{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:02:49Z","timestamp":1760709769005,"version":"3.41.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T00:00:00Z","timestamp":1543363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2018,11,30]]},"abstract":"<jats:p>Chipless Radio Frequency Identification (RFID) tags that do not include an integrated circuit (IC) in the transponder are more appropriate for supply-chain management of low-cost commodities and have been gaining extensive attention due to their relatively lower price. However, existing chipless RFID tags consume considerable tag area and manufacturing time\/cost because of complex fabrication process (e.g., requiring removing or shorting some resonators on the tag substrate to encode data). Worse still, their identifiers (IDs) are deterministic, clonable, and small in terms of bitwidth. To address these shortcomings and help preserve the cold chain for commodities (e.g., vaccines, pharmaceuticals, etc.) sensitive to temperature, we develop a novel unclonable environmentally sensitive chipless RFID (UCR) tag that intrinsically generates a unique ID from both manufacturing variations and ambient temperature variation. A UCR tag consists of two parts: (i) a certain number of concentric ring slot resonators integrated on a certain laminate (e.g., TACONIC TLX-0), whose resonance frequencies rely on geometric parameters of slot resonators and dielectric constant of substrate material that are sensitive to manufacturing variations, and (ii) a stand-alone circular ring slot resonator integrated on a particular substrate (e.g., grease) that will be melted at a high temperature, whose resonance frequency relies on geometric parameters of slot resonator, dielectric constant of substrate material, and ambient temperature. UCR tags have the capability to track commodities and their temperatures in the supply chain. The area of UCR tag is comparable to regular quick response (QR) code. Experimental results based on UCR tag prototypes have verified their uniqueness and reliability.<\/jats:p>","DOI":"10.1145\/3264658","type":"journal-article","created":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T19:16:01Z","timestamp":1543432561000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["UCR"],"prefix":"10.1145","volume":"23","author":[{"given":"Kun","family":"Yang","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL"}]},{"given":"Ulbert","family":"Botero","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL"}]},{"given":"Haoting","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL"}]},{"given":"Damon L.","family":"Woodard","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL"}]},{"given":"Mark M.","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL"}]}],"member":"320","published-online":{"date-parts":[[2018,11,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfoodeng.2007.02.049"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2009.07.001"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2011.6127344"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1364\/OL.39.003074"},{"key":"e_1_2_1_5_1","volume-title":"Cargo theft numbers down","author":"Cole Matt","year":"2015","unstructured":"Matt Cole . 2016. Cargo theft numbers down in 2015 , FreightWatch reports. Retrieved from http:\/\/www.overdriveonline.com\/cargo-theft-numbers-down-in-2015-freightwatch-reports\/. Matt Cole. 2016. Cargo theft numbers down in 2015, FreightWatch reports. Retrieved from http:\/\/www.overdriveonline.com\/cargo-theft-numbers-down-in-2015-freightwatch-reports\/."},{"key":"e_1_2_1_6_1","volume-title":"ICE HSI Report &dollar;1.2 Billion in Counterfeit Seizures","author":"Customs U.S.","year":"2014","unstructured":"U.S. Customs and Border Protection . 2015. CBP , ICE HSI Report &dollar;1.2 Billion in Counterfeit Seizures in 2014 . Retrieved from https:\/\/www.cbp.gov\/newsroom\/national-media-release\/cbp-ice-hsi-report-12-billion-counterfeit-seizures-2014. U.S. Customs and Border Protection. 2015. CBP, ICE HSI Report &dollar;1.2 Billion in Counterfeit Seizures in 2014. Retrieved from https:\/\/www.cbp.gov\/newsroom\/national-media-release\/cbp-ice-hsi-report-12-billion-counterfeit-seizures-2014."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519377"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_26"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2012.2213838"},{"volume-title":"Proceedings of the 2007 IEEE International Conference on RFID. IEEE, 23--29","author":"Ha Dong Sam","key":"e_1_2_1_10_1","unstructured":"Dong Sam Ha and Patrick R. Schaumont . 