{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T19:07:04Z","timestamp":1772305624575,"version":"3.50.1"},"reference-count":41,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["18-CE39-0002"],"award-info":[{"award-number":["18-CE39-0002"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In this study, we present the implementation of a neural network model capable of classifying radio frequency identification (RFID) tags based on their electromagnetic (EM) signature for authentication applications. One important application of the chipless RFID addresses the counterfeiting threat for manufacturers. The goal is to design and implement chipless RFID tags that possess a unique and unclonable fingerprint to authenticate objects. As EM characteristics are employed, these fingerprints cannot be easily spoofed. A set of 18 tags operating in V band (65\u201372 GHz) was designed and measured. V band is more sensitive to dimensional variations compared to other applications at lower frequencies, thus it is suitable to highlight the differences between the EM signatures. Machine learning (ML) approaches are used to characterize and classify the 18 EM responses in order to validate the authentication method. The proposed supervised method reached a maximum recognition rate of 100%, surpassing in terms of accuracy most of RFID fingerprinting related work. To determine the best network configuration, we used a random search algorithm. Further tuning was conducted by comparing the results of different learning algorithms in terms of accuracy and loss.<\/jats:p>","DOI":"10.3390\/s20216385","type":"journal-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T14:10:41Z","timestamp":1605017441000},"page":"6385","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A New Method of Secure Authentication Based on Electromagnetic Signatures of Chipless RFID Tags and Machine Learning Approaches"],"prefix":"10.3390","volume":"20","author":[{"given":"Drago\u0219","family":"Nastasiu","sequence":"first","affiliation":[{"name":"Military Technical Academy, Department of Communications and Military Electronic Systems, 050141 Bucharest, Romania"}]},{"given":"R\u0103zvan","family":"Scripcaru","sequence":"additional","affiliation":[{"name":"Military Technical Academy, Department of Communications and Military Electronic Systems, 050141 Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1561-3286","authenticated-orcid":false,"given":"Angela","family":"Digulescu","sequence":"additional","affiliation":[{"name":"Military Technical Academy, Department of Communications and Military Electronic Systems, 050141 Bucharest, Romania"},{"name":"Gipsa-lab, Universit\u00e9 Grenoble Alpes, 38402 Grenoble, France"}]},{"given":"Cornel","family":"Ioana","sequence":"additional","affiliation":[{"name":"Gipsa-lab, Universit\u00e9 Grenoble Alpes, 38402 Grenoble, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4428-352X","authenticated-orcid":false,"suffix":"Jr.","given":"Raymundo","family":"De Amorim","sequence":"additional","affiliation":[{"name":"Grenoble INP, LCIS, Universit\u00e9 Grenoble Alpes, 26902 Valence, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6355-9109","authenticated-orcid":false,"given":"Nicolas","family":"Barbot","sequence":"additional","affiliation":[{"name":"Grenoble INP, LCIS, Universit\u00e9 Grenoble Alpes, 26902 Valence, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6725-4273","authenticated-orcid":false,"given":"Romain","family":"Siragusa","sequence":"additional","affiliation":[{"name":"Grenoble INP, LCIS, Universit\u00e9 Grenoble Alpes, 26902 Valence, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2671-8366","authenticated-orcid":false,"given":"Etienne","family":"Perret","sequence":"additional","affiliation":[{"name":"Grenoble INP, LCIS, Universit\u00e9 Grenoble Alpes, 26902 Valence, France"}]},{"given":"Florin","family":"Popescu","sequence":"additional","affiliation":[{"name":"Military Technical Academy, Department of Communications and Military Electronic Systems, 050141 Bucharest, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"ref_1","unstructured":"Jechlitschek, C. (2020, November 08). A Survey Paper on Radio Frequency Identification (RFID) Trends. Available online: https:\/\/www.researchgate.net\/publication\/228573858_A_survey_paper_on_Radio_Frequency_Identification_RFID_trends."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Al-Ali, A.R., Aloul, F.A., Aji, N.R., Al-Zarouni, A.A., and Fakhro, N.H. (2008, January 7\u201311). Mobile RFID Tracking System. Proceedings of the 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, Syria.","DOI":"10.1109\/ICTTA.2008.4530117"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Al-Zewairi, M., Alqatawna, J., and Al-Kadi, O. (2011, January 6\u20138). Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database. Proceedings of the 2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), Amman, Jordan.","DOI":"10.1109\/AEECT.2011.6132520"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"71","DOI":"10.4067\/S0718-18762008000100007","article-title":"Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges","volume":"3","author":"Sabbaghi","year":"2008","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"ref_5","unstructured":"Power, G. (2008). Anti-Counterfeit Technologies for the Protection of Medicines, World Health Organization."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.bushor.2012.11.010","article-title":"Technology designed to combat fakes in the global supply chain","volume":"56","author":"Li","year":"2013","journal-title":"Bus. Horiz."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/TDSC.2010.56","article-title":"Fingerprinting RFID Tags","volume":"8","author":"Periaswamy","year":"2010","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"4843","DOI":"10.1109\/TIE.2011.2179276","article-title":"Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags","volume":"59","author":"Bertoncini","year":"2011","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_9","first-page":"301","article-title":"On the physical robustness of RF on-chip nanostructured security","volume":"19","author":"Kheir","year":"2014","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yang, L., Peng, P., Dang, F., Wang, C., Li, X.Y., and Liu, Y. (May, January 26). Anti-counterfeiting via federated RFID tags\u2019 fingerprints and geometric relationships. Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong.","DOI":"10.1109\/INFOCOM.2015.7218580"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1109\/TMTT.2009.2017318","article-title":"Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards","volume":"57","author":"Romero","year":"2009","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_12","unstructured":"Danev, B., Heydt-Benjamin, T.S., and Capkun, S. (2009, January 10\u201314). Physical-layer Identification of RFID Devices. Proceedings of the 8th Conference USENIX Security Symposia, Montreal, QC, Canada."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Danev, B., Capkun, S., Masti, R.J., and Benjamin, T.S. (2012). Towards Practical Identification of HF RFID Devices, ACM Transactions on Information and System Security (TISSEC).","DOI":"10.1145\/2240276.2240278"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1758","DOI":"10.1109\/TMTT.2010.2049773","article-title":"Identifying RF Identification Cards from Measurements of Resonance and Carrier Harmonics","volume":"58","author":"Romero","year":"2010","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, G., Xia, L., Jia, S., and Ji, Y. (2016, January 23\u201326). Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting. Proceedings of the IEEE Trustcom\/BigDataSE\/ISPA, Tianjin, China.","DOI":"10.1109\/TrustCom.2016.0076"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Perret, E. (2014). Radio Frequency Identification and Sensors: From RFID to Chipless RFID, John Wiley & Sons.","DOI":"10.1002\/9781119054016"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2315","DOI":"10.1109\/TMTT.2016.2562625","article-title":"Toward RCS Magnitude Level Coding for Chipless RFID","volume":"64","author":"Rance","year":"2016","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Vena, A., Perret, E., and Tedjini, S. (2011, January 5\u201310). RFID chipless tag based on multiple phase shifters. Proceedings of the 2011 IEEE MTT-S International Microwave Symposium, Baltimore, MD, USA.","DOI":"10.1109\/MWSYM.2011.5972712"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2982","DOI":"10.1109\/TMTT.2013.2267748","article-title":"A Depolarizing Chipless RFID Tag for Robust Detection and Its FCC Compliant UWB Reading System","volume":"61","author":"Vena","year":"2013","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_20","unstructured":"De Amorim, R., Fontgalland, G., and Rodrigues, R.A.A. (2018, January 8\u201313). Low cost folded chipless tag for millimeter-wave applications. Proceedings of the 2018 IEEE International Symposium on Antennas and Propagation USNC\/URSI National Radio Science Meeting, Boston, MA, USA."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"313","DOI":"10.2528\/PIER11033005","article-title":"Time-Domain Measurement of Time-Coded UWB Chipless RFID Tags","volume":"116","author":"Ramos","year":"2011","journal-title":"Prog. Electromagn. Res."