RF Fingerprinting Physical Objects for Anticounterfeiting Applications

Rendering typical RF identification (RFID) tags physically unique and hard to near-exactly replicate by complementing them with unique RF certificates of authenticity (RF-CoAs) can prove a valuable tool against counterfeiting. This paper introduces a new robust RFID system with enhanced hardware-enabled authentication and anticounterfeiting capabilities that relies on the near-field RF effects between a 5 × 5 antenna array and the uniquely modified substrate of the RF-CoAs. A microcontroller-enabled, low-power, and low-cost reader is used to accurately extract the near-field response (“RF fingerprint”) of the certificates meant to complement typical RFID tags in the 5-6-GHz frequency range. The RF characterization of all the reader's components, with an emphasis on the accuracy provided, has been performed. The state diagram of the fast and accurate reader operation is outlined. Rigorous performance and security test results are presented and verify the unique features of this technology.

[1]  Darko Kirovski,et al.  An RFID system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities , 2010, 2010 IEEE MTT-S International Microwave Symposium.

[2]  J. Laskar,et al.  Development and analysis of a folded shorted-patch antenna with reduced size , 2004, IEEE Transactions on Antennas and Propagation.

[3]  J. Blair Sine-fitting software for IEEE Standards 1057 and 1241 , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).

[4]  Nemai C. Karmakar,et al.  Design of fully printable chipless RFID tag on flexible substrate for secure banknote applications , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[5]  J. Kong,et al.  Theory of microwave remote sensing , 1985 .

[6]  Andrzej Pacut,et al.  Sine-wave parameters estimation - the second source of inaccuracy , 2003, Proceedings of the 20th IEEE Instrumentation Technology Conference (Cat. No.03CH37412).

[7]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[8]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.