Clandestine nanoelectromechanical tags for identification and authentication

被引:3
|
作者
Rassay, Sushant [1 ]
Ramezani, Mehrdad [1 ]
Shomaji, Sumaiya [1 ]
Bhunia, Swarup [1 ]
Tabrizian, Roozbeh [1 ]
机构
[1] Univ Florida, Elect & Comp Engn Dept, Gainesville, FL 32611 USA
关键词
Authentication;
D O I
10.1038/s41378-020-00213-2
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
The realization of truly unclonable identification and authentication tags is the key factor in protecting the global economy from an ever-increasing number of counterfeit attacks. Here, we report on the demonstration of nanoscale tags that exploit the electromechanical spectral signature as a fingerprint that is characterized by inherent randomness in fabrication processing. Benefiting from their ultraminiaturized size and transparent constituents, these clandestine nanoelectromechanical tags provide substantial immunity to physical tampering and cloning. Adaptive algorithms are developed for digital translation of the spectral signature into binary fingerprints. A large set of tags fabricated in the same batch is used to estimate the entropy of the corresponding fingerprints with high accuracy. The tags are also examined under repetitive measurements and temperature variations to verify the consistency of the fingerprints. These experiments highlight the potential of clandestine nanoelectromechanical tags for the realization of secure identification and authentication methodologies applicable to a wide range of products and consumer goods. NEMS for security: tamper-proof wireless identification tags at the nanoscaleNanoscale, tamper-proof product identification tags offer significant benefits over currently used technologies. Conventional product ID tags, such as QR codes or RFID tags, are intrinsically vulnerable to tampering or cloning. Roozbeh Tabrizian, and a team from the University of Florida, United States, created a new ID tag technology based on NEMS (nano-electro-mechanical systems). The NEMS tag is tiny, transparent, and relies on the nanoscale variation in batch-manufactured materials to produce many tags with unique fingerprints. The fingerprints comprise an individual electromagnetic spectra profile, which can be read and converted to digital ID. Due to its small size and transparency, NEMS tags are difficult to differentiate and can be applied to a wide range of products. The team say their tags are easily read in a high-interference environment, and are low cost.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Robust Authentication of Consumables With Extrinsic Tags and Chemical Fingerprinting
    Masna, Naren Vikram Raj
    Chen, Cheng
    Mandal, Soumyajit
    Bhunia, Swarup
    IEEE ACCESS, 2019, 7 : 14396 - 14409
  • [22] PAP: A privacy and authentication protocol for passive RFID tags
    Liu, Alex X.
    Bailey, LeRoy A.
    COMPUTER COMMUNICATIONS, 2009, 32 (7-10) : 1194 - 1199
  • [23] An authentication protocol in a security layer for RFID smart tags
    Feldhofer, Martin
    Proc Mediterr Electrotech Conf MELECON, 1600, (759-762):
  • [24] Unconditionally secure chaffing and winnowing with short authentication tags
    Stinson, Douglas R.
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2007, 1 (02) : 269 - 280
  • [25] Cryptography and authentication on RFID passive tags for apparel products
    Wong, KHM
    Hui, PCL
    Chan, ACK
    COMPUTERS IN INDUSTRY, 2006, 57 (04) : 342 - 349
  • [26] LADP: A Lightweight Authentication and Delegation Protocol for RFID Tags
    Li, Gaochao
    Xu, Xiaolin
    Li, Qingshan
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 860 - 865
  • [27] Novel lightweight RFID authentication protocols for inexpensive tags
    Khorasgani, Alireza Abdellahi
    Sajadieh, Mahdi
    Yazdani, Mohammad Rouhollah
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [28] A Secure and Efficient Authentication Protocol for Passive RFID Tags
    Kolias, Constantinos
    Kolias, Vasilis
    Kambourakis, Georgios
    2009 6TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2009), 2009, : 36 - +
  • [29] An authentication protocol in a security layer for RFID smart tags
    Feldhofer, M
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 759 - 762
  • [30] Identification and associated hazards of clandestine drug laboratories
    Norman, Keith
    Ciesielski, Austin L.
    Wagner, Jarrad R.
    WILEY INTERDISCIPLINARY REVIEWS: FORENSIC SCIENCE, 2021, 3 (03):