Skip to main content
Erschienen in: Journal of Intelligent Information Systems 1/2011

01.02.2011

Collaborative RFID intrusion detection with an artificial immune system

verfasst von: Haidong Yang, Jianhua Guo, Feiqi Deng

Erschienen in: Journal of Intelligent Information Systems | Ausgabe 1/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The current RFID systems are fragile to external attacks, due to the limitations of encryption authentication and physical protection methods used in implementation of RFID security systems. In this paper, we propose a collaborative RFID intrusion detection method that is based on an artificial immune system (AIS). The new method can enhance the security of RFID systems without need to amend the existing technical standards of RFID. Mimicking the immune cell collaboration in biological immune systems, RFID operations are defined as self and nonself antigens, representing legal and illegal RFID operations, respectively. Data models are defined for antigens’ epitopes. Known RFID attacks are defined as danger signals represented by nonself antigens. We propose a method to collect RFID data for antigens and danger signals. With the antigen and danger signal data available, we use a negative selection algorithm to generate adaptive detectors for self antigens as RFID legal operations. We use an immune based clustering algorithm aiNet to generate collaborative detectors for danger signals of RFID intrusions. Simulation results have shown that the new RFID intrusion detection method has effectively reduced the false detection rate. The detection rate on known types of attacks was 98% and the detection rate on unknown type of attacks was 93%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ahson, S., & Ilyas, M. (2008). RFID handbook: Applications, technology, security, and privacy. Boca Raton: CRC.CrossRef Ahson, S., & Ilyas, M. (2008). RFID handbook: Applications, technology, security, and privacy. Boca Raton: CRC.CrossRef
Zurück zum Zitat Aickelin, U., & Cayzer, S. (2002). The danger theory and its applications to artificial immune systems. In Proceedings of the first international conference on artificial immune systems (pp. 141–148). Aickelin, U., & Cayzer, S. (2002). The danger theory and its applications to artificial immune systems. In Proceedings of the first international conference on artificial immune systems (pp. 141–148).
Zurück zum Zitat Ayoade, J. (2007). Privacy and RFID systems: Roadmap to solving security and privacy concerns in RFID systems. Computer Law & Security Reports, 23(6), 555–561.CrossRef Ayoade, J. (2007). Privacy and RFID systems: Roadmap to solving security and privacy concerns in RFID systems. Computer Law & Security Reports, 23(6), 555–561.CrossRef
Zurück zum Zitat D’haeseleer, P., Forrest, S., & Helman, P. (1996). An immunological approach to change detection: Algorithms, analysis and implications. In Proceedings of IEEE symposium on security and privacy (pp. 110–119). D’haeseleer, P., Forrest, S., & Helman, P. (1996). An immunological approach to change detection: Algorithms, analysis and implications. In Proceedings of IEEE symposium on security and privacy (pp. 110–119).
Zurück zum Zitat De Castro, L., & Von Zuben, F. (2000). An evolutionary immune network for data clustering. In Proceedings of the 6th Brazilian symposium on neural networks (pp. 84–89). Los Alamitos: IEEE Computer Society. De Castro, L., & Von Zuben, F. (2000). An evolutionary immune network for data clustering. In Proceedings of the 6th Brazilian symposium on neural networks (pp. 84–89). Los Alamitos: IEEE Computer Society.
Zurück zum Zitat EPCTM (2007). EPCTM radio frequency identity protocols class-1 generation-2 UHF RFID protoco1 for communications at 860M Hz-960MHz version 1.1.0. EPCglobal. EPCTM (2007). EPCTM radio frequency identity protocols class-1 generation-2 UHF RFID protoco1 for communications at 860M Hz-960MHz version 1.1.0. EPCglobal.
Zurück zum Zitat Forrest, S., & Hofmeyr, S. (2000). Immunology as information processing. In L. A. Segel, & I. R. Cohen (Eds.), Design principles for immune system & other distributed autonomous systems (pp. 361–387). Oxford: Oxford University Press. Forrest, S., & Hofmeyr, S. (2000). Immunology as information processing. In L. A. Segel, & I. R. Cohen (Eds.), Design principles for immune system & other distributed autonomous systems (pp. 361–387). Oxford: Oxford University Press.
Zurück zum Zitat Forrest, S., Longstaff, T., Hofmeyr, S., & Somayaji, A. (1996). A sense of self for unix process. In Proceedings of the IEEE symposium on security and privacy (pp. 120–128). Los Alamitos: IEEE Computer Society. Forrest, S., Longstaff, T., Hofmeyr, S., & Somayaji, A. (1996). A sense of self for unix process. In Proceedings of the IEEE symposium on security and privacy (pp. 120–128). Los Alamitos: IEEE Computer Society.
Zurück zum Zitat Forrest, S., Perelson, A., Allen, L., & Cherukuri, R. (1994). Self-nonself discrimination in a computer. In Proceedings of the IEEE symposium on security and privacy (pp. 201–212). Los Alamitos: IEEE Computer Society. Forrest, S., Perelson, A., Allen, L., & Cherukuri, R. (1994). Self-nonself discrimination in a computer. In Proceedings of the IEEE symposium on security and privacy (pp. 201–212). Los Alamitos: IEEE Computer Society.
