Next Article in Journal
GBH-YOLOv5: Ghost Convolution with BottleneckCSP and Tiny Target Prediction Head Incorporating YOLOv5 for PV Panel Defect Detection
Next Article in Special Issue
Joint Optimization of Trajectory and Discrete Reflection Coefficients for UAV-Aided Backscatter Communication System with NOMA
Previous Article in Journal
A Federated Learning Framework against Data Poisoning Attacks on the Basis of the Genetic Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Deep-Learning-Aided RF Fingerprinting for NFC Relay Attack Detection

School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(3), 559; https://doi.org/10.3390/electronics12030559
Submission received: 20 December 2022 / Revised: 19 January 2023 / Accepted: 20 January 2023 / Published: 21 January 2023

Abstract

:
Near field communication (NFC) has been a widely used radiofrequency identification (RFID) technology, credited to its convenience and security features. However, the transmitted signals can be easily eavesdropped or relayed in an open wireless channel. One of the challenges is relay attack, where an attacker simply relays the signal and bypasses encryption or other means in the application layer. Prior works on relay attack countermeasures have focused on distance-bounding protocols or ambient-based solutions. This paper focuses on ISO/IEC 14443-A and proposes an NFC relay detection method based on RF fingerprinting of transmitted wireless signals in the physical layer. To this end, we first designed and implemented two realizations of NFC relay attacks, wired and wireless relays, and built an SDR-based testbed. We collected the normal and relayed signals of four NFC tags, and the answer to request type A (ATQA) segments were selected for RF fingerprinting. The created dataset comprised 66,366 samples, with four tags’ normal and wired relayed signals and the wireless relayed signals. The dataset was then fed into a deep CNN for training. Finally, our experiment results showed that the method effectively distinguished normal and relayed signals with a high accuracy of 99%, confirming that RF fingerprinting can be a promising countermeasure to NFC relay attacks.

1. Introduction

Near field communication (NFC) has been a widely used radiofrequency identification (RFID) technology in recent years. It enables short-distance contactless communication functionality on smartphones and other devices, providing convenient services such as mobile payment, a wearable device, and passive keyless entry and start systems (PKES). However, all users can receive the information transmitted over the air. This means the security risks exist in RFID/NFC communication systems, and the risks may cause the property loss as the NFC is being applied in various devices.
Among the security risks is the relay attack that be conducted even when the information is protected by encryption methods. Francillon et al. [1] conducted a study on wired and wireless relay attacks on PKES, and showed that simply relaying the signal between the key fob and the car could realize an attack even when they were far away from each other. Their risk evaluation on ten car models from eight car manufacturers showed that the PKES of the cars were vulnerable to relay attacks. In a relay attack, the attacker just relays the communication signal without analyzing or modifying it. The attacker deceives two communication entities to conduct the NFC transactions by relaying the signal between the two entities even when they are far away from each other. Although many RF systems apply data encryption to protect the transmitted information, the encryption measure is unable to address the relay attack since the attacker does not need or attempt to decipher the encrypted information.
To address the relay attack, many methods have been proposed. Two representative methods are distance-bounding (DB)-based and ambient-based methods [2]. Both schemes focus on verifying proximity in the physical space of the (two) communicating entities. Distance bounding depends on the round-trip time measurement of challenging bits for proximity checking in an authentication phase. Because the signal’s travel speed and distance are assumed constant, a delay in the RTT can indicate that the signal may have been relayed. The distance-bounding methods proposed in the literature [3,4] have laid the foundation of current canonical distance-bounding schemes, known as the Brands–Chaum protocol and the Hancke–Kuhn protocol. Some following studies such as [5,6,7] proposed improvements on the above two distance-bounding protocols. In [5], an improved solution of the Hancke–Khun protocol with a symmetric cryptography implementation was proposed that was capable of addressing both terrorist fraud relay and mafia relay attacks. Ref. [6] addressed the vulnerabilities in the previous protocols. The authors proposed a modified DB protocol for RFID systems with more encryption loops and a better probability of defending against terrorist fraud relay attacks. Rasmussen et al. [8] addressed the information leakage issue in DB protocols and put forward a location-private DB protocol. In [7], the RFID DB protocol “Swiss Knife” was proposed with improvements in the aspects of computation overhead, error resistance, and privacy protection compared to previous protocols. Refs. [9,10] utilized quantum bits and proposed more secure and efficient DB protocols for RF systems. Comprehensive reviews on distance-bounding protocols can be found in recent studies such as [11,12]. However, DB-based methods may suffer from an imprecise distance estimation due to the short RFID/NFC communication distance and the fast signal propagation speed. In addition, additional modifications of specific protocols are required, which may impede the widespread implementation of such protocols in applications.
The ambient-based methods [13,14,15] check the similarity degree of ambient conditions of the two entities to identify the relay attack. These ambient-based methods may suffer from misjudgment problems when the ambient conditions are similar. Moreover, the high detection accuracy relies on the sensors’ proper and good functioning, which raises concerns about the reliability of these proposed methods over long-time runs.
Some recent works such as [16,17,18] studied information embedding or watermark techniques to embed digital information imperceptibly for the authenticity and security of data in wireless networks. Refs. [19,20,21] demonstrated that watermarks could be employed to detect replay attacks, thus improving wireless network security. However, in an RF/NFC relay attack which can be different from replay attacks, the attacker does not read or modify the content of transmitted signals throughout the attack, and the signals are simply relayed as a whole. Therefore, watermarks are unable to serve as an effective way of identifying relay attacks.
This paper employs RF fingerprinting to identify wireless devices and NFC relay attacks. RF fingerprints refer to the device-specific features extracted from the emitted wireless signals of RF devices. RF fingerprinting is a noteworthy research field regarding the domain of wireless signals and is now intersecting with machine learning methodologies.
Danev et al. [22] pointed out that physical-layer device identification can be feasible because of the hardware defects in the analog circuitry introduced at the manufacturing process. The defects can be reduced to some extent by more sophisticated manufacturing procedures, but they will not be eliminated completely. The residual hardware defects usually differ slightly from one device to another, and consequently, every device emits a device-specific wireless signal which can be used to generate the RF fingerprint.
Extracting RF fingerprint features from transmitted signals is a critical step in our proposed method since the relaying devices will modify the signals’ waveform in its device-specific way. Therefore, our goal is to identify relay attacks from the perspective of the analysis and identification of transmitted wireless signals.
In the past, many methods have been proposed to extract hand-engineered RF fingerprints from I/Q imbalance [23], wavelet transforms [24], or synthetic statistical features [25]. The hand-engineered features may be able to identify the relay attack rather well for a smaller number of devices. For a large number of devices, however, the interclass distance between the hand-engineered RF fingerprints of the legal devices and that of the relay attacks may be too small, and thus the performance of identifying attacks deteriorates dramatically.
Deep learning has been applied to various applications in recent years for its strong ability to represent features. Related works on deep-learning-based RF fingerprinting demonstrated that deep learning could automatically extract RF fingerprints from raw signal data, reducing the efforts of manual fingerprint extraction based on expert domain knowledge. Riyaz et al. [26] used raw I/Q samples of the complex signal and proposed a convolutional neural network (CNN) structure for classifying five RF transmitter devices with a high accuracy of 90–99. Chatterjee et al. [27] used RF characteristics of wireless communication nodes as physical unclonable functions (RF-PUF), and an ANN structure was used to identify and authenticate IoT devices. Lee et al. [28] truncated the collected data and demonstrated that the pulses in the waveform corresponding to data bits could be used to extract RF features of the NFC tags. The considered deep learning models outperformed the conventional machine learning algorithms such as logistic regression or support vector machines (SVMs).
However, in the field of relay attacks, little research has been focused on RF-fingerprinting-based methods. To investigate the ability of the deep learning techniques identifying relay attacks, this work designed an SDR-based piece of equipment for collecting RF signal data of NFC transaction and then trained a convolutional neural network (CNN) classifier with these data.
The main contributions of this work are summarized as follows:
-
This article proposes a method that can effectively detect and identify NFC relay attacks by the waveforms of transmitted signals based on RF fingerprinting and deep learning.
-
To the best of our knowledge, no public dataset is available for identifying NFC relay attacks. This work first implemented two types of devices emulating wired and wireless NFC relay attacks. A testbed based on an SDR was built for the data acquisition. We created a dataset that contained 66,366 samples with four types of normal NFC tag samples, one type of wireless NFC attack samples, and four types of wired NFC attack samples.
-
Our proposed method utilizes deep learning and relies on signal waveform data in the physical layer. We prove the feasibility of relay attack detection when additional relaying devices other than the original tags are used. Moreover, the proposed method enables detection before the key-based authentication interaction in an NFC transaction, allowing for timely handling of relay attacks.

