2 Transportation Card Access Card - - PowerPoint PPT Presentation

2
SMART_READER_LITE
LIVE PREVIEW

2 Transportation Card Access Card - - PowerPoint PPT Presentation

2 Transportation Card Access Card Credit Card Any potential security risk with these cards? Any potential security risk with these cards? 3 Thievery Loss Why cant these


slide-1
SLIDE 1
slide-2
SLIDE 2

2

slide-3
SLIDE 3

Transportation Card Access Card Credit Card

3

Any potential security risk with these cards? Any potential security risk with these cards?

slide-4
SLIDE 4

Thievery Loss

4

Why can’t these cards resist loss and thievery? Why can’t these cards resist loss and thievery?

slide-5
SLIDE 5

Who are you?

5

Sth you have?

slide-6
SLIDE 6

Device Authentication User(Biometric) Authentication

6

slide-7
SLIDE 7
  • Not convenient
  • Not easy to customize
  • Not light-weight
  • Not fast to implement
  • Not low cost

Issues with these approaches:

7

slide-8
SLIDE 8

User-dependent & Unique User-dependent & Unique

slide-9
SLIDE 9

Our goal

9

Device Authentication Device Authentication User Authentication User Authentication Replay Impersonation Counterfeiting Universal Light-weight Low-cost

slide-10
SLIDE 10

10

Radiative & Inductive coupling

slide-11
SLIDE 11

Observation 1

11

  • -- Impact of tag coupling
  • Tags in a vicinity  Their circuit characteristics change.
slide-12
SLIDE 12

Observation 1

12

  • -- Impact of tag coupling
  • What will happen if we collect their phases together?
slide-13
SLIDE 13

Why does the phase change due to coupling?

13

slide-14
SLIDE 14

Observation 2

14

Impact of human impedance

slide-15
SLIDE 15

Why does phase change with fingertip touch?

15

slide-16
SLIDE 16

16

Phase Difference of Tags (PDoT) User-dependent & Unique Phase Fingerprint

slide-17
SLIDE 17

Challenge 1

The impact of touching is unstable.

17

slide-18
SLIDE 18

Tackle with challenge 1

Introduce a conductor

18

Complexity of coupling & Size of array Complexity of coupling & Size of array

slide-19
SLIDE 19

Challenge 2

Phases change with distance.

19

slide-20
SLIDE 20

Tackle with challenge 2

Phase shifting algorithm

20

slide-21
SLIDE 21

Max PDoT

Max PDoT Max PDoT

Get phase fingerprint at this status

21

Tackle with challenge 2

Phase shifting algorithm

slide-22
SLIDE 22

22

Tackle with challenge 2

Phase shifting algorithm

slide-23
SLIDE 23

Challenge 3

Impact of accessories

23

r=ring w=watch n=necklace

slide-24
SLIDE 24

24

  • 1. Impinj R420 reader
  • 2. Larid antenna A9028
  • 3. Alien-9629 tag
slide-25
SLIDE 25

Overall accuracy vs. Human diversity

25

  • 7 females + 8 males
  • 15 representative tag array layouts

Accuracy > 99%

slide-26
SLIDE 26

Resisting impersonation attack

26

  • 10 attackers try to use an authorized user’s

credential to access the system. FAR < 0.05 Maximum FRR < 0.1

slide-27
SLIDE 27

Resisting counterfeiting attack

27

  • Attacker produces a counterfeited array with the same tag

model and layout.

  • 90 Alien-9629 tags
  • 10 arrays

FRR < 0.005 Average FAR < 0.01

Tags’ hardware differences will reflect in phases.

slide-28
SLIDE 28

Resisting replay attack

28

  • Effective read range < 30cm
  • Tolerable space angle of tag rotation < 10°

(w.r.t. x-y-z axis)

slide-29
SLIDE 29

Accuracy vs. distance

29

Effective authentication range 15cm ±4cm region > 90% accuracy

slide-30
SLIDE 30

Accuracy vs. rotation and accessories

30

Tolerable space angle < 10°

slide-31
SLIDE 31
  • Converting an array of tags attached on a card into

an effective authentication credential.

  • Light-weight, low-cost, universal solution for a

fingertip profiled RF identifier, authenticating both the card and its holder’s identity simultaneously.

  • Demonstrated a working system implemented

purely based on COTS RFID devices.

31

slide-32
SLIDE 32