Rhythmic RFID Authentication

Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

Passive RFID technology is widely used in user authentication and access control. We propose RF-Rhythm, a secure and usable two-factor RFID authentication system with strong resilience to lost/stolen/cloned RFID cards. In RF-Rhythm, each legitimate user performs a sequence of taps on his/her RFID card according to a self-chosen secret melody. Such rhythmic taps can induce phase changes in the backscattered signals, which the RFID reader can detect to recover the user's tapping rhythm. In addition to verifying the RFID card's identification information as usual, the backend server compares the extracted tapping rhythm with what it acquires in the user enrollment phase. The user passes authentication checks if and only if both verifications succeed. We also propose a novel phase-hopping protocol in which the RFID reader emits Continuous Wave (CW) with random phases for extracting the user's secret tapping rhythm. Our protocol can prevent a capable adversary from extracting and then replaying a legitimate tapping rhythm from sniffed RFID signals. Comprehensive user experiments confirm the high security and usability of RF-Rhythm with false-positive and false-negative rates close to zero.

Original languageEnglish (US)
Pages (from-to)877-890
Number of pages14
JournalIEEE/ACM Transactions on Networking
Volume31
Issue number2
DOIs
StatePublished - Apr 1 2023

Keywords

  • RFID security
  • authentication

ASJC Scopus subject areas

  • Software
  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Rhythmic RFID Authentication'. Together they form a unique fingerprint.

Cite this