Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Fingertip Profiled RF Identifier

Published: 01 February 2022 Publication History

Abstract

This paper presents RF-Mehndi, a passive commercial RFID tag array formed identifier. The key RF-Mehndi novelty is that when the user’s fingertip touching on the tag array surface during the communication, the backscattered signals by the tag array become user-dependent and unique. Hence, if we enhance the communication modality of many personal cards nowadays by RF-Mehndi, in case that a card gets lost or stolen, it cannot be used illegally by the adversaries. To harvest such a benefit, we leverage two key observations in designing RF-Mehndi. The first one is when tags are nearby, their interrogated currents can change each other’s circuit characteristics, based on which unique phase features can be obtained from backscattered signals. The second observation is that when the user’s fingertip touches the tag array surface during communication, the phase feature can be further profiled by this user. Based on these observations, the card and its holder can be potentially authenticated at the same time. To transfer the RF-Mehndi idea to a practical system, we further address technical challenges. We implement a prototype system. Extensive evaluations show the effectiveness of RF-Mehndi, achieving excellent authentication performance.

References

[1]
Linear bluepass access control solution, 2018. [Online]. Available: http://www.nortekcontrol.com/bluepass/, nortek Security & Control
[3]
R. Nandakumar, K. K. Chintalapudi, and N. Venkata, “Dhwani: Secure peer-to-peer acoustic NFC,” in Proc. ACM SIGCOMM Conf. SIGCOMM, 2013, pp. 63–74.
[4]
C. Bessette, “How serious a crime is credit card theft and fraud,” 2018. [Online]. Available: https://www.nerdwallet.com/blog/credit-cards/credit-card-theft-fraud-serious-crime-penalty/, nerdwallet
[5]
L. Irby, “Setting a secure credit card pin and password,” 2018. [Online]. Available: https://www.thebalance.com/create-secure-credit-card-pin-or-password-960788, the balance, Fraud & ID Theft.
[6]
L. Xie, C. Wang, A. X. Liu, J. Sun, and S. Lu, “Multi-touch in the air: Concurrent micromovement recognition using RF signals,” IEEE/ACM Trans. Netw., vol. 26, no. 1, pp. 231–244, Feb. 2018.
[7]
S. Pradhan, E. Chai, K. Sundaresan, L. Qiu, M. A. Khojastepour, and S. Rangarajan, “RIO: A pervasive RFID-based touch gesture interface,” in Proc. 23rd Annu. Int. Conf. Mobile Comput. Netw., 2017, pp. 261–274.
[8]
Y. Tanaka, Y. Umeda, O. Takyu, M. Nakayama, and K. Kodama, “Change of read range for UHF passive RFID tags in close proximity,” in Proc. IEEE Int. Conf. RFID, 2009, pp. 338–345.
[9]
S. K. Timalsina, R. Bhusal, and S. Moh, “NFC and its application to mobile payment: Overview and comparison,” in Proc. 8th Int. Conf. Inf. Sci. Digit. Content Technol., 2012, pp. 203–206.
[10]
GS1 EPCglobal Inc., “Specification for RFID air interface,” Radio-Freq. Identity Protocols Class-1 Gener.-2 UHF RFID Protocol Commun. 860 MHz-960 MHz, vol. 860, pp. 1–94, 2005.
[11]
Impinj Inc., “Low level user data support,” Speedway Revolution Reader Appl. Note, 2010.
[12]
H. Ding, et al., “Trio: Utilizing tag interference for refined localization of passive RFID,” in Proc. IEEE INFOCOM, 2018, pp. 828–836.
[13]
Y. Yang, W. Zhang, and Q. Sun, “Design and preliminary test of a palm bio-impedance spectroscopy measurement system for biometric authentication,” in Proc. IEEE Int. Symp. Comput. Consum. Control, 2014, pp. 824–827.
[14]
M. Y. Jaffrin and H. Morel, “Extracellular volume measurements using bioimpedance spectroscopy-Hanai method and wrist–ankle resistance at 50 kHz,” Med. Biol. Eng. Comput., vol. 47, no. 1, 2009, Art. no.
[15]
T. R. Kuphaldt, “Electrical safety,” Lessons Electric Circuits, vol. 1, 2017. [Online]. Available: http://www.ibiblio.org/kuphaldt/electricCircuits/DC/
[16]
J. Gregory, S. Tang, Y. Luo, and Y. Shen, “Bio-impedance identification of fingertip skin for enhancement of electro-tactile-based preference,” Int. J. Intell. Robot. Appl., vol. 1, no. 3, pp. 327–341, 2017.
[17]
J. Han, et al., “CBID: A customer behavior identification system using passive tags,” IEEE/ACM Trans. Netw., vol. 24, no. 5, pp. 2885–2898, Oct. 2016.
[18]
L. Yang, Y. Chen, X.-Y. Li, C. Xiao, M. Li, and Y. Liu, “Tagoram: Real-time tracking of mobile RFID tags to high precision using COTS devices,” in Proc. 20th Annu. Int. Conf. Mobile Comput. Netw., 2014, pp. 237–248.
[19]
F. Xiao, Z. Wang, N. Ye, R. Wang, and X. Li, “One more tag enables fine-grained RFID localization and tracking,” IEEE/ACM Trans. Netw., vol. 26, no. 1, pp. 161–174, Feb. 2018.
[20]
L. Shangguan, Z. Yang, A. X. Liu, Z. Zhou, and Y. Liu, “STPP: Spatial-temporal phase profiling-based method for relative RFID tag localization,” IEEE/ACM Trans. Netw., vol. 25, no. 1, pp. 596–609, Feb. 2017.
[21]
S. Wold, K. Esbensen, and P. Geladi, “Principal component analysis,” Chemometrics Intell. Lab. Syst., vol. 2, pp. 37–52, 1987.
[22]
G. Holmes, A. Donkin, and I. H. Witten, “WEKA: A machine learning workbench,” in Proc. IEEE Australian New Zealnd Intell. Inf. Syst. Conf., 1994, pp. 357–361.
[23]
J. Platt, “Fast training of support vector machines using sequential minimal optimization,” in Advances in Kernel Methods: Support Vector Learning. Cambridge, MA, USA: MIT Press, 1998.
[24]
C.-W. Hsu, C.-C. Chang, and C.-J. Lin, “A practical guide to support vector classification,” 2003.
[25]
G. F. Smits and E. M. Jordaan, “Improved SVM regression using mixtures of kernels,” in Proc. Int. Joint Conf. Neural Netw., 2002, pp. 2785–2790.
[26]
How long does it take to change your body, 2017. [Online]. Available: http://https://www.bodycompcoaching.com/blog/2017/09/how-long-does-it-take-to-change-your-body/, body Composition.
[27]
C. Duan, L. Yang, Q. Lin, and Y. Liu, “Tagspin: High accuracy spatial calibration of RFID antennas via spinning tags,” IEEE Trans. Mobile Comput., vol. 17, no. 10, pp. 2438–2451, Oct. 2018.
[28]
J. Xiong and K. Jamieson, “ArrayTrack: A fine-grained indoor location system,” in Proc. 10th USENIX Conf. Netw. Syst. Des. Implementation, 2013, pp. 71–84.
[29]
J. Amajama and M. Eshiet, “Impact of weather components on (UHF) radio signal,” Int. J. Eng. Res. Gen. Sci., vol. 4, no. 3, pp. 481–494, 2016.
[30]
L. Zhenzhong, M. Nezih, X. George, O. Yuu, L. Guocheng, and B. Dayan, “Effects of temperature and humidity on UHF RFID performance,” in Proc. CANSMART Workshop Smart Mater. Struct., 2011, pp. 1–10.
