Skip to main content

RF-Ubia: User Biometric Information Authentication Based on RFID

  • Conference paper
  • First Online:
  • 1498 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12938))

Abstract

Traditional authentication technologies usually perform identity authentication based on user information verification (e.g., inputting the password) or biometric information (e.g., fingerprints) for identity authentication. However, there are security risks when these authentication methods are applied solely. For example, if the password is compromised, it is unlikely to determine whether the user is legitimate based on the password. In this paper, we propose RF-Ubia, which combines user information and biometric features to double guarantee the security of identity authentication. The RF-Ubia is a user identification system composed of an array of nine passive tags and a commercial RFID reader, which firstly verifies the user’s password, and then identifies the biometric characteristics of the legitimate user. Due to the coupling effect among tags, any tag signal change caused by the user’s touch operation will affect other tag signals at the same time. Since each user has different fingertip impedance, their touch will cause a unique change of tag signal. Therefore, by combining biometric information, the tag array will uniquely identify users. Evaluations results show that RF-Ubia achieves excellent authentication performance with an average recognition rate of 92.8\({\%}\).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chen, X., Liu, J., Wang, X., Liu, H., Jiang, D., Chen, L.: Eingerprint: robust energy-related fingerprinting for passive RFID tags. In: 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, pp. 1101–1113. USENIX Association (2020)

    Google Scholar 

  2. Chen, Z., Yang, P., Xiong, J., Feng, Y., Li, X.: Tagray: contactless sensing and tracking of mobile objects using COTS RFID devices. In: 39th IEEE Conference on Computer Communications, INFOCOM 2020, pp. 307–316. IEEE (2020)

    Google Scholar 

  3. Ding, H., et al.: Preventing unauthorized access on passive tags. In: 2018 IEEE Conference on Computer Communications, INFOCOM 2018, pp. 1115–1123. IEEE (2018)

    Google Scholar 

  4. Han, J., et al.: CBID: a customer behavior identification system using passive tags. IEEE/ACM Trans. Netw. 24(5), 2885–2898 (2016)

    Article  Google Scholar 

  5. Han, J., et al.: Twins: device-free object tracking using passive tags. IEEE/ACM Trans. Netw. 24(3), 1605–1617 (2016)

    Article  Google Scholar 

  6. Han, J., et al.: Geneprint: generic and accurate physical-layer identification for UHF RFID tags. IEEE/ACM Trans. Netw. 24(2), 846–858 (2016)

    Article  Google Scholar 

  7. Li, T., Luo, W., Mo, Z., Chen, S.: Privacy-preserving RFID authentication based on cryptographical encoding. In: Proceedings of the IEEE INFOCOM 2012, pp. 2174–2182. IEEE (2012)

    Google Scholar 

  8. Liu, X., Yin, J., Liu, Y., Zhang, S., Guo, S., Wang, K.: Vital signs monitoring with RFID: opportunities and challenges. IEEE Netw. 33(4), 126–132 (2019)

    Article  Google Scholar 

  9. Liu, X., Zhang, S., Xiao, B., Bu, K.: Flexible and time-efficient tag scanning with handheld readers. IEEE Trans. Mob. Comput. 15(4), 840–852 (2016)

    Article  Google Scholar 

  10. Lu, L., Han, J., Xiao, R., Liu, Y.: ACTION: breaking the privacy barrier for RFID systems. In: 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2009, pp. 1953–1961. IEEE (2009)

    Google Scholar 

  11. Pradhan, S., Chai, E., Sundaresan, K., Qiu, L., Khojastepour, M.A., Rangarajan, S.: RIO: a pervasive rfid-based touch gesture interface. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom 2017, pp. 261–274. ACM (2017)

    Google Scholar 

  12. Sun, M., Sakai, K., Ku, W., Lai, T., Vasilakos, A.V.: Private and secure tag access for large-scale RFID systems. IEEE Trans. Dependable Secur. Comput. 13(6), 657–671 (2016)

    Article  Google Scholar 

  13. Wang, C., Xie, L., Wang, W., Chen, Y., Bu, Y., Lu, S.: RF-ECG: heart rate variability assessment based on COTS RFID tag array. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(2), 85:1–85:26 (2018)

    Google Scholar 

  14. Wang, C., Xie, L., Zhang, K., Wang, W., Bu, Y., Lu, S.: Spin-antenna: 3D motion tracking for tag array labeled objects via spinning antenna. In: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, pp. 865–873. IEEE (2019)

    Google Scholar 

  15. Wang, G., Cai, H., Qian, C., Han, J., Li, X., Ding, H., Zhao, J.: Towards replay-resilient RFID authentication. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, MobiCom 2018, pp. 385–399. ACM (2018)

    Google Scholar 

  16. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-3_18

    Chapter  Google Scholar 

  17. Xi, Z., Liu, X., Luo, J., Zhang, S., Guo, S.: Fast and reliable dynamic tag estimation in large-scale RFID systems. IEEE Internet Things J. 8(3), 1651–1661 (2021)

    Article  Google Scholar 

  18. Yang, L., Chen, Y., Li, X., Xiao, C., Li, M., Liu, Y.: Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices. In: The 20th Annual International Conference on Mobile Computing and Networking, MobiCom 2014, pp. 237–248. ACM (2014)

    Google Scholar 

  19. Yang, L., Peng, P., Dang, F., Wang, C., Li, X., Liu, Y.: Anti-counterfeiting via federated RFID tags’ fingerprints and geometric relationships. In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, pp. 1966–1974. IEEE (2015)

    Google Scholar 

  20. Yao, Q., Qi, Y., Han, J., Zhao, J., Li, X., Liu, Y.: Randomizing RFID private authentication. In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1–10. IEEE Computer Society (2009)

    Google Scholar 

  21. Zhang, S., Liu, X., Liu, Y., Ding, B., Guo, S., Wang, J.: Accurate respiration monitoring for mobile users with commercial RFID devices. IEEE J. Sel. Areas Commun. 39(2), 513–525 (2021)

    Article  Google Scholar 

  22. Zhao, C., et al.: RF-mehndi: a fingertip profiled RF identifier. In: 2019 IEEE Conference on Computer Communications, INFOCOM 2019, pp. 1513–1521. IEEE (2019)

    Google Scholar 

Download references

Acknowledgement

This work was supported by in part by the National Natural Science Foundation of China (Grant Nos. 61772559, 61602167), the Hunan Provincial Natural Science Foundation of China under grant No. 2020JJ3016. Dr. Xuan Liu’s work is partially supported by the National Defense Science and Technology Innovation Special Zone Project of China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Peng, N., Liu, X., Zhang, S. (2021). RF-Ubia: User Biometric Information Authentication Based on RFID. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12938. Springer, Cham. https://doi.org/10.1007/978-3-030-86130-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86130-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86129-2

  • Online ISBN: 978-3-030-86130-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics