Visible to the public Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection

TitleEvaluation of Two RFID Traffic Models with Potential in Anomaly Detection
Publication TypeConference Paper
Year of Publication2018
AuthorsAlkadi, A., Chi, H., Prodanoff, Z. G., Kreidl, P.
Conference NameSoutheastCon 2018
Date PublishedApril
ISBN Number978-1-5386-6133-8
KeywordsAdaptation models, anomaly detection, anomaly/intrusion detection, Bayes methods, Bayesian Blocks, binned RFID command counts, Computational modeling, graph theory, Human Behavior, human factors, IEC standards, IoT, ISO standards, Knuth's Rule, modeling algorithms, modeling technique, NFC, piecewise graphs, pubcrawl, radiofrequency identification, resilience, Resiliency, RFID, RFID security, RFID traces, RFID traffic models, RFID traffic patterns, RFIDs, telecommunication security, telecommunication traffic, traffic characterization

The use of Knuth's Rule and Bayesian Blocks constant piecewise models for characterization of RFID traffic has been proposed already. This study presents an evaluation of the application of those two modeling techniques for various RFID traffic patterns. The data sets used in this study consist of time series of binned RFID command counts. More specifically., we compare the shape of several empirical plots of raw data sets we obtained from experimental RIFD readings., against the constant piecewise graphs produced as an output of the two modeling algorithms. One issue limiting the applicability of modeling techniques to RFID traffic is the fact that there are a large number of various RFID applications available. We consider this phenomenon to present the main motivation for this study. The general expectation is that the RFID traffic traces from different applications would be sequences with different histogram shapes. Therefore., no modeling technique could be considered universal for modeling the traffic from multiple RFID applications., without first evaluating its model performance for various traffic patterns. We postulate that differences in traffic patterns are present if the histograms of two different sets of RFID traces form visually different plot shapes.

Citation Keyalkadi_evaluation_2018