A Risk-Modulated Learning Framework for PHY RFID Authentication
-
摘要: 动态干扰环境下,射频识别(RFID)耦合认证的物理层特征易受金属反射、多径效应影响,导致传统静态建模方法识别稳定性不足。针对此问题,本文提出风险调控学习识别框架(RMLIF),构建“风险感知—物理调节—特征重构—分类判定”的闭环机制。该框架创新性在于:(1)建立随机微分方程(SDE)信道模型,通过漂移项、扩散项与冲击项协同刻画动态干扰,证明解存在唯一性定理;(2)设计目标导向自适应风险(TDAR)调节算法,理论上保证风险指数单调收敛与扰动稳定性,等效实现分类边界间隔放大;(3)提出识别风险指数(RRI)与信干噪比(SINR)的指数映射关系,构建低维压缩特征空间,并推导出泛化误差界与样本复杂度界。基于通用软件无线电外设(USRP) N2000平台的实验表明,在无/小/中/大铜片干扰场景下,RMLIF识别准确率均达90%以上,较传统方法平均提升10%-20%,验证了理论分析的正确性与工程应用价值。Abstract:
Objective Dynamic interference and metallic reflections severely affect the reliability of coupled Radio Frequency Identification (RFID) authentication. Conventional static models cannot adapt to time-varying noise and multipath effects, leading to unstable recognition. To address this issue, this paper proposes a Risk-Modulated Learning Identification Framework (RMLIF) that integrates stochastic channel modeling, adaptive risk regulation, and risk-regularized classification. The objective is to achieve stable and interpretable physical-layer authentication under nonstationary interference, thereby improving the anti-counterfeiting reliability of RFID systems. Methods An SDE-based coupled channel model is first established to jointly describe drift, diffusion, and impulsive interference (Eq.(1)), and its solution’s existence and uniqueness are proved. A Target-Driven Adaptive Risk (TDAR) algorithm dynamically adjusts physical-layer parameters based on the Recognition Risk Index (RRI). The RRI is derived from classification posterior probabilities (Eq.(3)), and its exponential mapping to SINR is analytically characterized (Eq.(11), Fig.3 ). This enables real-time risk estimation and closed-loop control. For feature representation, a difference-based compressive modeling method captures the perturbation between normalized and reference signals (Fig.1 ), and Theorem 1 ensures Lipschitz stability. Parallel statistical and steady-state feature paths are designed (Table 3 ), and their joint robustness is proved (Corollary 4). The framework further establishes that TDAR regulation is equivalent to a risk regularization process (Theorem 3), effectively enlarging the classification margin without modifying the classifier structure.Results and Discussions Theoretical analysis derives the generalization error bound, sample complexity, and robustness limits (Theorem 4–7), showing that filtering high-risk samples reduces redundancy and enhances efficiency. The Asymptotic Real Risk Index (ARRI) (Theorem 8) explains long-term convergence and system self-consistency. Experiments on a USRP N2000 platform ( Table 5 ) using six types of EPC Gen2 tags under four interference levels—no, small, medium, and large copper plates (Fig.4 )—validate the proposed framework. Compared with conventional methods (Coupling_14, Hu_Fu, CNN_Vgg19, PCFM), their RMLIF-enhanced versions exhibit significant accuracy gains (Fig.5 ). The PCFM_RMLIF achieves over 90% accuracy, improving by 15%–28%. PCA visualization confirms the stability of compressed features (Fig.6 ) and clearer class separation after risk regulation (Fig.7 ). The TDAR algorithm converges rapidly within two iterations (Fig.9 ). As the effective sample ratio and feature dimension increase, RRI decreases monotonically (Fig.10 ), aligning with Theorem 6. Entropy analysis (Fig.11 ) indicates lower system uncertainty and improved stability after regulation. Cross-condition tests further verify the framework’s robustness and generalization (Fig.12 ).Conclusions This paper develops a unified stochastic–adaptive learning framework for RFID authentication under dynamic interference. The RMLIF framework combines SDE-based channel modeling, adaptive TDAR regulation, and compressive feature reconstruction into a closed-loop mechanism linking physical signals to cognitive risk. Both theory and experiments confirm that risk-driven modulation effectively suppresses disturbance, enhances feature separability, and reduces generalization error. The proposed approach achieves high accuracy, fast convergence, and strong robustness, offering a general solution for dynamic RFID anti-counterfeiting. Future work will extend this framework to multi-tag cooperative scenarios and low-power cross-band authentication. -