[31]
I. Martinovic, K. B. Rasmussen, M. Roeschlin, and G. Tsudik, “Pulse-response: Exploring human body impedance for biometric recognition,” ACM Trans. Privacy Secur., vol. 20, no. 2, pp. 1–31, 2017.
[32]
J. Castizo-Olier, et al., “Bioelectrical impedance vector analysis (BIVA) and body mass changes in an ultra-endurance Triathlon event,” J. Sports Sci. Med., vol. 17, no. 4, pp. 571–579, 2018.
[33]
R. Gudivaka, D. Schoeller, and R. F. Kushner, “Effect of skin temperature on multifrequency bioelectrical impedance analysis,” J. Appl. Physiol., vol. 81, no. 2, pp. 838–845, 1996.
[34]
Z. Yan, Q. Song, R. Tan, Y. Li, M. Li, and A. W. K. Kong, “Towards touch-to-access device authentication using induced body electric potentials,” in Proc. 25th Annu. Int. Conf. Mobile Comput. Netw., 2019, pp. 1–16.
[35]
H. Feng, K. Fawaz, and K. G. Shin, “Continuous authentication for voice assistants,” in Proc. 23rd Annu. Int. Conf. Mobile Comput. Netw., 2017, pp. 343–355.
[36]
C. Song, F. Lin, Y. Zhuang, W. Xu, C. Li, and K. Ren, “Cardiac scan: A non-contact and continuous heart-based user authentication system,” in Proc. 23rd Annu. Int. Conf. Mobile Comput. Netw., 2017, pp. 315–328.
[37]
T. Li, W. Luo, Z. Mo, and S. Chen, “Privacy-preserving RFID authentication based on cryptographical encoding,” in Proc. IEEE INFOCOM, 2012, pp. 2174–2182.
[38]
M. Sun, K. Sakai, W. Ku, T. H. Lai, and A. V. Vasilakos, “Private and secure tag access for large-scale RFID systems,” IEEE Trans. Dependable Secure Comput., vol. 13, no. 6, pp. 657–671, Nov./Dec. 2016.
[39]
P. Xie, J. Feng, Z. Cao, and J. Wang, “GeneWave: Fast authentication and key agreement on commodity mobile devices,” IEEE/ACM Trans. Netw., vol. 26, no. 4, pp. 1688–1700, Aug. 2018.
[40]
X. Ji, J. Wang, M. Liu, Y. Yan, P. Yang, and Y. Liu, “Hitchhike: Riding control on preambles,” in Proc. IEEE INFOCOM, 2014, pp. 2499–2507.
[41]
H. Ding, et al., “Preventing unauthorized access on passive tags,” in Proc. IEEE INFOCOM, 2018, pp. 1115–1123.
[42]
D. Zanetti, B. Danev, and C. Srdjan, “Physical-layer identification of UHF RFID tags,” in Proc. 16th Annu. Int. Conf. Mobile Comput. Netw., 2010, pp. 353–364.
[43]
J. Han, et al., “Generic and accurate physical-layer identification for UHF RFID tags,” IEEE/ACM Trans. Netw., vol. 24, no. 2, pp. 846–858, Apr. 2016.
[44]
L. Yang, P. Peng, F. Dang, C. Wang, X. Li, and Y. Liu, “Anti-counterfeiting via federated RFID tags’ fingerprints and geometric relationships,” in Proc. IEEE INFOCOM, 2015, pp. 1966–1974.
[45]
C. Zhao, et al., “RF-Mehndi: A fingertip profiled RF identifier,” in Proc. IEEE INFOCOM, 2019, pp. 1513–1521.

Index Terms

  1. A Fingertip Profiled RF Identifier
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image IEEE Transactions on Mobile Computing
      IEEE Transactions on Mobile Computing  Volume 21, Issue 2
      Feb. 2022
      377 pages

      Publisher

      IEEE Educational Activities Department

      United States

      Publication History

      Published: 01 February 2022

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 08 Feb 2025

      Other Metrics

      Citations

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media