Chipless RFID Authentication: Design, Realization and Characterization

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Chipless RFID Authentication examines the development of highly secure product authentication systems for manufactured products by using chipless radio frequency identification (RFID) technology.

The absence of a chip and its compatibility with mass production make chipless RFID an alternative to barcodes. This book discusses how, by using natural randomness inherent to the fabrication process, each chipless RFID tag has a unique signature that can never be reproduced, even if someone tries to copy the label.

The book first explores the state-of-the-art of existing authentication and anti-counterfeiting methods based on their security level. Next, a methodology describing the characterization of chipless RFID tags for the authentication application is presented, followed by a discussion of the extraction of aspect-independent parameters for chipless RFID tags. After proposing designs for the tags, the book presents the realization and characterization of the labels (which exhibit naturally occurring randomness) for authentication, using printed circuit boards and inkjet printing on polyethylene terephthalate.

Author(s): Zeshan Ali, Etienne Perret, Nicolas Barbot, Romain Siragusa
Series: Networks & Telecommunications Series
Publisher: Wiley-ISTE
Year: 2022

Language: English
Pages: 193
City: London

Cover
Title Page
Copyright Page
Contents
Preface
Chapter 1. Introduction to Chipless Radio Frequency Identification
1.1. Introduction
1.2. Chipless radio frequency identification
1.3. Recent developments and advancements
1.4. Authentication
1.5. Conclusion
Chapter 2. Literature Review
2.1. Introduction
2.2. State of the art
2.2.1. Basic level of security (overt or visible features)
2.2.2. Medium level of security (covert or hidden markers)
2.2.3. High level of security (forensic techniques)
2.2.4. Conventional RFID approaches
2.2.5. Classical chipless approaches
2.2.6. Natural randomness
2.3. Conclusion
Chapter 3. Methodology and Proof of Concept
3.1. Introduction
3.2. Randomness inherent in the realization process
3.3. Authentication procedure
3.4. Statistical analysis
3.5. Chipless tag discrimination using PCB tags
3.5.1. Chipless tag design and purposely applied dimensional variations
3.5.2. Chipless tag discrimination results and performance of the resemblance metrics
3.6. Chipless tag discrimination using inkjet-printed paper tags
3.6.1. Chipless tag design and purposely applied dimensional variations
3.6.2. Chipless tag discrimination results and performance of the resemblance metrics
3.7. Conclusion
Chapter 4. Extraction of Chipless Tag Key Parameters from Backscattered Signals
4.1. Introduction
4.2. Chipless RFID tags and measurement setup
4.3. Extraction of aspect-independent parameters of a second-order scatterer
4.3.1. Extraction with the matrix pencil method
4.3.2. Extraction with the spectrogram method
4.4. Extraction of CNRs of the multi-scatterer-based tags
4.5. Comparison of computational time durations between the matrix pencil method and the spectrogram method
4.6. Conclusion
Chapter 5. Chipless Authentication Using PCB Tags
5.1. Introduction
5.2. Design and the optimization of chipless tags to be employed for authentication
5.2.1. C-folded uni-scatterer tags (classical design)
5.2.2. C-folded quad-scatterer tags (optimized design)
5.3. Detection of minimum dimensional variation in outdoor realistic environment and authentication results
5.4. Detection of natural randomness and authentication results
5.4.1. Authentication within each realization
5.4.2. Authentication across different realizations
5.4.3. Characterization of the natural randomness
5.4.4. Generalization of the proposed method
5.4.5. Final remarks on the constraints
5.5. Conclusion
Chapter 6. Chipless Authentication Using Inkjet-Printed PET Tags
6.1. Introduction
6.2. Optimization of chipless tags to exploit natural randomness inherent in inkjet printing
6.3. Authentication using VNA-based chipless reader
6.4. Authentication using IR-UWB chipless reader
6.5. Conclusion
Conclusion
Appendices
Appendix A
Appendix B
Appendix C
References
Index
EULA