Advanced Search
Turn off MathJax
Article Contents
WU Haifeng, YU Wenbo, ZENG Yu, YANG JiangFeng. A Risk-modulated Learning Framework for Physical-layer RFIDAuthentication under Dynamic Interference[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251108
Citation: WU Haifeng, YU Wenbo, ZENG Yu, YANG JiangFeng. A Risk-modulated Learning Framework for Physical-layer RFIDAuthentication under Dynamic Interference[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251108

A Risk-modulated Learning Framework for Physical-layer RFIDAuthentication under Dynamic Interference

doi: 10.11999/JEIT251108 cstr: 32379.14.JEIT251108
Funds:  The National Natural Science Foundation of China (62161052)
  • Received Date: 2025-10-20
  • Accepted Date: 2026-03-16
  • Rev Recd Date: 2026-03-12
  • Available Online: 2026-04-11
  •   Objective  Dynamic interference and metallic reflections severely affect the reliability of coupled Radio Frequency IDentification (RFID) authentication. Conventional static models cannot adapt to time-varying noise and multipath effects, which leads to unstable recognition. To address this problem, this paper proposes a Risk-Modulated Learning Identification Framework (RMLIF) that integrates stochastic channel modeling, adaptive risk regulation, and risk-regularized classification. The aim is to achieve stable and interpretable physical-layer authentication under nonstationary interference, thereby improving the anti-counterfeiting reliability of RFID systems.  Methods  A Stochastic Differential Equation (SDE)-based coupled channel model is first established to jointly characterize drift, diffusion, and impulsive interference (Eq.(1)), and the existence and uniqueness of its solution are proved. A Target-Driven Adaptive Risk (TDAR) algorithm is then designed to dynamically adjust physical-layer parameters based on the Recognition Risk Index (RRI). The RRI is derived from classification posterior probabilities (Eq.(3)), and its exponential mapping to the Signal-to-Interference-plus-Noise Ratio (SINR) is characterized analytically (Eq.(11), Fig. 3), which enables real-time risk estimation and closed-loop control. For feature representation, a difference-based compressive feature modeling method is used to capture the perturbation between normalized and reference signals (Fig. 1), and Theorem 1 establishes the stability of the compressed mapping. Parallel steady-state and perturbation feature paths are further designed (Table 3), and their joint robustness is proved in Corollary 4. In addition, the framework shows that TDAR regulation is equivalent to a risk-regularized classification process (Theorem 3), which effectively enlarges the classification margin without modifying the classifier structure.  Results and Discussions  Theoretical analysis derives the generalization error bound, sample complexity, and robustness limits (Theorem 4~7), showing that filtering high-risk samples reduces redundancy and improves learning efficiency. The Asymptotic Real Risk Index (ARRI) is further defined to explain long-term convergence and structural self-consistency (Theorem 8). Experiments conducted on a USRP N2000 platform (Table 5) use six types of EPC C1 Gen2 tags under four interference conditions, namely no copper plate and small, medium, and large copper plates (Fig. 4). Compared with conventional methods, including Coupling_14, Hu_Fu, CNN_Vgg19, and PCFM, the corresponding RMLIF-enhanced versions achieve clear gains in classification accuracy (Fig. 5). In all no/small/medium/large copper-plate interference scenarios, the proposed framework achieves accuracy above 90%, with an average improvement of 10%–20% over traditional methods. PCFM_RMLIF achieves the best overall performance. PCA visualization confirms the stability of the compressed features (Fig. 6) and the clearer class separation after risk regulation (Fig. 7). The TDAR algorithm converges rapidly, generally within two iterations (Fig. 9). As the effective sample ratio and feature dimension increase, the RRI decreases monotonically (Fig. 10), in agreement with Theorem 6. Entropy analysis (Fig. 11) shows that risk regulation reduces system uncertainty and improves stability. Cross-condition tests further verify the robustness and generalization ability of the framework (Fig. 12).  Conclusions  This paper develops a unified risk-modulated learning framework for physical-layer RFID authentication under dynamic interference. The RMLIF framework combines SDE-based channel modeling, adaptive TDAR regulation, and compressive feature reconstruction into a closed-loop mechanism that links physical signals with recognition risk. Both theoretical analysis and experimental results show that risk-driven regulation effectively suppresses disturbance, improves feature separability, and reduces generalization error. The proposed approach achieves high accuracy, rapid convergence, and strong robustness, and provides an effective solution for dynamic RFID anti-counterfeiting authentication.
  • loading
  • [1]
    TAJ S, IMRAN A S, KASTRATI Z, et al. IoT-based supply chain management: A systematic literature review[J]. Internet of Things, 2023, 24: 100982. doi: 10.1016/j.iot.2023.100982.
    [2]
    BERTONCINI C, RUDD K, NOUSAIN B, et al. Wavelet fingerprinting of radio-frequency identification (RFID) tags[J]. IEEE Transactions on Industrial Electronics, 2012, 59(12): 4843–4850. doi: 10.1109/tie.2011.2179276.
    [3]
    WANG Ge, CAI Haofan, QIAN Chen, et al. Hu-Fu: Replay-resilient RFID authentication[J]. IEEE/ACM Transactions on Networking, 2020, 28(2): 547–560. doi: 10.1109/tnet.2020.2964290.
    [4]
    ZHANG Manman, LI Peng, BAO Shanjun, et al. A secondary nondestructive detection method of liquid concentration for RFID tag array with mutual coupling[J]. IEEE Transactions on Mobile Computing, 2025, 24(9): 9202–9221. doi: 10.1109/tmc.2025.3559487.
    [5]
    徐勇军, 李晶, 骆东鑫, 等. 近场通信物理层安全技术综述[J]. 电子与信息学报, 2025, 47(11): 4129–4143. doi: 10.11999/JEIT250336.

