CSDL Home IEEE Transactions on Dependable and Secure Computing 2011 vol.8 Issue No.06 - November/December
Issue No.06 - November/December (2011 vol.8)
Senthilkumar Chinnappa Gounder Periaswamy , University of Arkansas, Fayetteville
Jia Di , University of Arkansas, Fayetteville
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2010.56
Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and small size that are driving the technology, a tag has limited computational capabilities and resources. These limitations constrain the use of conventional encryption algorithms and security protocols to prevent cloning and counterfeiting of an RFID tag. Therefore, we propose to create an electronic fingerprint of a tag based upon the physical attributes of the tag. We have fingerprinted RFID tags based upon their minimum power responses measured at multiple frequencies. The fingerprint can be used effectively to identify the tags in the future with high probability and to detect counterfeit tags. This mechanism does not increase the cost of the tag and can be applied to any existing tag, because it is independent of the computational capabilities and resources of the RFID tag.
Authentication, pervasive computing, unauthorized access, wireless sensor networks.
Senthilkumar Chinnappa Gounder Periaswamy, Jia Di, "Fingerprinting RFID Tags", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 6, pp. 938-943, November/December 2011, doi:10.1109/TDSC.2010.56