2007. Replacing cryptography with ultra wideband (UWB) modulation in secure RFID . In Proceedings of the 2007 IEEE International Conference on RFID. IEEE, 23--29 . Dong Sam Ha and Patrick R. Schaumont. 2007. Replacing cryptography with ultra wideband (UWB) modulation in secure RFID. In Proceedings of the 2007 IEEE International Conference on RFID. IEEE, 23--29."},{"key":"e_1_2_1_11_1","first-page":"726","article-title":"Optically readable two-dimensional code and method and apparatus using the same. (March 10 1998)","volume":"5","author":"Hara Masahiro","year":"1998","unstructured":"Masahiro Hara , Motoaki Watabe , Tadao Nojiri , Takayuki Nagaya , and Yuji Uchiyama . 1998 . Optically readable two-dimensional code and method and apparatus using the same. (March 10 1998) . US Patent 5 , 726 ,435. Masahiro Hara, Motoaki Watabe, Tadao Nojiri, Takayuki Nagaya, and Yuji Uchiyama. 1998. Optically readable two-dimensional code and method and apparatus using the same. (March 10 1998). US Patent 5,726,435.","journal-title":"US Patent"},{"volume-title":"Proceedings of the 2006 IEEE Ultrasonics Symposium. 2389--2392","author":"H\u00e4rm\u00e4 S.","key":"e_1_2_1_12_1","unstructured":"S. H\u00e4rm\u00e4 , V. P. Plessky , C. S. Hartmann , and W. Steichen . 2006. SAW RFID tag with reduced size . In Proceedings of the 2006 IEEE Ultrasonics Symposium. 2389--2392 . S. H\u00e4rm\u00e4, V. P. Plessky, C. S. Hartmann, and W. Steichen. 2006. SAW RFID tag with reduced size. In Proceedings of the 2006 IEEE Ultrasonics Symposium. 2389--2392."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ULTSYM.2002.1193354"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the International Workshop on Selected Areas in Cryptography. Springer, 401--413","author":"Hein Daniel","year":"2008","unstructured":"Daniel Hein , Johannes Wolkerstorfer , and Norbert Felber . 2008 . ECC is ready for RFID--A proof in silicon . In Proceedings of the International Workshop on Selected Areas in Cryptography. Springer, 401--413 . Daniel Hein, Johannes Wolkerstorfer, and Norbert Felber. 2008. ECC is ready for RFID--A proof in silicon. In Proceedings of the International Workshop on Selected Areas in Cryptography. Springer, 401--413."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2012.2195021"},{"volume-title":"Modern Multivariate Statistical Techniques","author":"Izenman Alan Julian","key":"e_1_2_1_17_1","unstructured":"Alan Julian Izenman . 2013. Linear discriminant analysis . In Modern Multivariate Statistical Techniques . Springer , 237--280. Alan Julian Izenman. 2013. Linear discriminant analysis. In Modern Multivariate Statistical Techniques. Springer, 237--280."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2009.2017323"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 2009 European Microwave Conference (EuMC","author":"Preradovic Stevan","year":"2009","unstructured":"Stevan Preradovic and Nemai C. Karmakar . 2009. Design of fully printable planar chipless RFID transponder with 35-bit data capacity . In Proceedings of the 2009 European Microwave Conference (EuMC 2009 ). IEEE, 013--016. Stevan Preradovic and Nemai C. Karmakar. 2009. Design of fully printable planar chipless RFID transponder with 35-bit data capacity. In Proceedings of the 2009 European Microwave Conference (EuMC 2009). IEEE, 013--016."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMM.2010.938571"},{"volume-title":"Chipless RFID tag","author":"Preradovic Stevan","key":"e_1_2_1_22_1","unstructured":"Stevan Preradovic and Nemai Chandra Karmakar . 2012. Chipless RFID tag . In Multiresonator-Based Chipless RFID. Springer , 77--94. Stevan Preradovic and Nemai Chandra Karmakar. 2012. Chipless RFID tag. In Multiresonator-Based Chipless RFID. Springer, 77--94."},{"key":"e_1_2_1_23_1","unstructured":"Associated Press. 2016. China arrests 135 for illegally buying selling vaccines. Retrieved from http:\/\/www.sandiegouniontribune.com\/sdut-china-arrests-135-for-illegally-buying-selling-2016may20-story.html.  Associated Press. 2016. China arrests 135 for illegally buying selling vaccines. Retrieved from http:\/\/www.sandiegouniontribune.com\/sdut-china-arrests-135-for-illegally-buying-selling-2016may20-story.html."},{"key":"e_1_2_1_24_1","unstructured":"Austin Ramzy. 2016. China Says It Found Ring Said to Sell Improperly Stored Vaccines. Retrieved from https:\/\/www.nytimes.com\/2016\/03\/22\/world\/asia\/china-vaccine-sales.html.  