Rhythmic RFID Authentication

dc.contributor.authorLi, Jiawei
dc.contributor.authorWang, Chuyu
dc.contributor.authorLi, Ang
dc.contributor.authorHan, Dianqi
dc.contributor.authorZhang, Yan
dc.contributor.authorZuo, Jinhang
dc.contributor.authorZhang, Rui
dc.contributor.authorXie, Lei
dc.contributor.authorZhang, Yanchao
dc.date.accessioned2022-10-05T15:38:00Z
dc.date.available2022-10-05T15:38:00Z
dc.date.issued2022-09-14
dc.description© 2022 IEEE | ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in IEEE/ACM Transactions on Networking, https://doi.org/10.1109/TNET.2022.3204204.en_US
dc.description.abstractPassive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure and usable two-factor RFID authentication system with strong resilience to lost/stolen/cloned RFID cards. In RF-Rhythm, each legitimate user performs a sequence of taps on his/her RFID card according to a self-chosen secret melody. Such rhythmic taps can induce phase changes in the backscattered signals, which the RFID reader can detect to recover the user’s tapping rhythm. In addition to verifying the RFID card’s identification information as usual, the backend server compares the extracted tapping rhythm with what it acquires in the user enrollment phase. The user passes authentication checks if and only if both verifications succeed. We also propose a novel phase-hopping protocol in which the RFID reader emits Continuous Wave (CW) with random phases for extracting the user’s secret tapping rhythm. Our protocol can prevent a capable adversary from extracting and then replaying a legitimate tapping rhythm from sniffed RFID signals. Comprehensive user experiments confirm the high security and usability of RF-Rhythm with false-positive and false-negative rates close to zero.en_US
dc.description.sponsorshipThis work was supported in part by the U.S. National Science Foundation (CAREER) under Grant CNS-1651954, Grant CNS-1824355, Grant CNS-1933047, Grant CNS-1933069, and Grant CNS-2055751; in part by the National Natural Science Foundation of China under Grant 61902175, Grant 61872174, Grant 61832008, and Grant 61872173; and in part by the Jiangsu Natural Science Foundation under Grant BK20190293.en_US
dc.identifier.citationJ. Li et al., "Rhythmic RFID Authentication," in IEEE/ACM Transactions on Networking, 2022, doi: 10.1109/TNET.2022.3204204.en_US
dc.identifier.issn1558-2566
dc.identifier.urihttps://udspace.udel.edu/handle/19716/31436
dc.language.isoen_USen_US
dc.publisherIEEE/ACM Transactions on Networkingen_US
dc.subjectRFID securityen_US
dc.subjectauthenticationen_US
dc.titleRhythmic RFID Authenticationen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Rhythmic RFID Authentication.pdf
Size:
6.82 MB
Format:
Adobe Portable Document Format
Description:
Main article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.22 KB
Format:
Item-specific license agreed upon to submission
Description: