网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (2): 126-140.doi: 10.11959/j.issn.2096-109x.2021022
• 学术论文 • 上一篇
邹祥1,2, 韩劲松2, 曲宇航1, 肖剑3, 许贤4
修回日期:
2020-09-23
出版日期:
2021-04-01
发布日期:
2021-04-01
作者简介:
邹祥(1992- ),男,陕西西安人,西安交通大学博士生,主要研究方向为移动计算、物联网安全。基金资助:
Xiang ZOU1,2, Jinsong HAN2, Yuhang QU1, Jian XIAO3, Xian XU4
Revised:
2020-09-23
Online:
2021-04-01
Published:
2021-04-01
Supported by:
摘要:
提出了一种利用人体内部的生物特征来进行认证的生物识别电子锁设计方法,简称为 PBLock。该方法通过人手指与无源式射频标签的接触,利用后向散射的射频信号传递人体指尖阻抗特征来实行认证。这样的认证方式的优势在于,由于人体阻抗不易采集,加之与设备(RFID 标签)的硬件特征充分融合,大大增加了攻击者复制和克隆的难度。为保证系统的可用性和高效性,利用标签天线剪切式认证优化机制,有效提升了人体阻抗敏感度。同时,利用RFID系统的电磁能量优势讨论了被动驱动的可行性。实验评估结果表明,PBLock的认证准确率可达 96%,平均单次认证的时间花销是1.4 s。另外,从实际环境出发提出了攻击模型,通过深入分析发现,PBLock 可以有效防止伪造攻击、模仿攻击和重放攻击,为新型生物识别电子锁的应用安全提供重要保证。
中图分类号:
邹祥, 韩劲松, 曲宇航, 肖剑, 许贤. 基于超高频RFID的被动生物识别电子锁[J]. 网络与信息安全学报, 2021, 7(2): 126-140.
Xiang ZOU, Jinsong HAN, Yuhang QU, Jian XIAO, Xian XU. Passive biometric electronic lock via UHF RFID[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 126-140.
[1] | CAO K , JAIN A K . Hacking mobile phones using 2D printed fingerprints[R]. Michigan State University Tech.MSU-CSE-16-2, 2016. |
[2] | MOSHNYAGA V G , SHIOYAMA J , HASHIMOTO K . A camera-based approach to prevent fingerprint hacking[C]// IEEE International Workshop on Signal Processing Systems. 2018. |
[3] | BOWYER K W , DOYLE J S . Cosmetic contact lenses and IRIS recognition spoofing[J]. Computer, 2014,47(5): 96-98. |
[4] | ERDOGMUS N , MARCEL S . Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect[C]// Proc IEEE 6th Int Conf Biometrics Theory Appl Syst. 2013. |
[5] | RUIZ-ALBACETE V , TOME-GONZALEZ P , ALONSO-FERNANDEZ F , ,et al. Direct attacks using fake images in IRIS verification[C]// Proc 1st Eur Workshop Biometrics Identity Manage. 2008. |
[6] | KIBRET B , TESHOME A K , LAI D T ,et al. Analysis of the human body as an antenna for wireless implant communication[J]. IEEE Transactions on Antennas and Propagation, 2016,64(4): 1466-1476. |
[7] | ARAI N , SASAKI K , MURAMATSU D ,et al. Variation of impedance in transmission channel of human body communication[C]// International Symposium on Medical Information and Communication Technology. 2017: 49-53. |
[8] | SHAHRIAR H , HADDAD H M , ISLAM M ,et al. An iris-based authentication framework to prevent presentation attacks[C]// Computer Software and Applications Conference. 2017: 504-509. |
[9] | MIRMOGAMADSADEGHI L , DRYGAJLO A . Palm vein recognition with local binary patterns and local derivative patterns[C]// International Joint Conference on Biometrics. 2011. |
[10] | MIURA N , NAGASAKA A , MIYATAKE T . Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification[J]. Systems & Computers in Japan, 2004,35(7): 61-71. |
[11] | ARORA P , SRIVASTAVA S , HANMANDLU M ,et al. Robust authentication using dorsal hand vein images[J]. IEEE Intelligent Systems, 2019,34(2): 25-35. |
[12] | BOLES A , RAD P . Voice biometrics:deep learning-based voiceprint authentication system[C]// Service Oriented Software Engineering. 2017: 1-6. |
[13] | REN Y , FANG Z , LIU D ,et al. Replay attack detection based on distortion by loudspeaker for voice authentication[J]. Multimedia Tools and Applications, 2019,78(7): 8383-8396. |
[14] | YANG Y F , GUO B , WANG Z ,et al. BehaveSense:continuous authentication for security-sensitive mobile Apps using behavioral biometrics[J]. Ad Hoc Networks, 2019,84: 9-18. |
[15] | MUSALE P , BAEK D , WERELLAGAMA N ,et al. You walk,we authenticate:lightweight seamless authentication based on gait in wearable IoT systems[J]. IEEE Access, 2019: 37883-37895. |
