用户名: 密码: 验证码:
Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting
详细信息    查看全文
  • 关键词:Radio frequency fingerprinting ; Radio frequency identification ; Physical ; layer ; Clone attack ; Security
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:10060
  • 期:1
  • 页码:284-299
  • 全文大小:1,565 KB
  • 参考文献:1.Traub, K., Allgair, G., Barthel, H., Burstein, L., Garrett, J., Hogan, B., Rodrigues, B., Sarma, S., Schmidt, J., Schramek, C., et al.: The EPCglobal architecture framework. In: EPCglobal Ratified Specification (2005)
    2.Huang, C.-H., Huang, S.-C.: RFID systems integrated OTP security authentication design. In: Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2013 Asia-Pacific, pp. 1–8. IEEE (2013)
    3.Abughazalah, S., Markantonakis, K., Mayes, K.: Enhancing the key distribution model in the RFID-enabled supply chains. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 871–878. IEEE (2014)
    4.Grunwald, L.: New attack to RFID-systems and their middleware and backends. Black Hat Briefings, USA (2006)
    5.OConnor, M.C.: Industry group says e-passport clone poses little risk. RFID J. 9, 1–2 (2006)
    6.Westhues, J.: Hacking the prox card. In: RFID: Applications, Security, and Privacy, pp. 291–300 (2005)
    7.Hui, L., Yahui, D., Dongsheng, L., Zilong, L., Dawei, H., Hengqing, T.: A lattice-based public-key encryption scheme for RFID applications. In: 2014 12th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT), pp. 1–3. IEEE (2014)
    8.Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). doi:10.​1007/​3-540-48405-1_​25
    9.Danev, B., Heydt-Benjamin, T.S., Capkun, S.: Physical-layer identification of RFID devices. In: USENIX Security Symposium, pp. 199–214 (2009)
    10.Danev, B., Capkun, S., Masti, R.J., Benjamin, T.S.: Towards practical identification of HF RFID devices. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(2), 7 (2012)CrossRef
    11.Gounder, S.C.G., Thompson, D.R., Di, J.: Fingerprinting RFID tags. IEEE Trans. Dependable Secure Comput. 8(6), 938–943 (2011)CrossRef
    12.Honglin, Y., Aiqun, H.: Fountainhead and uniqueness of RF fingerprint. J. SE Univ. (Nat. Sci. Ed.) 39(2), 230–233 (2009)
    13.Periaswamy, S.C.G., Thompson, D.R., Romero, H.P., Di, J.: Fingerprinting radio frequency identification tags using timing characteristics. In: Proceedings of Workshop on RFID Security-RFID-sec Asia (2010)
    14.Hasse, J., Gloe, T., Beck, M.: Forensic identification of GSM mobile phones. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 131–140. ACM (2013)
    15.Patel, H.J., Temple, M.A., Baldwin, R.O.: Improving zigbee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting. IEEE Trans. Reliab. 64(1), 221–233 (2015)CrossRef
    16.Zanetti, D., Sachs, P., Capkun, S.: On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem? In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 97–116. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-22263-4_​6 CrossRef
    17.Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.-M.: Electromagnetic measurements for counterfeit detection of radio frequency identification cards. IEEE Trans. Microw. Theor. Tech. 57(5), 1383–1387 (2009)CrossRef
    18.Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.-M., Brown, T.X.: Identifying RF identification cards from measurements of resonance and carrier harmonics. IEEE Trans. Microw. Theor. Tech. 58(7), 1758–1765 (2010)CrossRef
    19.Chawla, V., Ha, D.S.: An overview of passive RFID. IEEE Commun. Mag. 45(9), 11–17 (2007)CrossRef
    20.Cobb, W.E., Laspe, E.D., Baldwin, R.O., Temple, M.A., Kim, Y.C.: Intrinsic physical-layer authentication of integrated circuits. IEEE Trans. Inf. Forensics Secur. 7(1), 14–24 (2012)CrossRef
    21.Yuan, H.L., Hu, A.Q.: Preamble-based detection of Wi-Fi transmitter RF fingerprints. Electron. lett. 46(16), 1165–1167 (2010)CrossRef
    22.Oppenheim, A.V., Schafer, R.W., Buck, J.R., et al.: Discrete-Time Signal Processing, vol. 2. Prentice hall, Englewood Cliffs (1989)MATH
    23.Bertoncini, C., Rudd, K., Nousain, B., Hinders, M.: Wavelet fingerprinting of radio-frequency identification (RFID) tags. IEEE Trans. Ind. Electron. 59(12), 4843–4850 (2012)CrossRef
    24.Bishop, C.M.: Pattern recognition. Mach. Learn. 128 (2006)
  • 作者单位:Guozhu Zhang (17) (18) (19)
    Luning Xia (17) (18)
    Shijie Jia (17) (18) (19)
    Yafei Ji (17) (18) (19)

    17. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, China
    18. Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, 100093, China
    19. University of Chinese Academy of Sciences, Beijing, 100049, China
  • 丛书名:Information Security Practice and Experience
  • ISBN:978-3-319-49151-6
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
  • 卷排序:10060
文摘
High frequency radio frequency identification (RFID) cards have been widely used in many fields. At the same time, a variety of security issues such as illegal cloning attacks have also arisen. Many security protocols have been proposed. However, most of them focused on security implication of the logical layer, little attention was paid to the physical-layer characteristics of cards. In this work, by investigating electromagnetic characteristics of HF RFID cards, a new method of extracting RF fingerprint is proposed based on higher order statistical features of ATQA envelope. By evaluating our technique on a set of 300 HF cards from 6 manufacturers, we can achieve accuracy of 100 % for all types. The influence of the placement on the fingerprint of the same card is also discussed. As the feature extraction can be implemented under normal working state of cards, it is practical to realize real-time identification of HF RFID cards.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700