Key words:
- RFID /
- Anti-counterfeiting /
- Coupling /
- Recognition Risk /
- Classification
-
表 4 RMLIF算法
算法3:RMLIF 输入:读写器接收信号 $ \mathbf{x} $ 输出:分类标签 $ \widehat{y} $ 步骤: (1) 参数调节:由算法2进行参数调节得到小风险参数 $ {\mathbf{\theta }}^{*} $ (2) 特征值:由表3的特征映射 $ \phi (\cdot ) $ 计算特征 (3) 分类:将步骤(2)中的特征值输入至分类器得到分类标签 $ \widehat{y} $ -
[1] TAJ S, IMRAN A S, KASTRATI Z, et al. IoT-based supply chain management: A systematic literature review[J]. Internet of Things, 2023, 24: 100982. doi: 10.1016/j.iot.2023.100982. [2] BERTONCINI C, RUDD K, NOUSAIN B, et al. Wavelet fingerprinting of radio-frequency identification (RFID) tags[J]. IEEE Transactions on Industrial Electronics, 2012, 59(12): 4843–4850. doi: 10.1109/tie.2011.2179276. [3] WANG Ge, CAI Haofan, QIAN Chen, et al. Hu-Fu: Replay-resilient RFID authentication[J]. IEEE/ACM Transactions on Networking, 2020, 28(2): 547–560. doi: 10.1109/tnet.2020.2964290. [4] ZHANG Manman, LI Peng, BAO Shanjun, et al. A secondary nondestructive detection method of liquid concentration for RFID tag array with mutual coupling[J]. IEEE Transactions on Mobile Computing, 2025, 24(9): 9202–9221. doi: 10.1109/tmc.2025.3559487. [5] 徐勇军, 李晶, 骆东鑫, 等. 近场通信物理层安全技术综述[J]. 电子与信息学报, 2025, 47(11): 4129–4143. doi: 10.11999/JEIT250336.XU Yongjun, LI Jing, LUO Dongxin, et al. A survey on physical layer security in near-field communication[J]. Journal of Electronics & Information Technology, 2025, 47(11): 4129–4143. doi: 10.11999/JEIT250336. [6] 唐晓刚, 冯俊豪, 张斌权, 等. 基于射频指纹的卫星测控地面站身份识别方法[J]. 电子与信息学报, 2023, 45(7): 2554–2560. doi: 10.11999/JEIT220804.TANG Xiaogang, FENG Junhao, ZHANG Binquan, et al. Satellite telemetry track and command ground station identification method based on RF fingerprint[J]. Journal of Electronics & Information Technology, 2023, 45(7): 2554–2560. doi: 10.11999/JEIT220804. [7] GRIFFIN J D and DURGIN G D. Complete link budgets for backscatter-radio and RFID systems[J]. IEEE Antennas and Propagation Magazine, 2009, 51(2): 11–25. doi: 10.1109/MAP.2009.5162013. [8] RAPPAPORT T S. Wireless Communications: Principles and Practice[M]. 2nd ed. London: Persons Education, 2010: 135–140. [9] GOLDSMITH A. Wireless Communications[M]. New York: Cambridge University Press, 2005: 175–201. [10] ORFANIDIS S J, RAMACCIA D, and TOSCANO A. Electromagnetic Waves and Antennas[M]. New Brunswick: Rutgers University, 2002: 86–107. (查阅网上资料, 未找到本条文献信息, 请确认). [11] SALEEM A, ZHANG Xingqi, XU Yan, et al. A critical review on channel modeling: Implementations, challenges and applications[J]. Electronics, 2023, 12(9): 2014. doi: 10.3390/electronics12092014. [12] RASMUSSEN C E and WILLIAMS C K I. Gaussian Processes for Machine Learning[M]. Cambridge: MIT Press, 2006: 105–126. [13] XU Wenkang, XIAO Yongbo, LIU An, et al. Joint scattering environment sensing and channel estimation based on non-stationary Markov random field[J]. IEEE Transactions on Wireless Communications, 2024, 23(5): 3903–3917. doi: 10.1109/TWC.2023.3312451. [14] CANDES E J and WAKIN M B. An introduction to compressive sampling[J]. IEEE Signal Processing Magazine, 2008, 25(2): 21–30. doi: 10.1109/MSP.2007.914731. [15] DONOHO D L. Compressed sensing[J]. IEEE Transactions on Information Theory, 2006, 52(4): 1289–1306. doi: 10.1109/TIT.2006.871582. [16] 杨立君, 孔文杰, 陆海涛, 等. 