Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Title | Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Alkadi, A., Chi, H., Prodanoff, Z. G., Kreidl, P. |
Conference Name | SoutheastCon 2018 |
Date Published | April |
ISBN Number | 978-1-5386-6133-8 |
Keywords | Adaptation models, anomaly detection, anomaly/intrusion detection, Bayes methods, Bayesian Blocks, binned RFID command counts, Computational modeling, graph theory, Human Behavior, human factors, IEC standards, IoT, ISO standards, Knuth's Rule, modeling algorithms, modeling technique, NFC, piecewise graphs, pubcrawl, radiofrequency identification, resilience, Resiliency, RFID, RFID security, RFID traces, RFID traffic models, RFID traffic patterns, RFIDs, telecommunication security, telecommunication traffic, traffic characterization |
Abstract | The use of Knuth's Rule and Bayesian Blocks constant piecewise models for characterization of RFID traffic has been proposed already. This study presents an evaluation of the application of those two modeling techniques for various RFID traffic patterns. The data sets used in this study consist of time series of binned RFID command counts. More specifically., we compare the shape of several empirical plots of raw data sets we obtained from experimental RIFD readings., against the constant piecewise graphs produced as an output of the two modeling algorithms. One issue limiting the applicability of modeling techniques to RFID traffic is the fact that there are a large number of various RFID applications available. We consider this phenomenon to present the main motivation for this study. The general expectation is that the RFID traffic traces from different applications would be sequences with different histogram shapes. Therefore., no modeling technique could be considered universal for modeling the traffic from multiple RFID applications., without first evaluating its model performance for various traffic patterns. We postulate that differences in traffic patterns are present if the histograms of two different sets of RFID traces form visually different plot shapes. |
URL | https://ieeexplore.ieee.org/document/8478877 |
DOI | 10.1109/SECON.2018.8478877 |
Citation Key | alkadi_evaluation_2018 |
- modeling technique
- traffic characterization
- telecommunication traffic
- telecommunication security
- RFIDs
- RFID traffic patterns
- RFID traffic models
- RFID traces
- RFID security
- RFID
- Resiliency
- resilience
- radiofrequency identification
- pubcrawl
- piecewise graphs
- NFC
- Adaptation models
- modeling algorithms
- Knuth's Rule
- ISO standards
- IoT
- IEC standards
- Human Factors
- Human behavior
- graph theory
- Computational modeling
- binned RFID command counts
- Bayesian Blocks
- Bayes methods
- anomaly/intrusion detection
- Anomaly Detection