Towards Practical Identification of HF RFID Devices

The deployment of RFID poses a number of security and privacy threats such as cloning, unauthorized tracking, etc. Although the literature contains many investigations of these issues on the logical level, few works have explored the security implications of the physical communication layer. Recently, related studies have shown the feasibility of identifying RFID-enabled devices based on physical-layer fingerprints. In this work, we leverage on these findings and demonstrate that physical-layer identification of HF RFID devices is also practical, that is, can achieve high accuracy and stability. We propose an improved hardware setup and enhanced techniques for fingerprint extraction and matching. Our new system enables device identification with an Equal Error Rate as low as 0.005 (0.5%) on a set 50 HF RFID smart cards of the same manufacturer and type. We further investigate the fingerprint stability over an extended period of time and across different acquisition setups. In the latter case, we propose a solution based on channel equalization that preserves the fingerprint quality across setups. Our results strengthen the practical use of physical-layer identification of RFID devices in product and document anti-counterfeiting solutions.

[1]  Darko Kirovski,et al.  RF Fingerprinting Physical Objects for Anticounterfeiting Applications , 2011, IEEE Transactions on Microwave Theory and Techniques.

[2]  Michael A. Temple,et al.  Improved wireless security for GMSK-based devices using RF fingerprinting , 2010, Int. J. Electron. Secur. Digit. Forensics.

[3]  Antonio Pascual Iserte Channel state Information and joint transmitter-receiver design in multi-antenna systems , 2005 .

[4]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[5]  Srinivas Devadas,et al.  Identification and authentication of integrated circuits , 2004, Concurr. Pract. Exp..

[6]  Sneha Kumar Kasera,et al.  On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.

[7]  Sofiène Tahar,et al.  IP watermarking techniques: survey and comparison , 2003, The 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications, 2003. Proceedings..

[8]  Srdjan Capkun,et al.  Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.

[9]  Ravi Sandhu,et al.  ACM Transactions on Information and System Security: Editorial , 2005 .

[10]  W. Kinsner,et al.  Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.

[11]  Chih-Ming Wang,et al.  Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards , 2009, IEEE Transactions on Microwave Theory and Techniques.

[12]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[13]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[14]  G. Szentirmai,et al.  Electronic filter design handbook , 1982, Proceedings of the IEEE.

[15]  Ralph D. Hippenstiel,et al.  Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.

[16]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[17]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[18]  S. Devadas,et al.  Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.

[19]  CapkunSrdjan,et al.  Towards Practical Identification of HF RFID Devices , 2012 .

[20]  Jia Di,et al.  Ownership Transfer of RFID Tags based on Electronic Fingerprint , 2008, Security and Management.

[21]  Srdjan Capkun,et al.  Physical-layer identification of UHF RFID tags , 2010, MobiCom.

[22]  Michael A. Temple,et al.  Improving Intra-Cellular Security Using Air Monitoring with RF Fingerprints , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[23]  Srinivas Devadas,et al.  Identification and authentication of integrated circuits: Research Articles , 2004 .

[24]  Ebby Ebby's Column. Ebby revisits. Q121-126 , 2006 .

[25]  Michel Barbeau,et al.  Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.

[26]  Farinaz Koushanfar,et al.  Robust stable radiometric fingerprinting for wireless devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[27]  Srdjan Capkun,et al.  Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[28]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[29]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[30]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[31]  K. Strimmer,et al.  Statistical Applications in Genetics and Molecular Biology A Shrinkage Approach to Large-Scale Covariance Matrix Estimation and Implications for Functional Genomics , 2011 .

[32]  Chih-Ming Wang,et al.  Identifying RF Identification Cards From Measurements of Resonance and Carrier Harmonics , 2010, IEEE Transactions on Microwave Theory and Techniques.

[33]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.

[34]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[35]  Jia Di,et al.  Fingerprinting RFID Tags , 2011, IEEE Transactions on Dependable and Secure Computing.

[36]  Dale R. Thompson,et al.  Fingerprinting Radio Frequency Identification Tags Using Timing Characteristics , 2009 .

[37]  B. Yener,et al.  Active Attacks Against Modulation-based Radiometric Identification , 2009 .

[38]  Darko Kirovski,et al.  An RFID system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities , 2010, 2010 IEEE MTT-S International Microwave Symposium.

[39]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[40]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[41]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[42]  Jonathon Shlens,et al.  A Tutorial on Principal Component Analysis , 2014, ArXiv.

[43]  Srinivas Devadas,et al.  Modeling attacks on physical unclonable functions , 2010, CCS '10.

[44]  Darko Kirovski,et al.  RF-DNA: Radio-Frequency Certificates of Authenticity , 2007, CHES.

[45]  Christopher M. Bishop,et al.  Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .