Abstract
RFID tag authentication is challenging because most commodity tags cannot run cryptographic algorithms. Prior research demonstrates that physical layer information based authentication is a promising solution, which uses special features from the physical backscatter signals from tags as their fingerprints. However, our recent studies show that existing physical-layer authentication may fail if feature collection and authentication are conducted in different locations, due to location-dependent noises, environmental factors, or reader hardware differences.
This paper presents a new physical layer authentication scheme, called Butterfly, which is resilient to environment and location changes. Butterfly utilizes a pair of adjacent tags as an identifier of each object. By using the difference between the RF signals of the two tags as their fingerprint, the environmental factors can be effectively canceled. Butterfly is fully compatible with commodity RFID systems and standards. We set up a prototype Butterfly using commodity readers, tags, and RF devices. Extensive experiments show that Butterfly achieves high authentication accuracy for substantially different environments and device changes.
Supplemental Material
Available for Download
Supplemental movie, appendix, image and software files for, Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID
- NXP UCODE DNA RFID. https://www.nxp.com/docs/en/fact-sheet/UCODEDNATRACKLF.pdf.Google Scholar
- A. N. Akansu and R. A. Haddad. Multiresolution Signal Decomposition: Transforms, Subbands, and Wavelets. Academic press, 2001. Google ScholarDigital Library
- L. Bruns and S. Chakraborty. Method for cryptographically combining hf and uhf rfid tags/smart cards to create a single multi-use credential, 2008.Google Scholar
- B. Danev, H. Luecken, S. Capkun, and K. El Defrawy. Attacks on physical-layer identification. In In Proceedings of the third ACM conference on Wireless network security(WISEC). ACM, 2010. Google ScholarDigital Library
- H. Ding, C. Qian, J. Han, G. Wang, Z. Jiang, J. Zhao, and W. Xi. Device-free detection of approach and departure behaviors using backscatter communication. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pages 167--177. ACM, 2016. Google ScholarDigital Library
- EPCglobal. Specification for RFID Air Interface EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHzĺC960 MHz, 2008.Google Scholar
- M. Feldhofer and J. Wolkerstorfer. Strong crypto for rfid tags - a comparison of low-power hardware implementations. In In Proceedings of the IEEE International Symposium on Circuits and Systems, 2007.Google ScholarCross Ref
- G. Franceschetti and S. Stornelli. From the Physical Layer to Communication, Computing, Sensing and Control. In Wireless Networks, 2006. Google ScholarDigital Library
- J. Han, C. Qian, P. Yang, D. Ma, Z. Jiang, W. Xi, and J. Zhao. Geneprint: Generic and accurate physical-layer identification for uhf rfid tags. IEEE/ACM Transactions on Networking (TON), 24(2):846--858, 2016. Google ScholarDigital Library
- Y. Hou, J. Ou, Y. Zheng, and M. Li. PLACE: Physical layer cardinality estimation for large-scale RFID systems. IEEE/ACM transactions on networking, 24(5):2702--2714, 2016. Google ScholarDigital Library
- K. Koscher, A. Juels, V. Brajkovic, and T. Kohno. Epc rfid tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond. In In Proceedings of the ACM CCS, 2009. Google ScholarDigital Library
- Z. Li, Y. Xie, M. Li, and K. Jamieson. Recitation: Rehearsing wireless packet reception in software. In Proceedings of ACM MobiCom, 2015. Google ScholarDigital Library
- Y. Liu and Z. Li. aleak: Privacy leakage through context-free wearable side-channel. In Proceedings IEEE INFOCOM, 2018.Google ScholarCross Ref
- L. M. Ni, Y. Liu, Y. C. Lau, and A. P. Patil. LANDMARC: indoor location sensing using active RFID. Wireless networks, 10(6):701--710, 2004. Google ScholarDigital Library
- S. C. G. Periaswamy, D. R. Thompson, and J. Di. Fingerprinting rfid tags. IEEE Transactions on Dependable and Secure Computing, 8(6):938--943, 2011. Google ScholarDigital Library
