skip to main content
research-article

Towards Practical Identification of HF RFID Devices

Published:01 July 2012Publication History
Skip Abstract Section

Abstract

The deployment of RFID poses a number of security and privacy threats such as cloning, unauthorized tracking, etc. Although the literature contains many investigations of these issues on the logical level, few works have explored the security implications of the physical communication layer. Recently, related studies have shown the feasibility of identifying RFID-enabled devices based on physical-layer fingerprints. In this work, we leverage on these findings and demonstrate that physical-layer identification of HF RFID devices is also practical, that is, can achieve high accuracy and stability. We propose an improved hardware setup and enhanced techniques for fingerprint extraction and matching. Our new system enables device identification with an Equal Error Rate as low as 0.005 (0.5%) on a set 50 HF RFID smart cards of the same manufacturer and type. We further investigate the fingerprint stability over an extended period of time and across different acquisition setups. In the latter case, we propose a solution based on channel equalization that preserves the fingerprint quality across setups. Our results strengthen the practical use of physical-layer identification of RFID devices in product and document anti-counterfeiting solutions.

References

  1. Abdel-Hamid, A. T., Tahar, S., and Aboulhamid, E. M. 2003. IP watermarking techniques: Survey and comparison. In Proceedings of the IEEE International Workshop on System-on-Chip for Real-Time Applications.Google ScholarGoogle Scholar
  2. Agilent. 2007a. Agilent InfiniiVision 6104A. Agilent. http://www.home.agilent.com/.Google ScholarGoogle Scholar
  3. Agilent. 2007b. Function/Arbitrary Waveform Generator 33250A. Agilent. http://www.home.agilent.com/agilent.Google ScholarGoogle Scholar
  4. Bishop, C. 2006. Pattern Recognition and Machine Learning. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Boggan, S. 2006. Cracked it! http://www.guardian.co.uk/technology/2006/nov/17/news.homeaffairs/. (Last accessed 11/10.).Google ScholarGoogle Scholar
  6. Bolle, R., Connell, J., Pankanti, S., Ratha, N., and Senior, A. 2003. Guide to Biometrics. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bowser, R. A., Stager, P. J., Thomson, A., and Douglas, B. L. 2008. Wireless transmitter identity validation in a wireless network. US Patent 11691041.Google ScholarGoogle Scholar
  8. Brik, V., Banerjee, S., Gruteser, M., and Oh, S. 2008. Wireless device identification with radiometric signatures. In Proceedings of the ACM International Conference on Mobile Computing and Networking. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Candore, A., Kocabas, O., and Koushanfar, F. 2009. Robust stable radiometric fingerprinting for wireless devices. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 43--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Damarla, C., Ivers, J., Pollard, M., Kompanek, A. J., and Trammell, B. H. 2008. Method for RF fingerprinting. US Patent 7346359.Google ScholarGoogle Scholar
  11. Danev, B. and Capkun, S. 2009. Transient-based identification of wireless sensor nodes. In Proceedings of the ACM/IEEE Conference on Information Processing in Sensor Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Danev, B., Heydt-Benjamin, T. S., and Capkun, S. 2009. Physical-layer identification of RFID devices. In Proceedings of the USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Danev, B., Luecken, H., Capkun, S., and Defrawy, K. 2010. Attacks on physical-layer identification. In Proceedings of the 3th ACM Conference on Wireless Network Security (WiSec’10). ACM, 89--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dejean, G. and Kirovski, D. 2007. RF-DNA: Radio-frequency certificates of authenticity. In Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems (CHES). 346--363. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., and Khandelwal, V. 2008. Design and implementation of PUF-based “unclonable” RFID ICs for anti-counterfeiting and security applications. In Proceedings of the IEEE International Conference on RFID. 58--64.Google ScholarGoogle Scholar
  16. Edman, M. and Yener, B. August 2009. Active attacks against modulation-based radiometric identification. Tech. rep. 09-02, Rensselaer Institute of Technology.Google ScholarGoogle Scholar
  17. EIP Microwave. 1999. EIP 578 frequency counter. http://www.phasematrix.com/Spec_Sheets/57XB_10-99.pdf.Google ScholarGoogle Scholar
  18. Ellis, K. and Serinken, N. 2001. Characteristics of radio transmitter fingerprints. Radio Sci. 36, 585--597.Google ScholarGoogle ScholarCross RefCross Ref
  19. EPCglobal. 2009. The EPCglobal architecture framework v. 1.3. EPCglobal.Google ScholarGoogle Scholar
  20. Ettus. 2009. Universal software radio peripheral (USRP). Ettus. http://www.ettus.com/.Google ScholarGoogle Scholar
  21. Ferrell, P. 1991. Method and apparatus for characterizing a radio transmitter. US Patent 5005210.Google ScholarGoogle Scholar
  22. FVC. 2006. Fingeprint verification competitions (FVC). http://bias.csr.uni-bo.it/fvc2006/.Google ScholarGoogle Scholar
  23. Gassend, B., Lim, D., Clarke, D., Devadas, S., and van Dijk, M. 2004. Identification and authentication of integrated circuits. Concurr. Comput.: Prac. Exper. 16, 11, 1077--1098. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Gildas, A. 2010. RFID security and privacy lounge. http://www.avoine.net/rfid/index.html.Google ScholarGoogle Scholar
  25. Grunwald, L. 2006. New attack to RFID-systems and their middleware and backends. In Black Hat Briefings.Google ScholarGoogle Scholar
  26. Hall, J., Barbeau, M., and Kranakis, E. 2004. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In Proceedings of the Communications, Internet, and Information Technology.Google ScholarGoogle Scholar
  27. Hall, J., Barbeau, M., and Kranakis, E. 2006. Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting. In Proceedings of the IASTED International Conference on Communications and Computer Networks.Google ScholarGoogle Scholar
  28. Hippenstiel, R. and Payal, Y. 1996. Wavelet based transmitter identification. In Proceedings of the International Symposium on Signal Processing and Its Applications (ISSPA).Google ScholarGoogle Scholar
  29. IBM. 2002. JCOP - The IBM GlobalPlatform JavaCard implementation. IBM. ftp://ftp.software.ibm.com/software/pervasive/info/JCOP_Family.pdf.Google ScholarGoogle Scholar
  30. ICAO. 2006. Machine readable travel documents (ICAO Document 9303). http://www.icao.int/.Google ScholarGoogle Scholar
  31. Jana, S. and Kasera, S. K. 2008. On fast and accurate detection of unauthorized wireless access points using clock skews. In Proceedings of the ACM International Conference on Mobile Computing and Networking. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Juels, A. 2006. RFID security and privacy: A research survey. IEEE J. Select. Areas Comm. 24, 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Kaplan, D. and Stanhope, D. 1999. Waveform collection for use in wireless telephone identification. US Patent 5999806.Google ScholarGoogle Scholar
  34. Lakafosis, V., Traille, A., Lee, H., Gebara, E., Tentzeris, M., DeJean, G., and Kirovski, D. 2011. RF fingerprinting physical objects for anticounterfeiting applications. IEEE Trans. Micro. Theory Tech. 59, 2, 504--514.Google ScholarGoogle ScholarCross RefCross Ref
  35. Lakafosis, V., Traille, A., Lee, H., Orecchini, G., Gebara, E., Tentzeris, M., DeJean, G., and Kirovski, D. 2010. An RFID system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. In Proceedings of the IEEE MTT-S Int. Microw. Symp. Dig. 840--843.Google ScholarGoogle Scholar
  36. Laurie, A. 2006. Expert cracks biometric passport data. http://www.computerweekly.com/Articles/2006/11/21/219995/Expert-cracks-biometric-passport-data.htm.Google ScholarGoogle Scholar
  37. Margerum, D. 1969. Pinpointing Location of Hostile Radars. Microwaves.Google ScholarGoogle Scholar
  38. MasterCard. 2009. MasterCard PayPass M/Chip application note. http://www.paypass.com/documentation.html.Google ScholarGoogle Scholar
  39. Pascual Iserte, A. 2005. Channel state information and joint transmitter-receiver design in multi-antenna systems. Ph.D. thesis, Polytechnic University of Catalonia.Google ScholarGoogle Scholar
  40. Periaswamy, S. C. G., Thompson, D., and Di, J. 2008. Ownership transfer of RFID tags based on electronic fingerprint. In Proceedings of the International Conference on Security and Management.Google ScholarGoogle Scholar
  41. Periaswamy, S. C. G., Thompson, D., and Di, J. 2010a. Fingerprinting RFID tags. IEEE Trans. Depend. Secure Comput.Google ScholarGoogle Scholar
  42. Periaswamy, S. C. G., Thompson, D. R., and Romero, H. P. 2010b. Fingerprinting radio frequency identification tags using timing characteristics. In Proceedings of the Workshop on RFID Security (RFIDSec, Asia).Google ScholarGoogle Scholar
  43. Quartzlock. 2010. GPS timing and frequency standards. Quartzlock. http://www.quartzlock.com/downloads/datasheets/E8-Y_4pp.pdf.Google ScholarGoogle Scholar
  44. Rasmussen, K. and Capkun, S. 2007. Implications of radio fingerprinting on the security of sensor networks. In Proceedings of the International ICST Conference on Security and Privacy in Communication Networks.Google ScholarGoogle Scholar
  45. Reising, D. R., Temple, M. A., and Mendenhall, M. J. 2010a. Improved wireless security for GMSK-based devices using RF fingerprinting. Int. J. Electron. Secur. Digit. Forensic 3, 41--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Reising, D. R., Temple, M. A., and Mendenhall, M. J. 2010b. Improving intra-cellular security using air monitoring with RF fingerprints. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC).Google ScholarGoogle Scholar
  47. Rhrmair, U., Sehnke, F., Slter, J., Dror, G., Devadas, S., and Schmidhuber, J. 2010. Modeling attacks on physical unclonable functions. In Proceedings of the ACM Computer and Communications Security Conference (CCS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Romero, H. P., Remley, K. A., Williams, D. F., and Wang, C.-M. 2009. Electromagnetic measurements for counterfeit detection of radio frequency identification cards. IEEE Trans. Microw. Theory Tech. 57, 5, 1383--1387.Google ScholarGoogle ScholarCross RefCross Ref
  49. Romero, H. P., Remley, K. A., Williams, D. F., Wang, C.-M., and Brown, T. X. 2010. Identifying RF identification cards from measurements of resonance and carrier harmonics. IEEE Trans. Micro. Theory Techniques 58, 7.Google ScholarGoogle ScholarCross RefCross Ref
  50. Schaefer, J. and Strimmer, K. 2005. A shrinkage approach to large-scale covariance matrix estimation and implications for functional genomics. Statist. Appli. Genet. Molec. Biol. 4, 32.Google ScholarGoogle Scholar
  51. Schäfer, J., Opgen-Rhein, R., and Strimmer, K. 2010. Efficient estimation of covariance and (partial) correlation. The Comprehensive R Archive Network. http://strimmerlab.org/software/corpcor/.Google ScholarGoogle Scholar
  52. Shaw, D. and Kinsner, W. 1997. Multifractal modeling of radio transmitter transients for classification. In Proceedings of the IEEE Conference on Communications, Power and Computing.Google ScholarGoogle Scholar
  53. Shlens, J. 2005. A Tutorial on Principal Component Analysis. mplab.ucsd.edu/tutorials/pca.pdf.Google ScholarGoogle Scholar
  54. Sklar, B. 2001. Digital Communications: Fundamentals and Applications. Prentice-Hall, Inc., Upper Saddle River, NJ.Google ScholarGoogle Scholar
  55. Toonstra, J. and Kinsner, W. 1995. Transient analysis and genetic algorithms for classification. In Proceedings of the IEEE Conference on Communications, Power, and Computing (WESCANEX).Google ScholarGoogle Scholar
  56. Tuyls, P. and Batina, L. 2006. RFID-tags for anti-counterfeiting. In Topics in Cryptology-CT-RSA 2006, Lecture Notes in Computer Science, vol. 3860, 115--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Ureten, O. and Serinken, N. 1999. Detection of radio transmitter turn-on transients. Electron. Lett. 35. 1996--1997.Google ScholarGoogle Scholar
  58. Ureten, O. and Serinken, N. 2007. Wireless security through RF fingerprinting. Canad. J. Elect. Comput. Eng. 32, 1.Google ScholarGoogle ScholarCross RefCross Ref
  59. van Beek, J. 2008. ePassports reloaded. In Black Hat Briefings.Google ScholarGoogle Scholar
  60. Williams, A. B. and Taylors, F. J. 1988. Electronic Filter Design Handbook. McGraw-Hill.Google ScholarGoogle Scholar
  61. Witteman, M. 2005. Attacks on digital passports. In What The Hack.Google ScholarGoogle Scholar
  62. Zanetti, D., Danev, B., and Capkun, S. 2010. Physical-layer identification of UHF RFID tags. In Proceedings of the 16th ACM Conference on Mobile Computing and Networking (MOBICOM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Zeng, K., Govindan, K., and Mohapatra, P. 2010. Non-cryptographic authentication and identification in wireless networks {security and privacy in emerging wireless networks}. IEEE Comm. 17, 5, 56--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Zetter, K. 2006. Hackers clone e-passports. http://www.wired.com/science/discoveries/news/2006/08/71521. (Last accessed 11/10.)Google ScholarGoogle Scholar

Index Terms

  1. Towards Practical Identification of HF RFID Devices

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Information and System Security
      ACM Transactions on Information and System Security  Volume 15, Issue 2
      July 2012
      138 pages
      ISSN:1094-9224
      EISSN:1557-7406
      DOI:10.1145/2240276
      Issue’s Table of Contents

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 July 2012
      • Accepted: 1 October 2011
      • Revised: 1 August 2011
      • Received: 1 November 2010
      Published in tissec Volume 15, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader