Butterfly: Environment-Independent Physical- Layer Authentication - - PowerPoint PPT Presentation

butterfly environment independent physical layer
SMART_READER_LITE
LIVE PREVIEW

Butterfly: Environment-Independent Physical- Layer Authentication - - PowerPoint PPT Presentation

Butterfly: Environment-Independent Physical- Layer Authentication for Passive RFID Jinsong Han* , Chen Qian^, Yuqin Yang , Ge Wang ^, Han Ding , Xin Li^, Kui Ren* # # * Institute of Cyberspace Research, College of Computer


slide-1
SLIDE 1

Butterfly: Environment-Independent Physical- Layer Authentication for Passive RFID

Jinsong Han* , Chen Qian^, Yuqin Yang , Ge Wang ^, Han Ding , Xin Li^, Kui Ren*

* Institute of Cyberspace Research, College of Computer Science and Technology, Zhejiang University # Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies, China ^ University of California Santa Cruz, USA † The School of Electronic and Information Engineering, Xi’an Jiaotong University, China

† † † # #

slide-2
SLIDE 2

RFID Authentication is a crucial task for many applications!

u

Tag Seal

u

Entrance check

u

Logistic and warehousing

slide-3
SLIDE 3

Prior authentication methods

Tag mobility? E1G2 Protocol Cryptology method Physical-layer Physical-layer Butterfly Don’t need Modification? Tag counterfeiting? Physical-layer Cryptology method E1G2 Protocol E1G2 Protocol Cryptology method Butterfly Butterfly

slide-4
SLIDE 4

Outline

u Basic Idea u System Design u Experiments and Evaluation u Conclusion

slide-5
SLIDE 5

Problem Statement

Some practical factors introduce unpredictable errors in physical-layer signals:

§ Position of the tag § Surrounding environments § Different authentication devices

slide-6
SLIDE 6

Basic Idea

Our solution: employ two adjacent tags as an unit.

!"

# = %" # + '" #+()

"

# + (*

"

#+ (+

"

#

!"

, = %" , + '" ,+()

"

, + (*

"

,+ (+

"

,

Device Noise Environment Noise Gaussian Noise Feature Constant vector

! = %" + '" + () + (* + (+

Received signal:

Tag 1 Tag 2 !"#- !", ≈ %"# − %", + ('"# − '",)

slide-7
SLIDE 7

Basic Idea

Performance of noise elimination:

§ Our method can effectively eliminate the environment and device noises!

u

Signals in different environments

u

Signals of different devices

u

Signals after elimination

slide-8
SLIDE 8

Outline

u Basic Idea u System Design u Experiments and Evaluation u Conclusion

slide-9
SLIDE 9

System Design

FFT

Normalization

Noise Elimination Categorization

Cut EPC

Signal Preprocessing

slide-10
SLIDE 10

System Design: Signal collection

System deployment: § USRP N210-based Monitor § ImpinJ R220 Reader § Two tags

u

System deployment

slide-11
SLIDE 11

System Design: Signal preprocessing

Signal preprocessing: § Cut EPC segment § Tag categorization § Noise elimination

Query ACK

RN16 EPC

QueryRep

u

Signals received by the Monitor

slide-12
SLIDE 12

Signal preprocessing: § Cut EPC segment § Tag categorization § Noise elimination

System Design: Signal preprocessing

u

Tag categorization by K-Medoids

slide-13
SLIDE 13

Signal preprocessing: § Cut EPC segment § Tag categorization § Noise elimination

System Design: Signal preprocessing

u

Inconsistent signal caused by hardware

ASP: Align Sample Point algorithm.

slide-14
SLIDE 14

Signal preprocessing: § Cut EPC segment § Tag categorization § Noise elimination

System Design: Signal preprocessing

u

Effectiveness of ASP

slide-15
SLIDE 15

System Design: Feature extraction

Feature extraction: § FFT § Low-pass filter § Normalization

u

After FFT

u

After Low-pass Filter

u

After normalization

slide-16
SLIDE 16

System Design: Feature matching

Feature extraction: § Overlapped rate R:

u

The features of different tag pairs

Pair 1 Pair 2

slide-17
SLIDE 17

Outline

u Basic Idea u System Design u Experiments and Evaluation u Conclusion

slide-18
SLIDE 18

Experiments and Evaluation

Hardware:

§ Impinj R220 Reader § USRP N210 plus SBX daughterboard § 3 types of tags:Impinj E41-B, E41-C,Alien-9640

Deployment:

§ The distance between the reader antenna and the monitor antenna: D=0.5m ~1.5m § The distance between two tags: 4cm

Metrics:

§ False accept rate (FAR) § False reject rate (FRR) § Accuracy

slide-19
SLIDE 19

Experiments and Evaluation

Case 1: The same authentication position. Case 2: Different authentication position in the same room. Case 3: Different authentication position in the different room.

u

Comparison between Butterfly and prior solutions in two cases

slide-20
SLIDE 20

Experiments and Evaluation

Changing the authentication devices:

slide-21
SLIDE 21

Experiments and Evaluation

Authenticate multiple tags:

u

The ROC curve of multiple pairs

slide-22
SLIDE 22

Experiments and Evaluation

Other factors: Tag rotation

u

Rotations of tag pairs

slide-23
SLIDE 23

Outline

u Basic Idea u System Design u Experiments and Evaluation u Conclusion

slide-24
SLIDE 24

Conclusion

§ In this paper, we present an environment-independent physical layer authentication scheme for passive RFID tags, called Butterfly. § The main advantage of Butterfly is the resilience to environments, locations, and device changes, which are major problems in prior solutions. § We implement a prototype Butterfly and conduct extensive experiments for evaluation. The results show that Butterfly is very effective and accurate in authentication (up to 96.7%).

slide-25
SLIDE 25

Thank you!

Contact: hanjinsong@zju.edu.cn cqian12@ucsc.edu