高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

动态干扰下RFID耦合认证的风险调控学习框架

吴海锋 余文波 曾玉 杨江峰

吴海锋, 余文波, 曾玉, 杨江峰. 动态干扰下RFID耦合认证的风险调控学习框架[J]. 电子与信息学报. doi: 10.11999/JEIT251108
引用本文: 吴海锋, 余文波, 曾玉, 杨江峰. 动态干扰下RFID耦合认证的风险调控学习框架[J]. 电子与信息学报. doi: 10.11999/JEIT251108
WU Haifeng, YU Wenbo, ZENG Yu, YANG JiangFeng. A Risk-Modulated Learning Framework for PHY RFID Authentication[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251108
Citation: WU Haifeng, YU Wenbo, ZENG Yu, YANG JiangFeng. A Risk-Modulated Learning Framework for PHY RFID Authentication[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251108

动态干扰下RFID耦合认证的风险调控学习框架

doi: 10.11999/JEIT251108 cstr: 32379.14.JEIT251108
基金项目: 国家自然科学基金(62161052)项目资助
详细信息
    作者简介:

    吴海锋:男,教授,研究方向为信号处理、机器学习

    余文波:男,硕士生,研究方向为无线射频识别

    曾玉:女,讲师,研究方向为电子信息、通信系统

    杨江峰:男,讲师,研究方向为机器学习

    通讯作者:

    吴海锋 whf5469@gmail.com

  • 中图分类号: TN911

A Risk-Modulated Learning Framework for PHY RFID Authentication

  • 摘要: 动态干扰环境下,射频识别(RFID)耦合认证的物理层特征易受金属反射、多径效应影响,导致传统静态建模方法识别稳定性不足。针对此问题,本文提出风险调控学习识别框架(RMLIF),构建“风险感知—物理调节—特征重构—分类判定”的闭环机制。该框架创新性在于:(1)建立随机微分方程(SDE)信道模型,通过漂移项、扩散项与冲击项协同刻画动态干扰,证明解存在唯一性定理;(2)设计目标导向自适应风险(TDAR)调节算法,理论上保证风险指数单调收敛与扰动稳定性,等效实现分类边界间隔放大;(3)提出识别风险指数(RRI)与信干噪比(SINR)的指数映射关系,构建低维压缩特征空间,并推导出泛化误差界与样本复杂度界。基于通用软件无线电外设(USRP) N2000平台的实验表明,在无/小/中/大铜片干扰场景下,RMLIF识别准确率均达90%以上,较传统方法平均提升10%-20%,验证了理论分析的正确性与工程应用价值。
  • 图  1  原始标签响应信号与预处理信号