- A. Poschmann, G. Leander, K. Schramm, and C. Paar. New light-weight crypto algorithms for rfid. In In Proceedings of the IEEE International Symposium on Circuits and Systems. IEEE, 2008.Google Scholar
- L. Shangguan, Z. Yang, A. X. Liu, Z. Zhou, and Y. Liu. STPP: Spatial-temporal phase profiling-based method for relative RFID tag localization. IEEE/ACM Transactions on Networking, 25(1):596--609, 2017. Google ScholarDigital Library
- D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In In Proceedings of the IEEE Symposium on Security and Privacy(S&P). IEEE, 2000. Google ScholarDigital Library
- G. Wang, C. Qian, H. Cai, J. Han, H. Ding, and J. Zhao. Replay-resilient physical-layer authentication for battery-free iot devices. In Proceedings of ACM Hotwireless, 2017. Google ScholarDigital Library
- G. Wang, C. Qian, J. Han, W. Xi, H. Ding, Z. Jiang, and J. Zhao. Verifiable smart packaging with passive rfid. In In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2016. Google ScholarDigital Library
- J. Wang and D. Katabi. Dude, whereąŕs my card?: RFID positioning that works with multipath and non-line of sight.. In In Proceedings of the ACM International Conference on the applications, technologies, architectures, and protocols for computer communication(SIGCOMM). ACM, 2013. Google ScholarDigital Library
- L. Xie, Q. Li, C. Wang, X. Chen, and S. Lu. Exploring the gap between ideal and reality: An experimental study on continuous scanning with mobile reader in rfid systems. IEEE Transactions on Mobile Computing, 14(11):2272--2285, 2015. Google ScholarDigital Library
- L. Xie, C. Wang, A. X. Liu, J. Sun, and S. Lu. Multi-touch in the air: Concurrent micromovement recognition using rf signals. IEEE/ACM Transactions on Networking, 26(1):231--244, 2018. Google ScholarDigital Library
- L. Yang, Q. Lin, C. Duan, and Z. An. Analog On-tag Hashing: Selective Reading as Hash Primitives for COTS Gen2 RFID Systems. In In Proceedings of IEEE MOBICOM, 2017. Google ScholarDigital Library
- D. Zanetti, B. Danev, et al. Physical-layer identification of UHF RFID tags. In In Proceedings of the IEEE International Conference on Mobile Computing and Networking(MOBICOM). ACM, 2010. Google ScholarDigital Library
- D. Zanetti, P. Sachs, and S. Capkun. On the practicality of UHF RFID fingerprinting: How real is the RFID tracking problem? In Privacy Enhancing Technologies. Springer, 2011. Google ScholarDigital Library
- P. Zhang, J. Gummeson, and D. Ganesan. Blink: A high throughput link layer for backscatter communication. In In Proceedings of the 10th international conference on Mobile systems, applications, and services. ACM, 2012. Google ScholarDigital Library
- Y. Zheng and M. Li. P-MTI: Physical-layer missing tag identification via compressive sensing. IEEE/ACM Transactions on Networking (TON), 23(4):1356--1366, 2015. Google ScholarDigital Library
Index Terms
- Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID
Recommendations
Towards Replay-resilient RFID Authentication
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and NetworkingWe provide the first solution to an important question, "how a physical-layer authentication method can defend against signal replay attacks''. It was believed that if an attacker can replay the exact same reply signal of a legitimate authentication ...
Replay-resilient Physical-layer Authentication for Battery-free IoT Devices
HotWireless '17: Proceedings of the 4th ACM Workshop on Hot Topics in WirelessOn battery-free IoT devices such as passive RFID tags, it is extremely difficult, if not impossible, to run cryptographic algorithms. Hence physical-layer identification methods are proposed to validate the authenticity of passive tags. However no ...
An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based Encryption
Artificial Intelligence and SecurityAbstractTo solve low computing efficiency and high computational energy consumption in the traditional Public-key Infrastructure cryptosystem in the authentication of IoT devices, an authentication scheme for IoT devices based on the Identity-based ...
Comments