原子空间稀疏分解驱动的RIS辅助毫米波MIMO系统密钥生成机制[J]. 电子与信息学报, 2025, 47(4): 1066–1075. doi: 10.11999/JEIT240885.YANG Lijun, KONG Wenjie, LU Haitao, et al. A key generation method based on atomic norm minimization for reconfigurable intelligent surface-assisted millimeter wave MIMO communication systems[J]. Journal of Electronics & Information Technology, 2025, 47(4): 1066–1075. doi: 10.11999/JEIT240885. [17] LIANG Wei, XIE Songyou, ZHANG Dafang, et al. A mutual security authentication method for RFID-PUF circuit based on deep learning[J]. ACM Transactions on Internet Technology (TOIT), 2022, 22(2): 34. doi: 10.1145/3426968. [18] SOKOUDJOU J J F, GARCÍA-CARDARELLI P, REZOLA A, et al. Chipless RFID tag detection based on continuous wavelet transform and convolutional neural networks[J]. IEEE Transactions on Microwave Theory and Techniques, 2025, 73(9): 6260–6274. doi: 10.1109/TMTT.2025.3559537. [19] GUO Chuan, PLEISS G, SUN Yu, et al. On calibration of modern neural networks[C]. Proceedings of the 34th International Conference on Machine Learning, Sydney, Australia, 2017: 1321–1330. [20] MURPHY K P. Probabilistic Machine Learning: An Introduction[M]. Cambridge: MIT Press, 2022: 577–599. [21] GUILLORY D, SHANKAR V, EBRAHIMI S, et al. Predicting with confidence on unseen distributions[C]. The IEEE/CVF International Conference on Computer Vision, Montreal, Canada, 2021: 1114–1124. [22] SHARMA A, DEVARAJAN H, GOVINDARAJAN S, et al. High-confidence classification of partial discharge acoustic signals using Bayesian networks for uncertainty quantification[J]. IEEE Transactions on Instrumentation and Measurement, 2025, 74: 3506511. doi: 10.1109/TIM.2025.3529048. [23] MADRY A, MAKELOV A, SCHMIDT L, et al. Towards deep learning models resistant to adversarial attacks[C]. 6th International Conference on Learning Representations, Vancouver, Canada, 2018. (查阅网上资料, 未找到本条文献页码, 请确认). [24] ZHAO Weimin, ALWIDIAN S, and MAHMOUD Q H. Adversarial training methods for deep learning: A systematic review[J]. Algorithms, 2022, 15(8): 283. doi: 10.3390/a15080283. [25] 胡钰林, 喻鑫岚, 高伟, 等. 低时延工业物联网中移动边缘计算的安全性与可靠性联合优化[J]. 电子与信息学报, 2025, 47(10): 3492–3504. doi: 10.11999/JEIT250262.HU Yulin, YU Xinlan, GAO Wei, et al. Security and reliability-optimal offloading for mobile edge computing in low-latency industrial IoT[J]. Journal of Electronics & Information Technology, 2025, 47(10): 3492–3504. doi: 10.11999/JEIT250262. [26] WU Haifeng, PU Chongrong, GAO Wei, et al. Cognitive risk control for physical-layer RFID Counterfeit tag identification[J]. IEEE Transactions on Instrumentation and Measurement, 2023, 72: 8007115. doi: 10.1109/TIM.2023.3328075. [27] WU Haifeng, WANG Siyuan, PU Chongrong, et al. Enhancing counterfeit RFID tag classification through distance based cognitive risk control[J]. Scientific Reports, 2025, 15(1): 4150. doi: 10.1038/s41598-025-87809-8. [28] EVANS L C. An Introduction to Stochastic Differential Equations[M]. Providence: American Mathematical Society, 2013: 37–52. [29] BEN AMAR E, BEN RACHED N, TEMPONE R, et al. Stochastic differential equations for performance analysis of wireless communication systems[J]. IEEE Transactions on Wireless Communications, 2025, 24(5): 4040–4054. doi: 10.1109/TWC.2025.3536615. [30] KAY S M. Fundamentals of Statistical Signal Processing: Detection Theory[M]. Englewood Cliffs: Prentice-Hall PTR, 1998: 60–74. [31] BENVENISTE A, MÉTIVIER M, and PRIOURET P. Adaptive Algorithms and Stochastic Approximations[M]. Berlin: Springer, 1990: 6–16. [32] BARTLETT P L and MENDELSON S. Rademacher and Gaussian complexities: Risk bounds and structural results[J]. Journal of Machine Learning Research, 2002, 3: 463–482. -
下载:
下载: