4 Cloning credit or debit cards. Wireless identity theft is a technique of stealing an individual’s personal information from radio-frequency-enabled cards (e.g., credit or debit cards). Upon capturing this data, thieves are able to program their own cards to respond in an identical fashion via cloning. A method for detecting cloning attacks in radiofrequency identification (RFID) applications was explored in IEEE Transactions on Information Forensics and Security (March, 2013). The method was illustrated using a simple ball drawing game. Consider a group of 10 balls, 5 representing genuine RFID cards and 5 representing clones of one or more of these cards. A labeling system was used to distinguish among the different genuine cards. Since there are 5 genuine cards, 5 letters—A, B, C, D, and E—were used. Balls labeled with the same letter represent either the genuine card or a clone of the card. Suppose the 10 balls are labeled as follows: 3 A’s, 2 B’s, 1 C, 3 D’s, 1 E. (See figure below.) Note that the singleton C and E balls must represent the genuine cards (i.e., there are no clones of these cards). If two balls of the same letter are drawn (without replacement) from the 10 balls, then a cloning attack is detected. For this example, find the probability of detecting a cloning attack.
4 Cloning credit or debit cards. Wireless identity theft is a
technique of stealing an individual’s personal information
from radio-frequency-enabled cards (e.g., credit or debit
cards). Upon capturing this data, thieves are able to program their own cards to respond in an identical fashion via
cloning. A method for detecting cloning attacks in radiofrequency identification (RFID) applications was explored
in IEEE Transactions on Information Forensics and Security (March, 2013). The method was illustrated using a
simple ball drawing game. Consider a group of 10 balls,
5 representing genuine RFID cards and 5 representing
clones of one or more of these cards. A labeling system
was used to distinguish among the different genuine cards.
Since there are 5 genuine cards, 5 letters—A, B, C, D, and
E—were used. Balls labeled with the same letter represent
either the genuine card or a clone of the card. Suppose the
10 balls are labeled as follows: 3 A’s, 2 B’s, 1 C, 3 D’s,
1 E. (See figure below.) Note that the singleton C and E
balls must represent the genuine cards (i.e., there are no
clones of these cards). If two balls of the same letter are
drawn (without replacement) from the 10 balls, then a
cloning attack is detected. For this example, find the
Trending now
This is a popular solution!
Step by step
Solved in 5 steps