簡易檢索 / 詳目顯示

研究生: 沈秉勳
Bing-Syun Shen
論文名稱: 基於單類別支援向量機結合集成學習之射頻指紋確認研究
Research on Integration of One-Class Support Vector Machine and Ensemble Learning for RF Fingerprint Verification
指導教授: 劉馨勤
Hsin-Chin Liu
口試委員: 查士朝
Shi-Cho Cha
鮑興國
Hsing-Kuo Pao
張立中
Li-Chung Chang
曾德峰
Der-Feng Tseng
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2023
畢業學年度: 111
語文別: 中文
論文頁數: 70
中文關鍵詞: 射頻指紋特徵無線射頻辨識物理層防偽機器學習集成學習
外文關鍵詞: RF fingerprint, RFID, physical layer anti-counterfeiting, machine learning, ensemble learning
相關次數: 點閱:254下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 無線射頻辨識(Radio Frequency Identification, RFID)技術是物理層防偽研究
    領域並在無線通訊領域引起大量關注,並廣泛應用於我們的日常生活中。為了提升用戶的資訊安全,射頻指紋(RF Fingerprint)技術應運而生。此技術提取實體層訊號的射頻指紋特徵並加以識別,可以繞過可能被仿冒或竄改的設備識別標誌,如 MAC 位址或其他軟體設置。它專注於分析無線訊號的物理特性,這些特徵因設備製造時的硬體不完美特性具有強大的防偽能力,受到物聯網和 Wi-Fi 等無線傳輸領域的研究者的青睞。尤其在物聯網應用中,如智慧家電、智慧城市、工業自動化等,以及 Wi-Fi 等 5G 甚至 6G 行動網路網絡中的安全管理和訪問控制。
    本論文針對 ISO 14443A 之 HF RFID 卡片進行研究,提出了基於單類別支援向量機(One-Class Support Vector Machine, OCSVM)作為異常偵測模型,並以研製之特規讀取機錄製不同廠牌的卡片訊號利用該模型進行合法卡和偽卡的辨識,再結合集成學習中之加權軟投票(Weighted soft voting, WSV)機制將不同特徵之辨識模型整合使其具有強大的防偽能力。本論文提出之方法對於保障 RFID 卡片的安全性和推動無線通訊技術的發展具有重要意義。


    Radio Frequency Identification (RFID) technology has garnered significant
    attention in the field of physical layer anti-counterfeiting and wireless communication. It finds widespread use in our daily lives. To enhance user information security, Radio Frequency (RF) Fingerprint technology has emerged. This technique extracts RF fingerprint features from physical layer signals and identifies them, bypassing potentially counterfeited or altered device identifiers like MAC addresses or other software settings. It focuses on analyzing the physical characteristics of wireless signals, leveraging the strong anti-counterfeiting capabilities inherent in hardware imperfections during device manufacturing. This approach is favored by researchers in wireless transmission domains such as the Internet of Things (IoT) and Wi-Fi, including applications in smart appliances, smart cities, industrial automation, as well as security management and access control in Wi-Fi, 5G, and even 6G mobile networks.
    In this paper, we concentrate on ISO 14443A HF RFID cards. We propose employing the One-Class Support Vector Machine (OCSVM) as an anomaly detection model. The model is trained using recorded signals from cards of different brands captured by a custom reader. It discerns legitimate cards from counterfeit ones. Further, we enhance its anti-counterfeiting prowess by integrating various feature-specific recognition models using the Weighted Soft Voting (WSV) mechanism from ensemble learning. Our approach holds significance in safeguarding the security of RFID cards and propelling wireless communication technology.

    第一章 緒論 1.1 研究動機 1.2 論文貢獻 1.3 章節概要 第二章 文獻回顧與背景介紹 2.1 ISO 14443A 標準規範與程式環境 2.1.1 HF RFID 硬體介紹 2.1.2 ISO 14443A 介紹 2.1.3 讀取機模擬程式與環境 2.1.4 ATQA 訊號介紹 2.2 射頻指紋特徵提取與物理特性 2.2.1 ATQA 統計性質特徵提取與介紹 2.2.2 ATQA 波形特徵提取與介紹 2.2.3 ATQA 正規化功率頻譜密度特徵提取與介紹 2.2.4其餘系統於射頻指紋特徵相關文獻介紹 2.3 辨識演算法 2.3.1 單類別支援向量機(One-Class Support Vector Machine, OCSVM) 2.3.2 集成學習(Ensemble learning)與加權軟投票 第三章 特規讀卡機之設計 3.1 前端即時特徵提取系統建置 3.1.1 模擬讀取機與接收訊號模型架構 3.1.2 ATQA 即時訊號同步 3.1.3 Socket 架構 3.2 後端模型辨識系統建置 3.2.1 訓練資料集錄製 3.2.2 ATQA 訊號特徵提取 3.2.3 後端辨識演算法 第四章 實驗結果與分析 4.1 實驗環境與前端系統 4.2 後端模型辨識系統與演算法整合 4.2.1 MV 實驗結果 4.2.2 採用 WSV 實驗結果 4.3 結果比較 第五章 結論與未來研究方向