Austin Ramzy. 2016. China Says It Found Ring Said to Sell Improperly Stored Vaccines. Retrieved from https:\/\/www.nytimes.com\/2016\/03\/22\/world\/asia\/china-vaccine-sales.html."},{"volume-title":"Introduction to Hardware Security and Trust","author":"R\u00fchrmair Ulrich","key":"e_1_2_1_25_1","unstructured":"Ulrich R\u00fchrmair , Srinivas Devadas , and Farinaz Koushanfar . 2012. Security based on physical unclonability and disorder . In Introduction to Hardware Security and Trust . Springer , 65--102. Ulrich R\u00fchrmair, Srinivas Devadas, and Farinaz Koushanfar. 2012. Security based on physical unclonability and disorder. In Introduction to Hardware Security and Trust. Springer, 65--102."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.364276"},{"key":"e_1_2_1_27_1","volume-title":"A tutorial on principal component analysis. arXiv Preprint arXiv:1404.1100","author":"Shlens Jonathon","year":"2014","unstructured":"Jonathon Shlens . 2014. A tutorial on principal component analysis. arXiv Preprint arXiv:1404.1100 ( 2014 ). Jonathon Shlens. 2014. A tutorial on principal component analysis. arXiv Preprint arXiv:1404.1100 (2014)."},{"key":"e_1_2_1_28_1","volume-title":"Batista","author":"Silva Diego F.","year":"2016","unstructured":"Diego F. Silva and Gustavo E. A. P. A. Batista . 2016 . Speeding up all-pairwise dynamic time warping matrix calculation. In Proceedings of the 2016 SIAM International Conference on Data Mining. SIAM , 837--845. Diego F. Silva and Gustavo E. A. P. A. Batista. 2016. Speeding up all-pairwise dynamic time warping matrix calculation. In Proceedings of the 2016 SIAM International Conference on Data Mining. SIAM, 837--845."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSYM.2012.6258420"},{"volume-title":"21st Century Management: A Reference Handbook","author":"Wankel Charles","key":"e_1_2_1_30_1","unstructured":"Charles Wankel . 2007. 21st Century Management: A Reference Handbook . Sage Publications . Charles Wankel. 2007. 21st Century Management: A Reference Handbook. Sage Publications."},{"key":"e_1_2_1_31_1","volume-title":"Weber and Romana Weber","author":"Rolf","year":"2010","unstructured":"Rolf H. Weber and Romana Weber . 2010 . Internet of Things. Vol. 12 . Springer . Rolf H. Weber and Romana Weber. 2010. Internet of Things. Vol. 12. Springer."},{"key":"e_1_2_1_32_1","first-page":"612","article-title":"Classifying apparatus and method. (Oct. 7 1952)","volume":"2","author":"Woodland Norman J.","year":"1952","unstructured":"Norman J. Woodland and Silver Bernard . 1952 . Classifying apparatus and method. (Oct. 7 1952) . US Patent 2 , 612 ,994. Norman J. Woodland and Silver Bernard. 1952. Classifying apparatus and method. (Oct. 7 1952). US Patent 2,612,994.","journal-title":"US Patent"},{"volume-title":"Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD\u201915)","author":"Yang Kun","key":"e_1_2_1_33_1","unstructured":"Kun Yang , Domenic Forte , and Mark M. Tehranipoor . 2015. Protecting endpoint devices in IoT supply chain . In Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD\u201915) . IEEE, 351--356. Kun Yang, Domenic Forte, and Mark M. Tehranipoor. 2015. Protecting endpoint devices in IoT supply chain. In Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD\u201915). IEEE, 351--356."},{"volume-title":"Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST\u201916)","author":"Yang Kun","key":"e_1_2_1_34_1","unstructured":"Kun Yang , Domenic Forte , and Mark M. Tehranipoor . 2016. UCR: An unclonable chipless RFID tag . In Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST\u201916) . IEEE, 7--12. Kun Yang, Domenic Forte, and Mark M. Tehranipoor. 2016. UCR: An unclonable chipless RFID tag. In Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST\u201916). IEEE, 7--12."}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:54Z","timestamp":1750212654000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264658"}},"subtitle":["An Unclonable Environmentally Sensitive Chipless RFID Tag For Protecting Supply Chain"],"short-title":[],"issued":{"date-parts":[[2018,11,28]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,11,30]]}},"alternative-id":["10.1145\/3264658"],"URL":"https:\/\/doi.org\/10.1145\/3264658","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"type":"print","value":"1084-4309"},{"type":"electronic","value":"1557-7309"}],"subject":[],"published":{"date-parts":[[2018,11,28]]},"assertion":[{"value":"2017-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}