y., Li, Y.: Block reservation time division multiple access protocol for a high capacity wireless network. International Journal of Wireless Information Networks 7(4), 211–220 (2000)CrossRefGoogle Scholar
  14. 14.
    Myung, J., Lee, W.: An adaptive memoryless tag anti-collision protocol for RFID networks. In: IEEE INFOCOM 2005, Poster Session, pp. 1096–1101 (2005)Google Scholar
  15. 15.
    Ali, K., Hassanein, H., Taha, A.: RFID anti-collision protocol for dense passive tag environments, pp. 819–824. IEEE Computer Society (2007)Google Scholar
  16. 16.
    Jiang, L., Lu, G., Xin, Y.: Research on anti-collision algorithm in radio frequency identification system. Computer Engineering and Applications 15, 29–32 (2007)Google Scholar
  17. 17.
    Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons (2003)Google Scholar
  18. 18.
    Shih, D., Sun, P., Yen, D., Huang, S.: Taxonomy and survey of RFID anti-collision protocols. Computer Communication 11(29), 2150–2166 (2006)CrossRefGoogle Scholar
  19. 19.
    Law, C., Lee, K., Siu, K.: Efficient memory-less protocol for tag identification. In: Proc. 4th International Workshop on DIALM, pp. 75–84 (2000)Google Scholar
  20. 20.
    Du, H., Xu, K., Wang, W.: An anti-collision algorithm based on binary-tree searching of backtracking. Journal of Yunnan University 28, 133–136 (2006)Google Scholar
  21. 21.
    Shi, X., Huang, Q., Wei, F.: An enhanced binary anti-collision algorithm of backtracking in RFID system. Progress In Electromagnetics Research B 4, 263–271 (2008)CrossRefGoogle Scholar
  22. 22.
    Jacomet, M., Ehrsam, A., Gehrig, U.: Contactless identification device with anticollision algorithm. In: Proceedings of the IEEE Conference on Circuits, Systems, Computer and Communications, pp. 75–84 (2000)Google Scholar
  23. 23.
    Juels, A., Rivest, R., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Conference on Computer and Communications Security, pp. 27–30 (2003)Google Scholar
  24. 24.
    Choi, H., Cha, J., Kim, J.: Fast wireless anti-collision algorithm in ubiquitous id system. In: Proc. of the 60th IEEE Vehicular Technology Conference, pp. 4589–4592 (2004)Google Scholar
  25. 25.
    Alsalih, W., Ali, K., Hassanein, H.: Optimal distance-based clustering for tag anti-collision in RFID systems. In: Proc. of 33rd IEEE Conference on Local Computer Networks (LCN), pp. 266–273 (2008)Google Scholar
  26. 26.
    Kim, S., Shin, M., Park, P.: A new tree-based tag anticollision protocol for RFID systems. In: Proc. of the 2006 International Conference on Communications in Computing, pp. 83–86 (2006)Google Scholar
  27. 27.
    Zhou, F., Jin, D., Huang, C., Min, H.: Optimize the power consumption of passive electronic tags for anti-collision schemes. In: Proc. of the 5th ASICON, pp. 1213–1217 (2003)Google Scholar
  28. 28.
    Zhou, F., Chen, C., Jin, D., Huang, C., Min, H.: Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems. In: ISLPED 2004: Proc. of the 2004 International Symposium on Low Power Electronics and Design, pp. 357–362 (2004)Google Scholar
  29. 29.
    Liu, L., Xie, Z., Xi, J., Lai, S.: An improved anti-collision algorithm in RFID system. In: Proc. of 2nd International Conference on Mobile Technology, Applications and System, pp. 1–5 (2005)Google Scholar
  30. 30.
    Law, C., Lee, K., Siu, K.: Scanning-based pre-processing for enhanced RFID tag anti-collision protocols. In: ISCIT 2006: Proc. of the 2006 International Symposium on Communications and Information Technologies, pp. 75–84 (2006)Google Scholar
  31. 31.
    Zhao, L., Zhou, C.: An anti-collision Arithmetic based on ISO15693 protocol and its realization. Microcomputer Information 24, 170–172 (2008)Google Scholar
  32. 32.
    International Standards Organization. ISO/IEC 15693-2: Identification cards-Contactless integrated crcuit(s) cards-Vicinity cards-Part2: Air interface and initialization (2000)Google Scholar
  33. 33.
    International Standards Organization. ISO/IEC 15693-3: Identification cards-Contactless integrated crcuit(s) cards-Vicinity cards-Part 3: Anticollision and transmission protocol (2000)Google Scholar
  34. 34.
    Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. IEEE Security and Privacy for Emerging Areas in Communications, Networks, 59–66 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Leyi Shi
    • 1
  • Xiaorui Wang
    • 1
  • Wenjing Fu
    • 1
  • Xin Liu
    • 1
  • Zhen Qin
    • 1
  1. 1.College of Computer & Communication EngineeringChina University of PetroleumQingdaoChina

Personalised recommendations