2020
DOI: 10.1109/tap.2019.2948740
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Using Metallic Inkjet-Printed Chipless RFID Tags

Abstract: A high-level (i.e., in terms of security) authentication method is proposed in this paper, where the chipless radio frequency identification (RFID) is extended to the chipless authentication. The proposed method is based on low cost inkjet-printed square check patterned chipless tags, whose design is explicitly optimized keeping the randomness inherent to the inkjet printing process in view. These optimized chipless tags are very difficult to duplicate, as their unique backscattered electromagnetic (EM) respon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…Just as there are application-specific measurement approaches, there are also application-specific post-processing methods. For example, post processing methods have been developed for specific sensor architectures [157,350,351], for authentication purposes [189,207,325,345,352], and for decoding responses measured from moving tags [337,346,[353][354][355]. Another application that has seen many specifically developed post-processing methods is collision avoidance/tag localization in multi-tag environments [247,248,[356][357][358].…”
Section: Application Specific Post-processingmentioning
confidence: 99%
“…Just as there are application-specific measurement approaches, there are also application-specific post-processing methods. For example, post processing methods have been developed for specific sensor architectures [157,350,351], for authentication purposes [189,207,325,345,352], and for decoding responses measured from moving tags [337,346,[353][354][355]. Another application that has seen many specifically developed post-processing methods is collision avoidance/tag localization in multi-tag environments [247,248,[356][357][358].…”
Section: Application Specific Post-processingmentioning
confidence: 99%
“…Through sweeping the electrical signal input across a specified frequency range, a fingerprint specific to the manufacturer can be derived, while returning minute deviations from expected to accurately identify an IC die as being fabricated legitimately or maliciously. Authentication methods based on THz tagging have been used extensively in 2018 and 2019 to create automated techniques, 157,[166][167][168][169] along with methods of detecting spectral fingerprints from THz-tags behind shielded materials using machine learning. 170 Similar tagging methods have been combined with physically unclonable functions PUFs to create unclonable tags for protecting counterfeit pharmaceuticals, an industry plagued by counterfeits similar to semiconductors.…”
Section: Signals Emitted Under Testmentioning
confidence: 99%
“…Compared with lithographical techniques, printing techniques have many advantages including simple processes, high efficiency, good compatibility for substrates, and extremely low costs. SP has yielded unusually brilliant results in the fabrication of flexible and large-area electronics on Earth, [8] such as organic light-emitting diodes (OLEDs), [8][9][10] radio frequency identification devices (RFIDs), [11][12][13] soft sensors, [14,15] etc. All these advantages make the printing technique a feasible and applicable strategy for manufacturing electronics in space.…”
Section: Introductionmentioning
confidence: 99%