    XU Yongjun, LI Jing, LUO Dongxin, et al. A survey on physical layer security in near-field communication[J]. Journal of Electronics & Information Technology, 2025, 47(11): 4129–4143. doi: 10.11999/JEIT250336.
    [6]
    唐晓刚, 冯俊豪, 张斌权, 等. 基于射频指纹的卫星测控地面站身份识别方法[J]. 电子与信息学报, 2023, 45(7): 2554–2560. doi: 10.11999/JEIT220804.

    TANG Xiaogang, FENG Junhao, ZHANG Binquan, et al. Satellite telemetry track and command ground station identification method based on RF fingerprint[J]. Journal of Electronics & Information Technology, 2023, 45(7): 2554–2560. doi: 10.11999/JEIT220804.
    [7]
    GRIFFIN J D and DURGIN G D. Complete link budgets for backscatter-radio and RFID systems[J]. IEEE Antennas and Propagation Magazine, 2009, 51(2): 11–25. doi: 10.1109/MAP.2009.5162013.
    [8]
    RAPPAPORT T S. Wireless Communications: Principles and Practice[M]. 2nd ed. London: Persons Education, 2010: 135–140.
    [9]
    GOLDSMITH A. Wireless Communications[M]. New York: Cambridge University Press, 2005: 175–201.
    [10]
    ORFANIDIS S J, RAMACCIA D, and TOSCANO A. Electromagnetic Waves and Antennas[M]. New Brunswick: Rutgers University, 2002: 86–107.
    [11]
    SALEEM A, ZHANG Xingqi, XU Yan, et al. A critical review on channel modeling: Implementations, challenges and applications[J]. Electronics, 2023, 12(9): 2014. doi: 10.3390/electronics12092014.
    [12]
    RASMUSSEN C E and WILLIAMS C K I. Gaussian Processes for Machine Learning[M]. Cambridge: MIT Press, 2006: 105–126.
    [13]
    XU Wenkang, XIAO Yongbo, LIU An, et al. Joint scattering environment sensing and channel estimation based on non-stationary Markov random field[J]. IEEE Transactions on Wireless Communications, 2024, 23(5): 3903–3917. doi: 10.1109/TWC.2023.3312451.
    [14]
    CANDES E J and WAKIN M B. An introduction to compressive sampling[J]. IEEE Signal Processing Magazine, 2008, 25(2): 21–30. doi: 10.1109/MSP.2007.914731.
    [15]
    DONOHO D L. Compressed sensing[J]. IEEE Transactions on Information Theory, 2006, 52(4): 1289–1306. doi: 10.1109/TIT.2006.871582.
    [16]
    杨立君, 孔文杰, 陆海涛, 等. 原子空间稀疏分解驱动的RIS辅助毫米波MIMO系统密钥生成机制[J]. 电子与信息学报, 2025, 47(4): 1066–1075. doi: 10.11999/JEIT240885.

