RF-Access: Barrier-Free Access Control Systems with UHF RFID

Traditional RFID-based access control systems use flap barriers to help manage pedestrian access and block unauthorized staff at any entrance, which requires visitors to swipe their cards individually and wait for the opening of the blocking body, resulting in low-frequency pedestrian access and even congestion in places with large passenger flow. This paper proposes a barrier-free access control system (RF-Access) with UHF RFID technology. The main advantage of RF-Access is that it provides non-intrusive access control by removing flap barriers and operations of swiping the card. The visitors just go across the system without any stay at the entrance. Meanwhile RF-Access performs the authentication, which greatly improves time efficiency and quality of service. RF-Access addresses two key issues of the non-intrusive access control: motion direction detection and illegal intrusion detection. In RF-Access, we first propose a dual-antenna system setup together with a time-slot-based model to monitor users’ moving directions, which is robust to different environmental factors, such as multi-path effects. Afterwards, we use a tag array to detect illegal intrusion in case attackers do not carry any RFID tags. We implement a prototype of RF-Access with commercial RFID devices. Extensive experiments show that our system can detect the moving direction with 99.83% accuracy and detect illegal intrusion with an accuracy of 96.67%.

[1]  Bartosz Jachnik,et al.  Localization of LHD Machines in Underground Conditions Using IMU Sensors and DTW Algorithm , 2021, Applied Sciences.

[2]  Min Chen,et al.  Pose Sensing With a Single RFID Tag , 2020, IEEE/ACM Transactions on Networking.

[3]  Xia Wang,et al.  RF-scanner: Shelf scanning with robot-assisted RFID systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[4]  Zongtian Wei,et al.  An Access Control and Positioning Security Management System Based on RFID , 2015, 2015 7th International Conference on Intelligent Human-Machine Systems and Cybernetics.

[5]  Lei Yang,et al.  ShopMiner: Mining Customer Shopping Behavior in Physical Clothing Stores with COTS RFID Devices , 2015, SenSys.

[6]  Lei Yang,et al.  Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices , 2014, MobiCom.

[7]  Torben Larsen,et al.  Fast Capture—Recapture Approach for Mitigating the Problem of Missing RFID Tags , 2012, IEEE Transactions on Mobile Computing.

[8]  Tsan-Ming Choi,et al.  Coordination and Risk Analysis of VMI Supply Chains With RFID Technology , 2011, IEEE Transactions on Industrial Informatics.

[9]  G.D. Durgin,et al.  Complete Link Budgets for Backscatter-Radio and RFID Systems , 2009, IEEE Antennas and Propagation Magazine.

[10]  L. Breiman Random Forests , 2001, Encyclopedia of Machine Learning and Data Mining.

[11]  Dong Jiang,et al.  Eingerprint: Robust Energy-related Fingerprinting for Passive RFID Tags , 2020, NSDI.