    [1] 黃昱宸, "具射頻指紋認證機制之高頻射頻辨識讀卡機研究," 碩士論文,
    電機工程系, 國立臺灣科技大學, 2022. [Online]. Available:
    https://hdl.handle.net/11296/6wv2j8
    [2] K. Finkenzeller, RFID handbook: fundamentals and applications in
    contactless smart cards, radio frequency identification and near-field
    communication. John wiley & sons, 2010.
    [3] 陳信豪, "ISO 14443 Type A 標籤模擬器研製," 碩士論文, 電機工程系,
    國立臺灣科技大學, 2017. [Online]. Available:
    https://hdl.handle.net/11296/g47dng
    [4] "International standard ISO/IEC 14443 -1, -2, -3, International
    Standardization Organization,April 2003."
    [5] M. F. Bari, P. Agrawal, B. Chatterjee, and S. J. a. p. a. Sen, "Statistical
    Analysis Based Feature Selection Enhanced RF-PUF with> 99.8%
    Accuracy on Unmodified Commodity Transmitters for IoT Physical
    Security," arXiv preprint arXiv:.05684, 2022.
    [6] Q. Xu, R. Zheng, W. Saad, Z. J. I. C. S. Han, and Tutorials, "Device
    fingerprinting in wireless networks: Challenges and opportunities," IEEE
    Communications Surveys Tutorials, vol. 18, no. 1, pp. 94-104, 2015.
    [7] H. P. Romero, K. A. Remley, D. F. Williams, and C.-M. Wang,
    "Electromagnetic measurements for counterfeit detection of radio frequency
    identification cards," IEEE Transactions on Microwave Theory Techniques,
    vol. 57, no. 5, pp. 1383-1387, 2009.
    [8] H. P. Romero, K. A. Remley, D. F. Williams, C.-M. Wang, and T. X. Brown,
    "Identifying RF identification cards from measurements of resonance and
    carrier harmonics," IEEE Transactions on Microwave Theory Techniques,
    vol. 58, no. 7, pp. 1758-1765, 2010.
    [9] B. Danev, S. Capkun, R. Jayaram Masti, and T. S. Benjamin, "Towards
    practical identification of HF RFID devices," ACM transactions on
    Information System Security, vol. 15, no. 2, pp. 1-24, 2012.
    [10] G. Zhang, L. Xia, S. Jia, and Y. Ji, "Physical-layer identification of HF
    RFID cards based on RF fingerprinting," in Information Security Practice
    and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie,
    China, November 16-18, 2016, Proceedings 12, 2016: Springer.
    [11] W. Lee, S. Y. Baek, and S. H. Kim, "Deep-Learning-Aided RF
    Fingerprinting for NFC Security," IEEE Communications Magazine, vol.
    59, no. 5, pp. 96-101, 2021.
    56
    [12] G. Zhang, L. Xia, S. Jia, and Y. Ji, "Identification of cloned HF RFID
    proximity cards based on RF fingerprinting," in 2016 IEEE
    Trustcom/BigDataSE/ISPA, 2016: IEEE, pp. 292-300.
    [13] Y. Shi and M. A. Jensen, "Improved radiometric identification of wireless
    devices using MIMO transmission," IEEE Transactions on Information
    Forensics and Security, vol. 6, no. 4, pp. 1346-1354, 2011.
    [14] N. Soltanieh, Y. Norouzi, Y. Yang, and N. C. Karmakar, "A review of radio
    frequency fingerprinting techniques," IEEE Journal of Radio Frequency
    Identification, vol. 4, no. 3, pp. 222-233, 2020.
    [15] Y. Lin, L. Chen, and G. Zhang, "Power Spectrum Based Wi-Fi RF
    Fingerprint Extraction Method," in 2021 13th International Conference on
    Measuring Technology and Mechatronics Automation (ICMTMA), 2021:
    IEEE, pp. 105-109.
    [16] G. Shen, J. Zhang, A. Marshall, and J. R. Cavallaro, "Towards scalable and
    channel-robust radio frequency fingerprint identification for LoRa," IEEE
    Transactions on Information Forensics and Security, vol. 17, pp. 774-787,
    2022.
    [17] V. Vapnik, The nature of statistical learning theory. Springer science &
    business media, 1999.
    [18] S. Huang, N. Cai, P. P. Pacheco, S. Narrandes, Y. Wang, and W. Xu,
    "Applications of support vector machine (SVM) learning in cancer
    genomics," Cancer genomics & proteomics, vol. 15, no. 1, pp. 41-51, 2018.
    [19] P. Tao, Z. Sun, and Z. Sun, "An improved intrusion detection algorithm
    based on GA and SVM," Ieee Access, vol. 6, pp. 13624-13631, 2018.
    [20] V. K. Chauhan, K. Dahiya, and A. Sharma, "Problem formulations and
    solvers in linear SVM: a review," Artificial Intelligence Review, vol. 52, no.
    2, pp. 803-855, 2019.
    [21] M. Aljanabi, M. H. Qutqut, and M. Hijjawi, "Machine learning
    classification techniques for heart disease prediction: a review,"