    图  2  风险调控学习识别框架

    图  3  SINR与识别风险指数(RRI)的映射关系

    图  4  标签、天线和铜片位置摆放图

    图  5  各算法在各干扰场景下分类准确率图

    图  6  第5类标签(其余类标签情况相似)的特征性能图

    图  7  风险调控前后的组合特征PCA降维图,其中A为第二类标签,B为其他类标签

    图  8  平均6类标签的风险调节机制的第一阶段“先验知识”图

    图  9  第5类标签的风险调节收敛步数

    图  10  RRI 随特征数目、调控比例和样本占比的变化

    图  11  风险调控对香农熵与统计稳定性的影响

    图  12  平均6类标签从训练迁移至测试条件的风险指数结果图

    表  4  RMLIF算法

     算法3:RMLIF
     输入:读写器接收信号 $ \mathbf{x} $
     输出:分类标签 $ \widehat{y} $
     步骤
     (1) 参数调节:由算法2进行参数调节得到小风险参数 $ {\mathbf{\theta }}^{*} $
     (2) 特征值:由表3的特征映射 $ \phi (\cdot ) $ 计算特征
     (3) 分类:将步骤(2)中的特征值输入至分类器得到分类标签 $ \widehat{y} $
    下载: 导出CSV
  • [1] TAJ S, IMRAN A S, KASTRATI Z, et al. IoT-based supply chain management: A systematic literature review[J]. Internet of Things, 2023, 24: 100982. doi: 10.1016/j.iot.2023.100982.
    [2] BERTONCINI C, RUDD K, NOUSAIN B, et al. Wavelet fingerprinting of radio-frequency identification (RFID) tags[J]. IEEE Transactions on Industrial Electronics, 2012, 59(12): 4843–4850. doi: 10.1109/tie.2011.2179276.
    [3] WANG Ge, CAI Haofan, QIAN Chen, et al. Hu-Fu: Replay-resilient RFID authentication[J]. IEEE/ACM Transactions on Networking, 2020, 28(2): 547–560. doi: 10.1109/tnet.2020.2964290.
    [4] ZHANG Manman, LI Peng, BAO Shanjun, et al. A secondary nondestructive detection method of liquid concentration for RFID tag array with mutual coupling[J]. IEEE Transactions on Mobile Computing, 2025, 24(9): 9202–9221. doi: 10.1109/tmc.2025.3559487.
    [5] 徐勇军, 李晶, 骆东鑫, 等. 近场通信物理层安全技术综述[J]. 电子与信息学报, 2025, 47(11): 4129–4143. doi: 10.11999/JEIT250336.

    XU Yongjun, LI Jing, LUO Dongxin, et al. A survey on physical layer security in near-field communication[J]. Journal of Electronics & Information Technology, 2025, 47(11): 4129–4143. doi: 10.11999/JEIT250336.
    [6] 唐晓刚, 冯俊豪, 张斌权, 等. 基于射频指纹的卫星测控地面站身份识别方法[J]. 电子与信息学报, 2023, 45(7): 2554–2560. doi: 10.11999/JEIT220804.

    TANG Xiaogang, FENG Junhao, ZHANG Binquan, et al. Satellite telemetry track and command ground station identification method based on RF fingerprint[J]. Journal of Electronics & Information Technology, 2023, 45(7): 2554–2560. doi: 10.11999/JEIT220804.
    [7] GRIFFIN J D and DURGIN G D. Complete link budgets for backscatter-radio and RFID systems[J]. IEEE Antennas and Propagation Magazine, 2009, 51(2): 11–25. doi: 10.1109/MAP.2009.5162013.
    [8] RAPPAPORT T S. Wireless Communications: Principles and Practice[M]. 2nd ed. London: Persons Education, 2010: 135–140.
    [9] GOLDSMITH A. Wireless Communications[M]. New York: Cambridge University Press, 2005: 175–201.
    [10] ORFANIDIS S J, RAMACCIA D, and TOSCANO A. Electromagnetic Waves and Antennas[M]. New Brunswick: Rutgers University, 2002: 86–107. (查阅网上资料, 未找到本条文献信息, 请确认).
    [11] SALEEM A, ZHANG Xingqi, XU Yan, et al. A critical review on channel modeling: Implementations, challenges and applications[J]. Electronics, 2023, 12(9): 2014. doi: 10.3390/electronics12092014.
    [12] RASMUSSEN C E and WILLIAMS C K I. Gaussian Processes for Machine Learning[M]. Cambridge: MIT Press, 2006: 105–126.
    [13] XU Wenkang, XIAO Yongbo, LIU An, et al. Joint scattering environment sensing and channel estimation based on non-stationary Markov random field[J]. IEEE Transactions on Wireless Communications, 2024, 23(5): 3903–3917. doi: 10.1109/TWC.2023.3312451.
    [14] CANDES E J and WAKIN M B. An introduction to compressive sampling[J]. IEEE Signal Processing Magazine, 2008, 25(2): 21–30. doi: 10.1109/MSP.2007.914731.
    [15] DONOHO D L. Compressed sensing[J]. IEEE Transactions on Information Theory, 2006, 52(4): 1289–1306. doi: 10.1109/TIT.2006.871582.
    [16] 杨立君, 孔文杰, 陆海涛, 等. 原子空间稀疏分解驱动的RIS辅助毫米波MIMO系统密钥生成机制[J]. 电子与信息学报, 2025, 47(4): 1066–1075. doi: 10.11999/JEIT240885.

