Abstract
Traditional authentication technologies usually perform identity authentication based on user information verification (e.g., inputting the password) or biometric information (e.g., fingerprints) for identity authentication. However, there are security risks when these authentication methods are applied solely. For example, if the password is compromised, it is unlikely to determine whether the user is legitimate based on the password. In this paper, we propose RF-Ubia, which combines user information and biometric features to double guarantee the security of identity authentication. The RF-Ubia is a user identification system composed of an array of nine passive tags and a commercial RFID reader, which firstly verifies the user’s password, and then identifies the biometric characteristics of the legitimate user. Due to the coupling effect among tags, any tag signal change caused by the user’s touch operation will affect other tag signals at the same time. Since each user has different fingertip impedance, their touch will cause a unique change of tag signal. Therefore, by combining biometric information, the tag array will uniquely identify users. Evaluations results show that RF-Ubia achieves excellent authentication performance with an average recognition rate of 92.8\({\%}\).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chen, X., Liu, J., Wang, X., Liu, H., Jiang, D., Chen, L.: Eingerprint: robust energy-related fingerprinting for passive RFID tags. In: 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, pp. 1101–1113. USENIX Association (2020)
Chen, Z., Yang, P., Xiong, J., Feng, Y., Li, X.: Tagray: contactless sensing and tracking of mobile objects using COTS RFID devices. In: 39th IEEE Conference on Computer Communications, INFOCOM 2020, pp. 307–316. IEEE (2020)
Ding, H., et al.: Preventing unauthorized access on passive tags. In: 2018 IEEE Conference on Computer Communications, INFOCOM 2018, pp. 1115–1123. IEEE (2018)
Han, J., et al.: CBID: a customer behavior identification system using passive tags. IEEE/ACM Trans. Netw. 24(5), 2885–2898 (2016)
Han, J., et al.: Twins: device-free object tracking using passive tags. IEEE/ACM Trans. Netw. 24(3), 1605–1617 (2016)
Han, J., et al.: Geneprint: generic and accurate physical-layer identification for UHF RFID tags. IEEE/ACM Trans. Netw. 24(2), 846–858 (2016)
Li, T., Luo, W., Mo, Z., Chen, S.: Privacy-preserving RFID authentication based on cryptographical encoding. In: Proceedings of the IEEE INFOCOM 2012, pp. 2174–2182. IEEE (2012)
Liu, X., Yin, J., Liu, Y., Zhang, S., Guo, S., Wang, K.: Vital signs monitoring with RFID: opportunities and challenges. IEEE Netw. 33(4), 126–132 (2019)
Liu, X., Zhang, S., Xiao, B., Bu, K.: Flexible and time-efficient tag scanning with handheld readers. IEEE Trans. Mob. Comput. 15(4), 840–852 (2016)
Lu, L., Han, J., Xiao, R., Liu, Y.: ACTION: breaking the privacy barrier for RFID systems. In: 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2009, pp. 1953–1961. IEEE (2009)
Pradhan, S., Chai, E., Sundaresan, K., Qiu, L., Khojastepour, M.A., Rangarajan, S.: RIO: a pervasive rfid-based touch gesture interface. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom 2017, pp. 261–274. ACM (2017)
Sun, M., Sakai, K., Ku, W., Lai, T., Vasilakos, A.V.: Private and secure tag access for large-scale RFID systems. IEEE Trans. Dependable Secur. Comput. 13(6), 657–671 (2016)
Wang, C., Xie, L., Wang, W., Chen, Y., Bu, Y., Lu, S.: RF-ECG: heart rate variability assessment based on COTS RFID tag array. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(2), 85:1–85:26 (2018)
Wang, C., Xie, L., Zhang, K., Wang, W., Bu, Y., Lu, S.: Spin-antenna: 3D motion tracking for tag array labeled objects via spinning antenna. In: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, pp. 865–873. IEEE (2019)
Wang, G., Cai, H., Qian, C., Han, J., Li, X., Ding, H., Zhao, J.: Towards replay-resilient RFID authentication. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, MobiCom 2018, pp. 385–399. ACM (2018)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-3_18
Xi, Z., Liu, X., Luo, J., Zhang, S., Guo, S.: Fast and reliable dynamic tag estimation in large-scale RFID systems. IEEE Internet Things J. 8(3), 1651–1661 (2021)
Yang, L., Chen, Y., Li, X., Xiao, C., Li, M., Liu, Y.: Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices. In: The 20th Annual International Conference on Mobile Computing and Networking, MobiCom 2014, pp. 237–248. ACM (2014)
Yang, L., Peng, P., Dang, F., Wang, C., Li, X., Liu, Y.: Anti-counterfeiting via federated RFID tags’ fingerprints and geometric relationships. In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, pp. 1966–1974. IEEE (2015)
Yao, Q., Qi, Y., Han, J., Zhao, J., Li, X., Liu, Y.: Randomizing RFID private authentication. In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1–10. IEEE Computer Society (2009)
Zhang, S., Liu, X., Liu, Y., Ding, B., Guo, S., Wang, J.: Accurate respiration monitoring for mobile users with commercial RFID devices. IEEE J. Sel. Areas Commun. 39(2), 513–525 (2021)
Zhao, C., et al.: RF-mehndi: a fingertip profiled RF identifier. In: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, pp. 1513–1521. IEEE (2019)
Acknowledgement
This work was supported by in part by the National Natural Science Foundation of China (Grant Nos. 61772559, 61602167), the Hunan Provincial Natural Science Foundation of China under grant No. 2020JJ3016. Dr. Xuan Liu’s work is partially supported by the National Defense Science and Technology Innovation Special Zone Project of China.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Peng, N., Liu, X., Zhang, S. (2021). RF-Ubia: User Biometric Information Authentication Based on RFID. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-86130-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86129-2
Online ISBN: 978-3-030-86130-8
eBook Packages: Computer ScienceComputer Science (R0)