Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.

Slides:



Advertisements
Similar presentations
On Physical-Layer Identication of Wireless Devices BORIS DANEV, DAVIDE ZANETTI, and SRDJAN CAPKUN, 2012 Presented by: Vinit Patel Wichita State University.
Advertisements

Grading the Strength of a Body of Evidence on Diagnostic Tests Prepared for: The Agency for Healthcare Research and Quality (AHRQ) Training Modules for.
Design of Experiments Lecture I
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Overview of new technologies Jørgen Bach Andersen, Aalborg University, Denmark Sven Kuhn, Rasmus Krigslund, Troels B. Sørensen.
© Tan,Steinbach, Kumar Introduction to Data Mining 4/18/ Other Classification Techniques 1.Nearest Neighbor Classifiers 2.Support Vector Machines.
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI Institute for Applied Information.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
EPCglobal Class-1 Generation 2 UHF RFID
Regression Analysis Once a linear relationship is defined, the independent variable can be used to forecast the dependent variable. Y ^ = bo + bX bo is.
An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof. Bob Kinicki.
Worst Case Analysis Using Analog Workbench by Andrew G. Bell ITT Industries.
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Leveraging Interleaved Signal Edges for Concurrent Backscatter by Pan Hu, Pengyu.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.
ITEC 451 Network Design and Analysis. 2 You will Learn: (1) Specifying performance requirements Evaluating design alternatives Comparing two or more systems.
EPC Radio Frequency Identify Protocols Class1 Generation-2 UHF RFID 860 MHZ – 960 MHZ EPCglobal.
Multiple Criteria for Evaluating Land Cover Classification Algorithms Summary of a paper by R.S. DeFries and Jonathan Cheung-Wai Chan April, 2000 Remote.
Department of electrical and computer engineering An Equalization Technique for High Rate OFDM Systems Mehdi Basiri.
Predicting the Semantic Orientation of Adjective Vasileios Hatzivassiloglou and Kathleen R. McKeown Presented By Yash Satsangi.
University of Kansas | School of Engineering Department of Electrical Engineering and Computer Science Milagros FigueroaApril Access Methods for.
1 EPCglobal Training Suite. 2 Introduction Tag Protocol - UHF Class 1 Gen 2 Ultra High Frequency (UHF) Generation 2 (Generation 1 is deprecated) Class.
1 Ensembles of Nearest Neighbor Forecasts Dragomir Yankov, Eamonn Keogh Dept. of Computer Science & Eng. University of California Riverside Dennis DeCoste.
Communications - Access Schemes 1 Introduction to Space Systems and Spacecraft Design Space Systems Design.
Distributed and Efficient Classifiers for Wireless Audio-Sensor Networks Baljeet Malhotra Ioanis Nikolaidis Mario A. Nascimento University of Alberta Canada.
Statistical Critical Path Selection for Timing Validation Kai Yang, Kwang-Ting Cheng, and Li-C Wang Department of Electrical and Computer Engineering University.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
Digital to Analog Converters
Worst-Case Timing Jitter and Amplitude Noise in Differential Signaling Wei Yao, Yiyu Shi, Lei He, Sudhakar Pamarti, and Yu Hu Electrical Engineering Dept.,
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Advanced Phasor Measurement Units for the Real-Time Monitoring
AM Recitation 2/10/11.
Lecture 1 Signals in the Time and Frequency Domains
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
By Grégory Brillant Background calibration techniques for multistage pipelined ADCs with digital redundancy.
Da Yan, Zhou Zhao and Wilfred Ng The Hong Kong University of Science and Technology.
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
Novel Sensing Networks for Intelligent Monitoring (Newton) Z Q Lang, H Chen, T Dodd Department of Automatic Control & Systems Engineering University of.
CHAPTER 6 PASS-BAND DATA TRANSMISSION
Mapping and Localization with RFID Technology Matthai Philipose, Kenneth P Fishkin, Dieter Fox, Dirk Hahnel, Wolfram Burgard Presenter: Aniket Shah.
Extracting Barcodes from a Camera-Shaken Image on Camera Phones Graduate Institute of Communication Engineering National Taiwan University Chung-Hua Chu,
Experimental research in noise influence on estimation precision for polyharmonic model frequencies Natalia Visotska.
WINLAB Improving RF-Based Device-Free Passive Localization In Cluttered Indoor Environments Through Probabilistic Classification Methods Rutgers University.
Doc.: IEEE /0553r1 Submission May 2009 Alexander Maltsev, Intel Corp.Slide 1 Path Loss Model Development for TGad Channel Models Date:
Advancing Wireless Link Signatures for Location Distinction Mobicom 2008 Junxing Zhang, Mohammad H. Firooz Neal Patwari, Sneha K. Kasera University of.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
A Biased Fault Attack on the Time Redundancy Countermeasure for AES Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen and Debdeep Mukhopadhyay.
NEWTON - Novel Sensing Network for Intelligent Monitoring 09/07/2013 Dr. Dave Graham Mr. Jeff Neasham Dr. Zhiguo Ding Prof. Gui Yun Tian.
CS434/534: Mobile Computing and Wireless Networks Y. Richard Yang 08/30/2012.
MSc Project Musical Instrument Identification System MIIS Xiang LI ee05m216 Supervisor: Mark Plumbley.
Evaluation of gene-expression clustering via mutual information distance measure Ido Priness, Oded Maimon and Irad Ben-Gal BMC Bioinformatics, 2007.
BackPos: Anchor-free Backscatter Positioning for RFID Tags with High Accuracy Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
L Berkley Davis Copyright 2009 MER301: Engineering Reliability Lecture 8 1 MER301: Engineering Reliability LECTURE 8: Chapter 4: Statistical Inference,
Teng Wei and Xinyu Zhang
Sassan Tabatabaei, Freddy Ben-Zeev and Michael Lee
Sassan Tabatabaei, Freddy Ben-Zeev and Michael Lee
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
ITEC 451 Network Design and Analysis
MICROSECOND TIME KEEPING TO IMPROVE POWER SYSTEM CONTROL & OPERATION
Chapter 10 – Integrating RFID Readers in Enterprise IT
A 100 µW, 16-Channel, Spike-Sorting ASIC with On-the-Fly Clustering
UWB Receiver Algorithm
Chapter 9 - A Comparison of TTF and RTF UHF RFID Protocols
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1

Outline 1)Main idea 2)Experimental setup 3)Collected data 4)Feature extraction and matching 5)Performance results 6)Conclusion 2

1. Main idea Goal: study the feasibility and the accuracy of physical-layer identification and classification of passive UHF RFID tags. Identification: based on accept/reject decisions, the fingerprint of tag is verified against a reference fingerprint (1:1 comparison). Classification: the tag is assigned to one and only one class. 3

The main clue 1)The reader sends the acquisition to the tag with out of specification commands; 2)The tag is challenged and response RN 16 as backscatter data; 3)The reader extracts timing and spectral features from the collected data. 4

5

What is RN16? Answer: 16 bits random number. 6

2. Experimental setup Experiment configuration: Sample: 70 EPC class-1 generation (C1G2) RFID tags Carrier frequency: MHz Baseband: pulse-interval encoding (PIE) Modulation: phase-reversal amplitude shift keying (PR-ASK) Reader ADC sample rate: 1 GS/s Data width: 8 bits. 7

Reader’s hardware 8

The communication process between reader and tags 1)The reader send a “select” command to a particular tag; 2)The reader initiate an inventory round (Query); 3)The tag replies an RN16 with fixed preamble; 4)The reader responses an “ACK”. 9

Operation frequency band: out of specification band Why? The backscatter link frequency (BLF) tolerance and variation during backscatter are higher at an out-of-specification frequency. The manufacturers mainly focus on tag responses within the specified frequency range. 10

TRcal: a parameter to specify the backscatter link frequency 11

Parameter configuration 12

3. Collected data Dataset 1: to evaluate the identification and classification accuracies; Dataset 2: to estimate the stability of proposed techniques considering different configurations of tag position, orientation, and transmission power; Dataset 3,4,5: to analyze the classification accuracy between different tag models and within each model, and also validate the accuracy of the proposed techniques for different TRcal values. 13

4. Feature extraction and matching Time domain feature Time interval error (TIE) is to measure how far each active edge of the clock varies from its ideal position. It is used to measure precise and stable behavior. 14

Time domain feature - TIE TIE is linear, Y = a * x +b So, the calculated coefficient a is, which is defined as a feature for fingerprinting UHF RFID tags. The preamble part of the tag response is used to compute. Because the fixed preamble can help avoid any data-dependent bias in evaluation 15

Time domain feature – Average baseband power 16

Spectral features 1)Separate the RN 16 preamble of each collected sampled signal into single clock cycles 2)Compute the spectral feature of each of those clock cycles 3)Computer the average of the spectral features of all single clock cycles. The fingerprint of spectral feature is the average value. 17

5. Performance results promising worst better best Classification 18

Identification Identification accuracy of the feature of different number of RN16 preambles When the false acceptance rate and false rejection rate are equal, the common value is equal error rate. The spectral feature for different number of RN16 preambles and subspace dimensions 19

Stability 20

The influence of TRcal Conclusion: Although in some case out-of- specification Trcal times lead to a more accurate classification, no generalization can be done on the relationship between classification accuracy and TRcal length. 21

Implementation in cloning detection in RFID-enabled supply chains The requirement: high computational speed and accuracy. The proposed method can reach high accuracy (EER=0%) and computational speed (100 tags/s) using spectral features. Not suitable for pallet-scenario, because it sensitive to tag’s position Suitable for conveyor scenario, because tags are identified at a time and a fixed position. 22

6. Conclusion Using 70 UHF RFID tags under an experiment to prove that these tags can be classified and identified independently of the location and distance to the reader. 23