2. Technical Background

This section introduces the technical background on NFC and relay attacks. Radiofrequency (RF) identification is a technology that uses RF signals’ spatial coupling to realize automatic recognition of an object. NFC is one of the RFID technologies supporting fast access capability. Owing to its short communication distance, NFC can be applied to applications requiring higher security, for example, mobile payment, ticketing, PKES, etc. As an international standard for contactless smart cards, ISO/IEC 14443 discusses the contactless interaction mechanisms and related transport protocols for proximity coupling devices (PCDs) and proximity integrated circuit cards (PICCs). The two communication signal interfaces, type A and type B, are specified in 14443-2.
NFC-A is a widely used type of NFC and compatible with the 14443 type A standard. Therefore, the proposed method in this paper focuses on the NFC-A compatible with the ISO/IEC 14443A standard. ISO/IEC 14443-3 [29] describes the initialization and anti-collision of contactless IC cards. When the NFC tag is placed in the operating RF field of the PCD, the PCD initiates the process of establishing communication with the NFC tag. An activation sequence from the PCD includes three steps: request, anticollision loop, and select. In order to detect whether a PICC enters the PCD energy field, the PCD repeatedly sends the request command, type A (REQA), until it gets the response from a PICC’s answer to request type A (ATQA). The PICC now changes from the IDLE state to the READY state. Then, if the PICC passes the anticollision process, it becomes the ACTIVE state. The PICC in the ACTIVE state begins to listen to the messages from the higher layer that are about specific applications. Note that all NFC transactions start from the initialization and anticollision process, and the ATQA response from the NFC tag is also required in each transaction. Therefore, the ATQA can be used as a generic data segment for extracting RF fingerprints.
The data acquisition procedure is described in Section 4.

2.1. Amplitude Modulation and Encoding

In NFC-A, the signal carrier frequency transmitted from the PCD, i.e., the reader, to the PICC, i.e., the NFC tag, is 13.56 MHz. The data transmission rate is 106 Kb/s during the initialization of the anticollision process, and the period for one bit is 9.4 μ s. The PCD–PICC signal is 100% ASK modulated (OOK), while the PICC–PCD signal uses the load modulation, where the used subcarrier is generated from the carrier of the PCD signal.
The request and response command frames are transmitted pairwise. The transmission encoding is a modified Miller code from the PCD to the PICC and a Manchester encoding from the PICC to the PCD. The data in the frame are transmitted LSB first.

2.2. Adversarial Model

NFC improves security by its short communications range, which implies that the authentic tag (prover) is in the hand of the rightful owner and is close to the reader (verifier). To implement a relay attack, an adversary attempts to deceive the authentic prover and verifier into thinking they are in physical proximity, even if this is not the case. An adversary of an RFID/NFC relay attack simply relays the signal without decoding or modifying the contents of the message between P and V. The most common type of NFC relay attack is noted in [2] as the mafia relay attack, where the adversary uses a pair of fake tag and reader as emulating devices to fool authentic readers and tags. The devices forward and relay the signals between the reader and the tag in both directions. A typical example is the relay attack on PKES, in which the thieves relay the signals between the key fob and the car. This enables them to eventually get into and start the car even when the owner’s key fob is far away from the car. The second type of relay attack described in [2] refers to terrorist fraud relay attack, where an adversary takes control of the tag while the reader is still unaware of it. Relay attacks ignore the actual distance between the tag and the reader and target the physical layer. Consequently, higher-layer data encryption methods or security protocols cannot effectively defend against relay attacks. Moreover, legitimate tags and readers are often unaware of such an attack, making it difficult to defend against RFID/NFC relay attacks. A mafia relay attack is the more commonly seen type of NFC relay attacks in real life, where both communicating parties are unaware of the adversary. This article focuses on the mafia relay attack of NFC-Type A. We propose a method for effectively detecting and identifying this type of relay attack.

3. Related Works

3.1. Methods Addressing Relay Attacks

The methods of addressing RFID/NFC relay attacks can be classified into two categories, the distance-bounding based methods and the ambient-conditions-based methods [2]. Both categories aim to check whether the two communication entities are physically close.
The distance-bounding-based methods check the NFC tag and PICC proximity by computing their distance. Brands et al. [3] proposed the distance-bounding (DB) protocol that estimated the distance by measuring the round-trip time (RTT) between the sent bit and its corresponding response. Some follow-up studies such as Hancke et al. [4] optimized the DB protocol to be lightweight for resource-constrained devices such as RFID tags. Refs. [3,4] are now the existing canonical DB protocols [11]. Trujillo-Rasua et al. [30] proposed a background-noise-resilient DB protocol to cope with the noise’s impact on the performance of round-dependent DB protocols. Refs. [9,10] explored the feasibility of combining DB with quantum communications, where they utilized a qubit for the fast bit exchange in the challenge/response phase. The security capability of the proposed protocols benefited from the unpredictability of bits in quantum communications.
The distance estimation in some of the previous solutions can be calculation-error-prone due to the fast transmission speed of RF signals, the short communication range, or noisy environments. Other methods that share the distance-bounding concept, such as [31], suggested using a signal’s received signal strength indicator (RSSI) for the distance estimation. However, an attacker altering the signal’s power was not considered.
The ambient-based approaches verify the copresence of ambient conditions of the two communicating parties. Ma et al. [13] proposed a context-detection method that utilized the position and speed information derived from GPS data to defend against relay attacks. The premise of their method was that the tags were sensor-enabled, i.e., modified with GPS receivers. In addition, they fixed the application scenarios to toll station or gate access control to ensure the accessibility of accurate GPS data. Shrestha et al. [14] considered ambient temperature, carbon monoxide content, humidity, and altitude. Truong in [15] proposed their ambient-based approach for resisting relay attacks in zero-interaction authentication. They considered the RSSI of WiFi AP, Bluetooth RSSI, GPS satellites, the corresponding SNRs, and environmental parameters such as ambient sound. Their experiments also showed that measuring multiple sensor parameters could enhance reliability.
The ambient-based methods measure the similarity degree of the environmental parameters around the NFC tag and that around the PICC. They may fail to identify the relay attacks in the case where the NFC tag is far away from the PICC, but they have similar environmental parameters. Moreover, Truong et al. in [15] pointed out that parameter measurement failures could impact the performance of ambient-based methods.
The methods mentioned above either require a modification of specific protocols or limit acquisition parameters based on the chosen sensors, which may hinder the implementation of such schemes in the existing and widely deployed NFC applications. While DB protocols appear to be more promising, their applications in NFC in practice have yet to be seen. Regarding NXP Mifare contactless products, the DB protocols are either not activated by default or lack explanations for evaluating the RTT’s upper bound value on datasheets. In addition, these DB protocols can still be vulnerable to purpose-built relays because the measurement resolution may not be high enough to detect those fast relays, as was pointed out in [11].

