Intrusion Detection System Based on Complex Event Processing in RFID Middleware
Title | Intrusion Detection System Based on Complex Event Processing in RFID Middleware |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Yin, Shang-Nan, Kang, Ho-Seok, Chen, Zhi-Guo, Kim, Sung-Ryul |
Conference Name | Proceedings of the International Conference on Research in Adaptive and Convergent Systems |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4455-5 |
Keywords | Collaboration, complex event process, composability, ESPER, IDS, Intrusion detection, Intrusion Detection System (IDS), Intrusion Detection Systems, middleware, pubcrawl, Resiliency, RFID, security, supply chain risk assessment, supply chain security |
Abstract | Radio Frequency Identification (RFID) technology has been applied in many fields, such as tracking product through the supply chains, electronic passport (ePassport), proximity card, etc. Most companies will choose low-cost RFID tags. However, these RFID tags are almost no security mechanism so that criminals can easily clone these tags and get the user permissions. In this paper, we aim at more efficient detection proximity card be cloned and design a real-time intrusion detection system based on one tool of Complex Event Processing (Esper) in the RFID middleware. We will detect the cloned tags through training our system with the user's habits. When detected anomalous behavior which may clone tags have occurred, and then send the notification to user. We discuss the reliability of this intrusion detection system and describes in detail how to work. |
URL | http://doi.acm.org/10.1145/2987386.2987397 |
DOI | 10.1145/2987386.2987397 |
Citation Key | yin_intrusion_2016 |