[16] | WANG Y X , CHEN Y N , BHUIYAN M Z A ,et al. Gait-based human identification using acoustic sensor and deep neural network[J]. Future Generation Computer Systems, 2018,86: 1228-1237. |
[17] | ZENG Y , PATHAK P H , MOHAPATRA P ,et al. WiWho:wifi-based person identification in smart spaces[C]// Information Processing in Sensor networks,IPSN. 2016. |
[18] | ZHANG J , WEI B , HU W ,et al. WiFi-ID:human identification using Wi-Fi signal[C]// Distributed Computing in Sensor systems,DCOSS. 2016. |
[19] | KONG H , LU L , YU J ,et al. Finger pass:finger gesture-based continuous user authentication for smart homes using commodity Wi-Fi[C]// International Symposium on Mobile Ad Hoc Networking and Computing,MobiHoc. 2019. |
[20] | LIN F , SONG C , ZHUANG Y ,et al. Cardiac scan:A non-contact and continuous heart-based user authentication system[C]// IEEE International Conference on Mobile Computing and Networking. 2017. |
[21] | CHAUHAN J , SENEVIRATNE S , HU Y ,et al. Breathing-based authentication on resource-constrained IoT devices using recurrent neural networks[J]. IEEE Computer, 2018,51(5): 60-67. |
[22] | ZHANG L , TAN S , YANG J . Hearing your voice is not enough:an articulatory gesture based liveness detection for voice authentication[C]// ACM Conference on Computer and Communications Security,CCS. 2017. |
[23] | OH S , YANG J , BIANCHI A ,et al. Devil in a box:installing backdoors in electronic door locks[C]// Conference on Privacy Security and Trust, 2015: 139-144. |
[24] | ZHAO C , LI Z , LIU T ,et al. RF-Mehndi:a fingertip profiled RF identifier[C]// International Conference on Computer Communications,INFOCOM. 2019. |
[25] | HAN J S , QIAN C , WANG X ,et al. Twins:device-free object tracking using passive tags[C]// International Conference on Computer Communications,INFOCOM. 2014. |
[26] | DING H , HAN J S , QIAN C ,et al. Trio:utilizing tag interference for refined localization of passive RFID[C]// International Conference on Computer Communications,INFOCOM. 2018. |
[27] | LI P , AN Z L , YANG L ,et al. Towards physical-layer vibration sensing with RFIDs[C]// IEEE Conference on Computer Communications,INFOCOM. 2019. |
[1] | 陈伟建, 罗皓翔. LiCi密码的差分故障攻击[J]. 网络与信息安全学报, 2021, 7(2): 104-109. |
[2] | 连佳娜, 汪鹏君, 李刚, 马雪娇, 翟官宝. 基于FPGA的新型强弱混合型PUF电路设计[J]. 网络与信息安全学报, 2021, 7(2): 94-103. |
[3] | 武玲娟, 朱嘉诚, 唐时博, 谭静, 胡伟. 基于可满足性无关项的硬件木马设计与检测[J]. 网络与信息安全学报, 2021, 7(2): 35-42. |
[4] | 蒋忠元, 陈贤宇, 马建峰. 社交网络中的社团隐私研究综述[J]. 网络与信息安全学报, 2021, 7(2): 10-21. |
[5] | 胡爱群, 方兰婷, 李涛. 基于仿生机理的内生安全防御体系研究[J]. 网络与信息安全学报, 2021, 7(1): 11-19. |
[6] | 周旺, 胡红钢, 俞能海. 快速响应的高效多值拜占庭共识方案[J]. 网络与信息安全学报, 2021, 7(1): 57-64. |
[7] | 曹琪, 阮树骅, 陈兴蜀, 兰晓, 张红霞, 金泓键. Hyperledger Fabric平台的国密算法嵌入研究[J]. 网络与信息安全学报, 2021, 7(1): 65-75. |
[8] | 沈剑, 周天祺, 王晨, 杨惠杰. 面向边缘计算的隐私保护密钥分配协议[J]. 网络与信息安全学报, 2021, 7(1): 93-100. |
[9] | 普黎明, 卫红权, 李星, 江逸茗. 面向云应用的拟态云服务架构[J]. 网络与信息安全学报, 2021, 7(1): 101-112. |
[10] | 赵明烽, Lei Chen, 钟洋, 熊金波. 移动边缘群智感知动态隐私度量模型与评价机制[J]. 网络与信息安全学报, 2021, 7(1): 157-166. |
[11] | 郭京城,舒辉,熊小兵,康绯. 基于代码碎片化的软件保护技术[J]. 网络与信息安全学报, 2020, 6(6): 57-68. |
[12] | 杨路辉,白惠文,刘光杰,戴跃伟. 基于可分离卷积的轻量级恶意域名检测模型[J]. 网络与信息安全学报, 2020, 6(6): 112-120. |
[13] | 王昊,吴天昊,朱孔林,张琳. 交叉口场景下基于区块链技术的匿名车辆身份认证方案[J]. 网络与信息安全学报, 2020, 6(5): 27-35. |
[14] | 超凡,杨智,杜学绘,孙彦. 基于深度神经网络的Android恶意软件检测方法[J]. 网络与信息安全学报, 2020, 6(5): 67-79. |
[15] | 李喆,韩益亮,李鱼. 基于Polar码改进的RLCE公钥加密方案[J]. 网络与信息安全学报, 2020, 6(5): 110-118. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|