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"4298","DOI":"10.1109\/TMTT.2016.2613049","article-title":"Folded Multilayer C-Sections with Large Group Delay Swing for Passive Chipless RFID Applications","volume":"64","author":"Nair","year":"2016","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Jalaly, I., and Robertson, I.D. (2005, January 4\u20136). Capacitively-tuned split microstrip resonators for RFID barcodes. Proceedings of the European Microwave Conference, Paris, France.","DOI":"10.1109\/EUMC.2005.1610138"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ali, Z., Barbot, N., Siragusa, R., Hely, D., Bernier, M., Garet, F., and Perret, E. (2018, January 10\u201315). Chipless RFID Tag Discrimination and the Performance of Resemblance Metrics to be used for it. Proceedings of the 2018 IEEE\/MTT-S International Microwave Symposium\u2014IMS, Philadelphia, PA, USA.","DOI":"10.1109\/MWSYM.2018.8439855"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1504\/IJESDF.2008.020946","article-title":"Radio Frequency Fingerprinting Commercial Communication Devices to Enhance Electronic Security","volume":"1","author":"II","year":"2008","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"ref_26","unstructured":"Gerdes, R.M., Daniels, T.E., Mina, M., and Russell, S. (2006, January 2\u20133). Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. Proceedings of the NDSS, San Diego, CA, USA."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1049\/iet-ipr.2018.5466","article-title":"Robust fingerprint classification with Bayesian convolutional networks","volume":"13","author":"Zia","year":"2019","journal-title":"IET Image Process."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3264658","article-title":"UCR: An Unclonable Environmentally Sensitive Chipless RFID Tag for Protecting Supply Chain","volume":"23","author":"Yang","year":"2018","journal-title":"ACM Trans. Des. Autom. Electr. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"169","DOI":"10.3233\/AIC-170729","article-title":"Linear discriminant analysis: A detailed tutorial","volume":"30","author":"Tharwat","year":"2017","journal-title":"AI Commun."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Silva, D.F., and Batista, G. (2016, January 5\u20137). Speeding up all-pairwise dynamic time warping matrix calculation. Proceedings of the 2016 SIAM International Conference on Data Mining, Miami, FL, USA.","DOI":"10.1137\/1.9781611974348.94"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.phycom.2009.07.001","article-title":"Emerging applications of wavelets: A review","volume":"3","author":"Akansu","year":"2010","journal-title":"Phys. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/2.485891","article-title":"Artificial neural networks: A tutorial","volume":"29","author":"Jain","year":"1996","journal-title":"Computer"},{"key":"ref_33","unstructured":"Dursun, D., and Ramesh, S. (2008). Artificial Neural Networks in Decision Support Systems. Handbook on Decision Support Systems 1, Springer."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3867","DOI":"10.1109\/TMTT.2019.2914102","article-title":"Detection of Natural Randomness by Chipless RFID Approach and Its Application to Authentication","volume":"67","author":"Ali","year":"2019","journal-title":"IEEE Trans. Microw. Theory Tech."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Reed, R.D., and Marks, R.J. (1998). Neural Smithing: Supervised Learning in Feedforward Artificial Neural Networks, MIT Press.","DOI":"10.7551\/mitpress\/4937.001.0001"},{"key":"ref_36","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ketkar, N. (2017). Introduction to Keras. Deep Learning with Python, Manning Publications Country.","DOI":"10.1007\/978-1-4842-2766-4"},{"key":"ref_38","unstructured":"Le Guennec, A., Malinowski, S., and Tavenard, R. (2016, January 19\u201323). Data Augmentation for Time Series Classification using Convolutional Neural Networks. Proceedings of the ECML\/PKDD Workshop on Advanced Analytics and Learning on Temporal Data, Riva Del Garda, Italy."},{"key":"ref_39","first-page":"281","article-title":"Random Search for Hyper-Parameter Optimization","volume":"13","author":"Bergstra","year":"2012","journal-title":"J. Mach. Learn. Res."},{"key":"ref_40","unstructured":"Kingma, D., and Ba, J. (2014, January 14\u201316). Adam: A Method for Stochastic Optimization. Proceedings of the International Conference on Learning Representations, Banff, AB, Canada."},{"key":"ref_41","unstructured":"Kohavi, R. (1995, January 20\u201325). A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection. Proceedings of the 14th International Joint Conference on Artificial Intelligence, Montreal, QC, Canada."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6385\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:31:05Z","timestamp":1760178665000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/21\/6385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":41,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["s20216385"],"URL":"https:\/\/doi.org\/10.3390\/s20216385","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,9]]}}}