    YANG Lijun, KONG Wenjie, LU Haitao, et al. A key generation method based on atomic norm minimization for reconfigurable intelligent surface-assisted millimeter wave MIMO communication systems[J]. Journal of Electronics & Information Technology, 2025, 47(4): 1066–1075. doi: 10.11999/JEIT240885.
    [17] LIANG Wei, XIE Songyou, ZHANG Dafang, et al. A mutual security authentication method for RFID-PUF circuit based on deep learning[J]. ACM Transactions on Internet Technology (TOIT), 2022, 22(2): 34. doi: 10.1145/3426968.
    [18] SOKOUDJOU J J F, GARCÍA-CARDARELLI P, REZOLA A, et al. Chipless RFID tag detection based on continuous wavelet transform and convolutional neural networks[J]. IEEE Transactions on Microwave Theory and Techniques, 2025, 73(9): 6260–6274. doi: 10.1109/TMTT.2025.3559537.
    [19] GUO Chuan, PLEISS G, SUN Yu, et al. On calibration of modern neural networks[C]. Proceedings of the 34th International Conference on Machine Learning, Sydney, Australia, 2017: 1321–1330.
    [20] MURPHY K P. Probabilistic Machine Learning: An Introduction[M]. Cambridge: MIT Press, 2022: 577–599.
    [21] GUILLORY D, SHANKAR V, EBRAHIMI S, et al. Predicting with confidence on unseen distributions[C]. The IEEE/CVF International Conference on Computer Vision, Montreal, Canada, 2021: 1114–1124.
    [22] SHARMA A, DEVARAJAN H, GOVINDARAJAN S, et al. High-confidence classification of partial discharge acoustic signals using Bayesian networks for uncertainty quantification[J]. IEEE Transactions on Instrumentation and Measurement, 2025, 74: 3506511. doi: 10.1109/TIM.2025.3529048.
    [23] MADRY A, MAKELOV A, SCHMIDT L, et al. Towards deep learning models resistant to adversarial attacks[C]. 6th International Conference on Learning Representations, Vancouver, Canada, 2018. (查阅网上资料, 未找到本条文献页码, 请确认).
    [24] ZHAO Weimin, ALWIDIAN S, and MAHMOUD Q H. Adversarial training methods for deep learning: A systematic review[J]. Algorithms, 2022, 15(8): 283. doi: 10.3390/a15080283.
    [25] 胡钰林, 喻鑫岚, 高伟, 等. 低时延工业物联网中移动边缘计算的安全性与可靠性联合优化[J]. 电子与信息学报, 2025, 47(10): 3492–3504. doi: 10.11999/JEIT250262.

    HU Yulin, YU Xinlan, GAO Wei, et al. Security and reliability-optimal offloading for mobile edge computing in low-latency industrial IoT[J]. Journal of Electronics & Information Technology, 2025, 47(10): 3492–3504. doi: 10.11999/JEIT250262.
    [26] WU Haifeng, PU Chongrong, GAO Wei, et al. Cognitive risk control for physical-layer RFID Counterfeit tag identification[J]. IEEE Transactions on Instrumentation and Measurement, 2023, 72: 8007115. doi: 10.1109/TIM.2023.3328075.
    [27] WU Haifeng, WANG Siyuan, PU Chongrong, et al. Enhancing counterfeit RFID tag classification through distance based cognitive risk control[J]. Scientific Reports, 2025, 15(1): 4150. doi: 10.1038/s41598-025-87809-8.
    [28] EVANS L C. An Introduction to Stochastic Differential Equations[M]. Providence: American Mathematical Society, 2013: 37–52.
    [29] BEN AMAR E, BEN RACHED N, TEMPONE R, et al. Stochastic differential equations for performance analysis of wireless communication systems[J]. IEEE Transactions on Wireless Communications, 2025, 24(5): 4040–4054. doi: 10.1109/TWC.2025.3536615.
    [30] KAY S M. Fundamentals of Statistical Signal Processing: Detection Theory[M]. Englewood Cliffs: Prentice-Hall PTR, 1998: 60–74.
    [31] BENVENISTE A, MÉTIVIER M, and PRIOURET P. Adaptive Algorithms and Stochastic Approximations[M]. Berlin: Springer, 1990: 6–16.
    [32] BARTLETT P L and MENDELSON S. Rademacher and Gaussian complexities: Risk bounds and structural results[J]. Journal of Machine Learning Research, 2002, 3: 463–482.
  • 加载中
图(12) / 表(1)
计量
  • 文章访问数:  12
  • HTML全文浏览量:  2
  • PDF下载量:  0
  • 被引次数: 0
出版历程
  • 修回日期:  2026-03-16
  • 录用日期:  2026-03-16
  • 网络出版日期:  2026-04-11

目录

    /

    返回文章
    返回