The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Guide to Biometrics
Identification of the Defective Transmission Devices Using the Wavelet Transform
IEEE Transactions on Pattern Analysis and Machine Intelligence
Remote Physical Device Fingerprinting
IEEE Transactions on Dependable and Secure Computing
Disabling RFID tags with visible confirmation: clipped tags are silenced
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Pattern Recognition and Machine Learning (Information Science and Statistics)
Pattern Recognition and Machine Learning (Information Science and Statistics)
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
On fast and accurate detection of unauthorized wireless access points using clock skews
Proceedings of the 14th ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
The RF in RFID: Passive UHF RFID in Practice
The RF in RFID: Passive UHF RFID in Practice
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
An efficient forward private RFID protocol
Proceedings of the 16th ACM conference on Computer and communications security
Low-cost untraceable authentication protocols for RFID
Proceedings of the third ACM conference on Wireless network security
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Using differential evolution to optimize 'learning from signals' and enhance network security
Proceedings of the 13th annual conference on Genetic and evolutionary computation
On the practicality of UHF RFID fingerprinting: how real is the RFID tracking problem?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Towards Practical Identification of HF RFID Devices
ACM Transactions on Information and System Security (TISSEC)
BLINK: a high throughput link layer for backscatter communication
Proceedings of the 10th international conference on Mobile systems, applications, and services
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Journal of Computer and System Sciences
Enabling bit-by-bit backscatter communication in severe energy harvesting environments
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time domain and spectral features of the collected signals. We show that, based on timing features of the signals, UHF RFID tags can be classified, independently of the location and distance to the reader (evaluated up to 6 meters), with an accuracy of approx. 71% (within our population). Additionally, we show that is possible to uniquely identify a maximum of approx. 26 UHF RFID tags independently of the population size. We analyze the implications of these results on tag holder privacy. We further show that, in controlled environments, UHF RFID tags can be uniquely identified based on their signal spectral features with an Equal Error Rate of 0% (within our population); we discuss the application of those techniques to cloning detection in RFID-enabled supply chains.