On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?

  • Davide Zanetti
  • Pascal Sachs
  • Srdjan Capkun
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6794)

Abstract

In this work, we demonstrate the practicality of people tracking by means of physical-layer fingerprints of RFID tags that they carry. We build a portable low-cost USRP-based RFID fingerprinter and we show, over a set of 210 EPC C1G2 tags, that this fingerprinter enables reliable identification of individual tags from varying distances and across different tag placements (wallet, shopping bag, etc.). We further investigate the use of this setup for clandestine people tracking in an example Shopping Mall scenario and show that in this scenario the mobility traces of people can be reconstructed with a high accuracy.

Keywords

RFID physical-layer identification fingerprinting tracking privacy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Berbain, C., Billet, O., Etrog, J., Gilbert, H.: An efficient forward private RFID protocol. In: Proc. ACM Conference on Computer and Communications Security, pp. 43–53 (2009)Google Scholar
  5. 5.
    Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proc. ACM International Conference on Mobile Computing and Networking (2008)Google Scholar
  6. 6.
    Danev, B., Heydt-Benjamin, T.S., Čapkun, S.: Physical-layer identification of RFID devices. In: Proc. USENIX Security Symposium (2009)Google Scholar
  7. 7.
    Danev, B., Čapkun, S.: Transient-based identification of wireless sensor nodes. In: Proc. ACM/IEEE Conference on Information Processing in Sensor Networks (2009)Google Scholar
  8. 8.
    Dimitriou, T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proc. International ICST Conference on Security and Privacy in Communication Networks (2005)Google Scholar
  9. 9.
    Duc, D.N., Park, J., Lee, H., Kim, K.: Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. In: Proc. Symposium on Cryptography and Information Security (2006)Google Scholar
  10. 10.
    Ellis, K., Serinken, N.: Characteristics of radio transmitter fingerprints. Radio Science 36, 585–597 (2001)CrossRefGoogle Scholar
  11. 11.
    EPCglobal: UHF Class 1 Gen 2 Standard v. 1.2.0. Standard (2008)Google Scholar
  12. 12.
    ETSI: ETSI EN 302 208-1 (2006)Google Scholar
  13. 13.
    Guiasu, S., Shenitzer, A.: The principle of maximum entropy. The Mathematical Intelligencer 7, 42–48 (1985)MathSciNetMATHCrossRefGoogle Scholar
  14. 14.
    Hall, J., Barbeau, M., Kranakis, E.: Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In: Proc. Communications, Internet, and Information Technology (2004)Google Scholar
  15. 15.
    Hall, J., Barbeau, M., Kranakis, E.: Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting. In: Proc. IASTED International Conference on Communications and Computer Networks (2006)Google Scholar
  16. 16.
    Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. In: Proc. ACM International Conference on Mobile Computing and Networking (2008)Google Scholar
  17. 17.
    Juels, A.: RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24(2) (2006)Google Scholar
  18. 18.
    Karjoth, G., Moskowitz, P.A.: Disabling RFID tags with visible confirmation: clipped tags are silenced. In: Proc. ACM Workshop on Privacy in the Electronic Society (2005)Google Scholar
  19. 19.
    Koscher, K., Juels, A., Kohno, T., Brajkovic, V.: EPC RFID tag security weaknesses and defenses: Passport cards, enhanced drivers licenses, and beyond. In: Proc. ACM Conference on Computer and Communications Security (2009)Google Scholar
  20. 20.
    Lee, Y.K., Batina, L., Singelée, D., Verbauwhede, I.: Low-cost untraceable authentication protocols for RFID. In: Proc. ACM Conference on Wireless Network Security (2010)Google Scholar
  21. 21.
    Periaswamy, S.C.G., Thompson, D.R., Di, J.: Ownership transfer of RFID tags based on electronic fingerprint. In: Proc. International Conference on Security and Management (2008)Google Scholar
  22. 22.
    Periaswamy, S.C.G., Thompson, D.R., Di, J.: Fingerprinting RFID tags. IEEE Transactions on Dependable and Secure Computing PrePrints (99) (2010)Google Scholar
  23. 23.
    Periaswamy, S.C.G., Thompson, D.R., Romero, H.P., Di, J.: Fingerprinting radio frequency identification tags using timing characteristics. In: Proc. Workshop on RFID Security - RFIDsec Asia (2010)Google Scholar
  24. 24.
    Rasmussen, K., Čapkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Proc. International ICST Conference on Security and Privacy in Communication Networks (2007)Google Scholar
  25. 25.
    Reising, D.R., Temple, M.A., Mendenhall, M.J.: Improved wireless security for GMSK-based devices using RF fingerprinting. International Journal of Electronic Security and Digital Forensics 3, 41–59 (2010)CrossRefGoogle Scholar
  26. 26.
    Reising, D.R., Temple, M.A., Mendenhall, M.J.: Improving intra-cellular security using air monitoring with RF fingerprints. In: Proc. IEEE Wireless Communications and Networking Conference (2010)Google Scholar
  27. 27.
    Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.M.: Electromagnetic measurements for counterfeit detection of radio frequency identification cards. IEEE Transactions on Microwave Theory and Techniques 57(5), 1383–1387 (2009)CrossRefGoogle Scholar
  28. 28.
    Romero, H.P., Remley, K.A., Williams, D.F., Wang, C.M., Brown, T.X.: Identifying RF identification cards from measurements of resonance and carrier harmonics. IEEE Transactions on Microwave Theory and Techniques 58(7), 1758–1765 (2010)CrossRefGoogle Scholar
  29. 29.
    Shannon, C.: A mathematical theory of communication. The Bell System Technical Journal 27, 379–423 (1948)MathSciNetMATHGoogle Scholar
  30. 30.
    Shaw, D., Kinsner, W.: Multifractal modeling of radio transmitter transients for classification. In: Proc. IEEE Conference on Communications, Power and Computing (1997)Google Scholar
  31. 31.
    Spiekermann, S., Evdokimov, S.: Privacy enhancing technologies for RFID - A critical investigation of state of the art research. In: Proc. IEEE Privacy and Security (2009)Google Scholar
  32. 32.
    Ureten, O., Serinken, N.: Detection of radio transmitter turn-on transients. Electronic Letters 35, 1996–1997 (2007)CrossRefGoogle Scholar
  33. 33.
    Ureten, O., Serinken, N.: Wireless security through RF fingerprinting. Canadian Journal of Electrical and Computer Engineering 32(1) (Winder 2007)Google Scholar
  34. 34.
    Zanetti, D., Danev, B., Čapkun, S.: Physical-layer identification of UHF RFID tags. In: Proc. ACM Conference on Mobile Computing and Networking (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Davide Zanetti
    • 1
  • Pascal Sachs
    • 1
  • Srdjan Capkun
    • 1
  1. 1.Department of Computer ScienceETHZZurichSwitzerland

Personalised recommendations