IEEE INFOCOM 2020 - IEEE Conference on Computer Communications 2020
DOI: 10.1109/infocom41043.2020.9155427
|View full text |Cite
|
Sign up to set email alerts
|

RF-Rhythm: Secure and Usable Two-Factor RFID Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Other recent studies, such as those on Move2Auth [ 30 ] and RF-Rhythm [ 31 ], proposed approaches for device authentication that are based on a change in RF characteristics. These methods use changing patterns in RF characteristics to authenticate users who are in the vicinity.…”
Section: Related Workmentioning
confidence: 99%
“…Other recent studies, such as those on Move2Auth [ 30 ] and RF-Rhythm [ 31 ], proposed approaches for device authentication that are based on a change in RF characteristics. These methods use changing patterns in RF characteristics to authenticate users who are in the vicinity.…”
Section: Related Workmentioning
confidence: 99%
“…Since the reader has prior knowledge of the variation in the CW, it is able to decode the backscatter signal while adding secrecy to the eavesdropper. Further, a two-factor authentication was proposed in [84] to secure RFID tags. The first authentication factor is generated by making a unique tapping on the tag by the user.…”
Section: B Securitymentioning
confidence: 99%
“…Hence, The authors in [85] Secure AP with multi-antenna Assign fine grained signatures to legal and Accurately detect 97% of structure attacking devices at the AP using tags attacks [43] Exploit on-body signal propagation Develop algorithm to separate between Achieved 93.2% true positives to secure backscatter networks on-body and off-body signal in the and 3.18% false positives presence of noise [81] Secure backscatter tags with Generate noise and transmit with Achieved high secrecy rate which random artificial noise backscatter signal. And use SIC at increases with increase in tag-reader legal receiver channel gain and number of tags [82] Secure RFID systems with Create random carrier for modulation Defend against MIMO and randomization and randomly switch antenna to create non-MIMO attackers random channel [83] Secure RFID systems with Create random variations in the CW Increase secrecy of AmBC network randomization [84] Two-factor RFID tag Randomly create unique phase changes at Achieved near zero false positives security the tag. Authenticate using saved and false negatives sequence at the reader.…”
Section: B Securitymentioning
confidence: 99%
“…RF-Cloak could defend against MIMO and non-MIMO attackers. Similarly, two-factor authentication was proposed in RF-Rhythm (Li et al, 2020a) to secure RFID tags. The first-factor authentication is generated by making a special tapping on the tag by the user.…”
Section: Security Of Bbwsmentioning
confidence: 99%