    YANG Lijun, KONG Wenjie, LU Haitao, et al. A key generation method based on atomic norm minimization for reconfigurable intelligent surface-assisted millimeter wave MIMO communication systems[J]. Journal of Electronics & Information Technology, 2025, 47(4): 1066–1075. doi: 10.11999/JEIT240885.
    [17]
    LIANG Wei, XIE Songyou, ZHANG Dafang, et al. A mutual security authentication method for RFID-PUF circuit based on deep learning[J]. ACM Transactions on Internet Technology (TOIT), 2022, 22(2): 34. doi: 10.1145/3426968.
    [18]
    SOKOUDJOU J J F, GARCÍA-CARDARELLI P, REZOLA A, et al. Chipless RFID tag detection based on continuous wavelet transform and convolutional neural networks[J]. IEEE Transactions on Microwave Theory and Techniques, 2025, 73(9): 6260–6274. doi: 10.1109/TMTT.2025.3559537.
    [19]
    GUO Chuan, PLEISS G, SUN Yu, et al. On calibration of modern neural networks[C]. The 34th International Conference on Machine Learning, Sydney, Australia, 2017: 1321–1330.
    [20]
    MURPHY K P. Probabilistic Machine Learning: An Introduction[M]. Cambridge: MIT Press, 2022: 577–599.
    [21]
    GUILLORY D, SHANKAR V, EBRAHIMI S, et al. Predicting with confidence on unseen distributions[C]. The IEEE/CVF International Conference on Computer Vision, Montreal, Canada, 2021: 1114–1124.
    [22]
    SHARMA A, DEVARAJAN H, GOVINDARAJAN S, et al. High-confidence classification of partial discharge acoustic signals using Bayesian networks for uncertainty quantification[J]. IEEE Transactions on Instrumentation and Measurement, 2025, 74: 3506511. doi: 10.1109/TIM.2025.3529048.
    [23]
    MADRY A, MAKELOV A, SCHMIDT L, et al. Towards deep learning models resistant to adversarial attacks[C]. 6th International Conference on Learning Representations, Vancouver, Canada, 2018.
    [24]
    ZHAO Weimin, ALWIDIAN S, and MAHMOUD Q H. Adversarial training methods for deep learning: A systematic review[J]. Algorithms, 2022, 15(8): 283. doi: 10.3390/a15080283.
    [25]
    胡钰林, 喻鑫岚, 高伟, 等. 低时延工业物联网中移动边缘计算的安全性与可靠性联合优化[J]. 电子与信息学报, 2025, 47(10): 3492–3504. doi: 10.11999/JEIT250262.

    HU Yulin, YU Xinlan, GAO Wei, et al. Security and reliability-optimal offloading for mobile edge computing in low-latency industrial IoT[J]. Journal of Electronics & Information Technology, 2025, 47(10): 3492–3504. doi: 10.11999/JEIT250262.
    [26]
    WU Haifeng, PU Chongrong, GAO Wei, et al. Cognitive risk control for physical-layer RFID Counterfeit tag identification[J]. IEEE Transactions on Instrumentation and Measurement, 2023, 72: 8007115. doi: 10.1109/TIM.2023.3328075.
    [27]
    WU Haifeng, WANG Siyuan, PU Chongrong, et al. Enhancing counterfeit RFID tag classification through distance based cognitive risk control[J]. Scientific Reports, 2025, 15(1): 4150. doi: 10.1038/s41598-025-87809-8.
    [28]
    EVANS L C. An Introduction to Stochastic Differential Equations[M]. Providence: American Mathematical Society, 2013: 37–52.
    [29]
    BEN AMAR E, BEN RACHED N, TEMPONE R, et al. Stochastic differential equations for performance analysis of wireless communication systems[J]. IEEE Transactions on Wireless Communications, 2025, 24(5): 4040–4054. doi: 10.1109/TWC.2025.3536615.
    [30]
    KAY S M. Fundamentals of Statistical Signal Processing: Detection Theory[M]. Englewood Cliffs: Prentice-Hall PTR, 1998: 60–74.
    [31]
    BENVENISTE A, MÉTIVIER M, and PRIOURET P. Adaptive Algorithms and Stochastic Approximations[M]. Berlin: Springer, 1990: 6–16.
    [32]
    BARTLETT P L and MENDELSON S. Rademacher and Gaussian complexities: Risk bounds and structural results[J]. Journal of Machine Learning Research, 2002, 3: 463–482.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(12)  / Tables(6)

    Article Metrics

    Article views (92) PDF downloads(11) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return