Butterfly: Environment-Independent Physical-Layer Authentication for Passive RFID

RFID tag authentication is challenging because most commodity tags cannot run cryptographic algorithms. Prior research demonstrates that physical layer information based authentication is a promising solution, which uses special features from the physical backscatter signals from tags as their fingerprints. However, our recent studies show that existing physical-layer authentication may fail if feature collection and authentication are conducted in different locations, due to location-dependent noises, environmental factors, or reader hardware differences. This paper presents a new physical layer authentication scheme, called Butterfly, which is resilient to environment and location changes. Butterfly utilizes a pair of adjacent tags as an identifier of each object. By using the difference between the RF signals of the two tags as their fingerprint, the environmental factors can be effectively canceled. Butterfly is fully compatible with commodity RFID systems and standards. We set up a prototype Butterfly using commodity readers, tags, and RF devices. Extensive experiments show that Butterfly achieves high authentication accuracy for substantially different environments and device changes.

[1]  Mo Li,et al.  Recitation: Rehearsing Wireless Packet Reception in Software , 2015, MobiCom.

[2]  Tadayoshi Kohno,et al.  EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond , 2009, CCS.

[3]  Srdjan Capkun,et al.  On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem? , 2011, PETS.

[4]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[5]  Zhenjiang Li,et al.  aLeak: Privacy Leakage through Context - Free Wearable Side-Channel , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[6]  Jizhong Zhao,et al.  GenePrint: Generic and accurate physical-layer identification for UHF RFID tags , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).

[7]  Jue Wang,et al.  Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.

[8]  Yuanqing Zheng,et al.  PLACE: Physical Layer Cardinality Estimation for Large-Scale RFID Systems , 2015, IEEE/ACM Transactions on Networking.

[9]  Mo Li,et al.  P-MTI: Physical-Layer Missing Tag Identification via Compressive Sensing , 2013, IEEE/ACM Transactions on Networking.

[10]  Srdjan Capkun,et al.  Physical-layer identification of UHF RFID tags , 2010, MobiCom.

[11]  R. Haddad,et al.  Multiresolution Signal Decomposition: Transforms, Subbands, and Wavelets , 1992 .

[12]  Wei Xi,et al.  Device-free detection of approach and departure behaviors using backscatter communication , 2016, UbiComp.

[13]  Wei Xi,et al.  Verifiable Smart Packaging with Passive RFID , 2016, IEEE Transactions on Mobile Computing.

[14]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[15]  Lei Yang,et al.  Analog On-Tag Hashing: Towards Selective Reading as Hash Primitives in Gen2 RFID Systems , 2017, MobiCom.

[16]  Yunhao Liu,et al.  STPP: Spatial-Temporal Phase Profiling-Based Method for Relative RFID Tag Localization , 2017, IEEE/ACM Transactions on Networking.

[17]  Johannes Wolkerstorfer,et al.  Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[18]  Giorgio Franceschetti,et al.  Wireless Networks: From the Physical Layer to Communication, Computing, Sensing and Control , 2006 .

[19]  Deepak Ganesan,et al.  BLINK: a high throughput link layer for backscatter communication , 2012, MobiSys '12.

[20]  Xi Chen,et al.  Exploring the Gap between Ideal and Reality: An Experimental Study on Continuous Scanning with Mobile Reader in RFID Systems , 2015, IEEE Transactions on Mobile Computing.

[21]  Ali N. Akansu,et al.  Chapter 2 – Orthogonal Transforms , 1992 .

[22]  Sanglu Lu,et al.  Multi-Touch in the Air: Concurrent Micromovement Recognition Using RF Signals , 2018, IEEE/ACM Transactions on Networking.

[23]  Jizhong Zhao,et al.  Replay-resilient Physical-layer Authentication for Battery-free IoT Devices , 2017, HotWireless '17.

[24]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[25]  Jia Di,et al.  Fingerprinting RFID Tags , 2011, IEEE Transactions on Dependable and Secure Computing.

[26]  Christof Paar,et al.  New Light-Weight Crypto Algorithms for RFID , 2007, 2007 IEEE International Symposium on Circuits and Systems.