Visible to the public Intrusion Detection System Based on Complex Event Processing in RFID Middleware

TitleIntrusion Detection System Based on Complex Event Processing in RFID Middleware
Publication TypeConference Paper
Year of Publication2016
AuthorsYin, Shang-Nan, Kang, Ho-Seok, Chen, Zhi-Guo, Kim, Sung-Ryul
Conference NameProceedings of the International Conference on Research in Adaptive and Convergent Systems
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4455-5
KeywordsCollaboration, complex event process, composability, ESPER, IDS, Intrusion detection, Intrusion Detection System (IDS), Intrusion Detection Systems, middleware, pubcrawl, Resiliency, RFID, security, supply chain risk assessment, supply chain security
Abstract

Radio Frequency Identification (RFID) technology has been applied in many fields, such as tracking product through the supply chains, electronic passport (ePassport), proximity card, etc. Most companies will choose low-cost RFID tags. However, these RFID tags are almost no security mechanism so that criminals can easily clone these tags and get the user permissions. In this paper, we aim at more efficient detection proximity card be cloned and design a real-time intrusion detection system based on one tool of Complex Event Processing (Esper) in the RFID middleware. We will detect the cloned tags through training our system with the user's habits. When detected anomalous behavior which may clone tags have occurred, and then send the notification to user. We discuss the reliability of this intrusion detection system and describes in detail how to work.

URLhttp://doi.acm.org/10.1145/2987386.2987397
DOI10.1145/2987386.2987397
Citation Keyyin_intrusion_2016