Zurück zum Zitat Fu, H., & Li, X. (2008). Double-signal based immune intrusion detection model inspired by danger theory. Computer Engineering and Applications, 44(14), 113–117 (in Chinese).MathSciNet Fu, H., & Li, X. (2008). Double-signal based immune intrusion detection model inspired by danger theory. Computer Engineering and Applications, 44(14), 113–117 (in Chinese).MathSciNet
Zurück zum Zitat Guo, J., Yang, H., & Deng, F. (2008). Intrusion detection model for RFID system based on immune network. Journal of Computer Applications, 28(10), 2481–2484 (in Chinese).MATHCrossRef Guo, J., Yang, H., & Deng, F. (2008). Intrusion detection model for RFID system based on immune network. Journal of Computer Applications, 28(10), 2481–2484 (in Chinese).MATHCrossRef
Zurück zum Zitat Hofmeyr, S., & Forrest, S. (2000). Architecture for an artificial immune system. Evolutionary Computation, 8(4), 443–473.CrossRef Hofmeyr, S., & Forrest, S. (2000). Architecture for an artificial immune system. Evolutionary Computation, 8(4), 443–473.CrossRef
Zurück zum Zitat Hong, Z., Wu, L., & Wang, Y. (2008). Worm containment model based on negative selection. Computer Engineering, 34(7), 126–128 (in Chinese). Hong, Z., Wu, L., & Wang, Y. (2008). Worm containment model based on negative selection. Computer Engineering, 34(7), 126–128 (in Chinese).
Zurück zum Zitat Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–395.CrossRefMathSciNet Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–395.CrossRefMathSciNet
Zurück zum Zitat Li, J., Gao, X., & Jiao, L. (2004). A novel clustering method with network structure based on clonal algorithm. ACTA Electronica Sinica, 32(7), 1195–1199 (in Chinese). Li, J., Gao, X., & Jiao, L. (2004). A novel clustering method with network structure based on clonal algorithm. ACTA Electronica Sinica, 32(7), 1195–1199 (in Chinese).
Zurück zum Zitat Lunt, T. (1993). A survey of intrusion detection techniques. Computers & Security, 12(1), 405–418.CrossRef Lunt, T. (1993). A survey of intrusion detection techniques. Computers & Security, 12(1), 405–418.CrossRef
Zurück zum Zitat Matzinger, P. (1994). Tolerance, danger and the extended family. Annual Review of Immunology, 12, 991–1045. Matzinger, P. (1994). Tolerance, danger and the extended family. Annual Review of Immunology, 12, 991–1045.
Zurück zum Zitat Mirowski, L., & Hartnett, J. (2007). Deckard: A system to detect change of RFID tag ownership. International Journal of Computer Science and Network Security, 7(7), 89–98. Mirowski, L., & Hartnett, J. (2007). Deckard: A system to detect change of RFID tag ownership. International Journal of Computer Science and Network Security, 7(7), 89–98.
Zurück zum Zitat Ohkubo, M., Suzuki, K., & Kinoshita, S. (2004). Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In Proceedings of the 2004 symposium on cryptography and information security (SCIS2004) (pp. 719–724). Sendai: SCIS. Ohkubo, M., Suzuki, K., & Kinoshita, S. (2004). Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In Proceedings of the 2004 symposium on cryptography and information security (SCIS2004) (pp. 719–724). Sendai: SCIS.
Zurück zum Zitat Rotter, P. (2008). A framework for assessing RFID system security and privacy risks. IEEE Pervasive Computing, 7(2), 70–77.CrossRef Rotter, P. (2008). A framework for assessing RFID system security and privacy risks. IEEE Pervasive Computing, 7(2), 70–77.CrossRef
Zurück zum Zitat Sarma, S. E., Weis, S. A., & Wengels, D. (2003). Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes, 6(1), 2–9. Sarma, S. E., Weis, S. A., & Wengels, D. (2003). Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes, 6(1), 2–9.
Zurück zum Zitat Thamilarasu, G., & Sridhar, R. (2008). Intrusion detection in RFID systems. In Military communications conference (pp. 1–7). San Diego: IEEE. Thamilarasu, G., & Sridhar, R. (2008). Intrusion detection in RFID systems. In Military communications conference (pp. 1–7). San Diego: IEEE.
Zurück zum Zitat Weis, S. A., Sarma, S. E., Rivest, R. L., et al. (2004). Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of the 1st international conference on security in pervasive computing (pp. 201–212). Berlin: Springer. Weis, S. A., Sarma, S. E., Rivest, R. L., et al. (2004). Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of the 1st international conference on security in pervasive computing (pp. 201–212). Berlin: Springer.
Zurück zum Zitat Xu, H., Xu, C., Cheng, X., & Peng, Z. (2009). Research and design of adaptive intrusion prevention system for co-stimulated by danger signals. Computer Engineering, 35(2), 172–174 (in Chinese). Xu, H., Xu, C., Cheng, X., & Peng, Z. (2009). Research and design of adaptive intrusion prevention system for co-stimulated by danger signals. Computer Engineering, 35(2), 172–174 (in Chinese).
Zurück zum Zitat Zhang, Q., Qian, Y., Xu, B., Gao, T., & Xie, K. (2007). Negative-selection algorithm of mutation search in self space to train detector. Journal of Computer Applications, 27(3), 627–629 (in Chinese). Zhang, Q., Qian, Y., Xu, B., Gao, T., & Xie, K. (2007). Negative-selection algorithm of mutation search in self space to train detector. Journal of Computer Applications, 27(3), 627–629 (in Chinese).
Metadaten
Titel
Collaborative RFID intrusion detection with an artificial immune system
verfasst von
Haidong Yang
Jianhua Guo
Feiqi Deng
Publikationsdatum
01.02.2011
Verlag
Springer US
Erschienen in
Journal of Intelligent Information Systems / Ausgabe 1/2011
Print ISSN: 0925-9902
Elektronische ISSN: 1573-7675
DOI
https://doi.org/10.1007/s10844-010-0118-3

Weitere Artikel der Ausgabe 1/2011

Journal of Intelligent Information Systems 1/2011 Zur Ausgabe

Premium Partner