    International Journal of Engineering & Technology, vol. 7, no. 4, pp. 5373-
    5379, 2018.
    [22] N. Caballé-Cervigón, J. L. Castillo-Sequera, J. A. Gómez-Pulido, J. M.
    Gómez-Pulido, and M. L. Polo-Luque, "Machine learning applied to
    diagnosis of human diseases: A systematic review," Applied Sciences, vol.
    10, no. 15, p. 5135, 2020.
    [23] Q.-Q. Tao, S. Zhan, X.-H. Li, and T. Kurihara, "Robust face detection using
    local CNN and SVM based on kernel combination," Neurocomputing, vol.
    211, pp. 98-105, 2016.
    57
    [24] S. Kumar, S. Singh, and J. Kumar, "Multiple face detection using hybrid
    features with SVM classifier," in Data and Communication Networks:
    Proceedings of GUCON 2018, 2019: Springer, pp. 253-265.
    [25] H. Li, "Text recognition and classification of english teaching content based
    on SVM," Journal of Intelligent & Fuzzy Systems, vol. 39, no. 2, pp. 1757-
    1767, 2020. [Online]. Available:
    https://content.iospress.com/articles/journal-of-intelligent-and-fuzzysystems/ifs179949.
    [26] L. M. Francis and N. Sreenath, "TEDLESS–Text detection using leastsquare SVM from natural scene," Journal of King Saud UniversityComputer and Information Sciences, vol. 32, no. 3, pp. 287-299, 2020.
    [27] S. Alla and S. K. Adari, Beginning anomaly detection using python-based
    deep learning. Springer, 2019.
    [28] H. Lukashevich, S. Nowak, and P. Dunker, "Using one-class SVM outliers
    detection for verification of collaboratively tagged image training sets," in
    2009 IEEE International Conference on Multimedia and Expo, 2009: IEEE,
    pp. 682-685.
    [29] Y. Li, T. Zhang, Y. Y. Ma, and C. Zhou, "Anomaly detection of user
    behavior for database security audit based on ocsvm," in 2016 3rd
    International Conference on Information Science and Control Engineering
    (ICISCE), 2016: IEEE, pp. 214-219.
    [30] E. H. Budiarto, A. E. Permanasari, and S. Fauziati, "Unsupervised anomaly
    detection using K-means, local outlier factor and one class SVM," in 2019
    5th international conference on science and technology (ICST), 2019, vol.
    1: IEEE, pp. 1-5.
    [31] O. Sagi, L. J. W. I. R. D. M. Rokach, and K. Discovery, "Ensemble
    learning: A survey," Wiley Interdisciplinary Reviews: Data Mining
    Knowledge Discovery, vol. 8, no. 4, p. e1249, 2018.
    [32] X. Dong, Z. Yu, W. Cao, Y. Shi, and Q. J. F. o. C. S. Ma, "A survey on
    ensemble learning," Frontiers of Computer Science, vol. 14, no. 2, pp. 241-
    258, 2020.
    [33] F. Schwenker, "Ensemble methods: Foundations and algorithms [book
    review]," IEEE Computational Intelligence Magazine, vol. 8, no. 1, pp. 77-
    79, 2013.
    [34] A. El Mekki, A. Alami, H. Alami, A. Khoumsi, and I. Berrada, "Weighted
    combination of BERT and N-GRAM features for Nuanced Arabic Dialect
    Identification," in Proceedings of the Fifth Arabic Natural Language
    Processing Workshop, 2020, pp. 268-274.
    58
    [35] A. Taha, "Intelligent ensemble learning approach for phishing website
    detection based on weighted soft voting," Mathematics, vol. 9, no. 21, p.
    2799, 2021.
    [36] L. I. Kuncheva and J. J. Rodríguez, "A weighted voting framework for
    classifiers ensembles," Knowledge and information systems, vol. 38, pp.
    259-275, 2014.
    [37] R. N. D. Ranasinghe and G. Z. Yu, "RFID/NFC device with embedded
    fingerprint authentication system," in 2017 8th IEEE International
    Conference on Software Engineering and Service Science (ICSESS), 2017:
    IEEE, pp. 266-269.
    [38] Y. Xiao, H. Wang, and W. Xu, "Parameter selection of Gaussian kernel for
    one-class SVM," IEEE transactions on cybernetics, vol. 45, no. 5, pp. 941-
    953, 2014.
    [39] Y. Sai, R. Jinxia, and L. Zhongxia, "Learning of neural networks based on
    weighted mean squares error function," in 2009 Second International
    Symposium on Computational Intelligence and Design, 2009, vol. 1: IEEE,
    pp. 241-244.
    [40] 楊舒合, "基於 CNN 演算法之數位身份證射頻指紋認證研究," 碩士論
    文, 電機工程系, 國立臺灣科技大學, 2022. [Online]. Available:
    https://hdl.handle.net/11296/89s6b3

    無法下載圖示 全文公開日期 2028/08/29 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 2028/08/29 (國家圖書館:臺灣博碩士論文系統)
    QR CODE