3.2. Extracting Fingerprints for Identifying RF Devices

RF fingerprint is a widely used technique for identifying specific wireless devices. RF fingerprints can represent the intrinsic features of the hardware circuit defects resulting from manufacturing or the drift tolerance of electronic components, and hence are specific to individual devices. Danev et al. [32] classified and recognized RF transponders by extracting the fingerprints from modulation shapes and spectral features of the RF signals. Zhang et al. [25] derived fingerprints from the statistics of ATQA envelopes, used a multiple discriminant analysis (MDA) to maximize between-class separability, and achieved 100% accuracy on the set of 300 HF cards for all six types of cards.
Riyaz et al. [26] used SDR to collect I/Q samples of the complex signal at the physical layer, and then extracted device-specific features. A CNN structure was used for identifying five similar devices, and their work demonstrated an accuracy of 90–99 in noisy multipath wireless channels with distances ranging from 2 to 50 feet.
Chatterjee et al. [27] used RF characteristics extracted from the manufacturing process of wireless communication nodes as physical unclonable functions (RF-PUF) to identify and authenticate IoT network devices. They used an ANN structure and demonstrated the feasibility of implementing a low-cost, secure, and robust system with high accuracy.
Lee et al. in [28] truncated the collected data and proved that the pulses corresponding to one data bit could be used to extract RF features of the NFC tags. They applied and compared three deep learning models for classification and recognition of the NFC tags.
Some recent RF fingerprinting works [33,34] on WiFi and ADS-B studied the impact of confounding factors, time-varying channel, temperature, etc., on deep learning models. Ref. [35] suggested that dataset collection should span a more extended time to create a richer and more diverse dataset and a better model generalization.
The above methods focused on RF fingerprinting WIFI, IoT, and NFC devices; however, based on our knowledge, scarcely any research on addressing relay attacks with RF fingerprinting and deep learning techniques has been reported.
Applying deep learning techniques to identify relay attacks for RFID remains an open problem due to the lack of sufficient data samples collected from real NFC devices. In order to collect data samples for training deep neural networks, we designed and made two types of devices to simulate NFC relay attacks: a wired device and a wireless device.
With the two devices, we firstly collected the normal and relayed NFC signals, then localized the segments containing ATQA commands. These segments were taken out of the original signals and served as the data samples. A total of 66,366 samples (segments) were acquired. Once the data samples were ready, we trained a CNN structure on them and conducted experimental comparisons.
The rest of the paper is organized as follows. Section 4 describes the data acquisition procedure, where we describe the testbed we built, the two hardware devices we made for NFC relay attack realization and the dataset we created. We then describe the deep learning technique employed for RF fingerprint extraction in Section 5, then we present the experimental results and analysis. Finally, Section 6 concludes our work and discusses future work.

4. Materials and Methods

4.1. Dataset Creation for NFC Relay Attack Detection

This section presents the detailed process of making the dataset for deep-learning-aided NFC relay attack detection. Supervised deep learning typically requires a large quantity of annotated data. Since no public dataset was available, we created a dataset in this work. Specifically, we built an SDR-based testbed for data acquisition and collected the normal and relayed signal data of M1-type NFC tags at the physical layer. Then, the segments containing ATQA commands were located and sifted out. Finally, we manually screened all segments to ensure every segment was a valid sample.

4.1.1. Building Testbed for Data Acquisition

The data acquisition testbed included an SDR hardware platform, a sniffing coil, a tag reader, and two types of NFC relay devices, as shown in Figure 1.
SDR is a radio communication system that uses software to implement or define the components that require hardware implementation in traditional radio systems. We used AirSPY as the SDR hardware platform, which supports a sampling rate of 10 MSPS. A sniffing coil served as an antenna to capture the transmitted NFC signals between the reader and the NFC tags. The antenna was connected to the SDR hardware platform by a wire to collect the transmitted signals. Figure 2 displays the measurement setup for capturing the NFC signals.
The NFC reader was a general card reader based on the NXP’s NFC chip. We used 4 NFC tags from the same batch and same manufacturer with NXP MIFARE CLASSIC 1K chips. They had the same ATQA content and complied with the communication protocol ISO/IEC 14443-3, with the RF interface operating at 13.56 MHz.

4.1.2. NFC Relay Device

In this work, we made two typical types of devices for NFC relay attacks: wired relay attack and wireless relay attack. The two devices helped simulate NFC relay attacks, and with them, we acquired the relayed signals.
A wired relay attack is a simple but effective passive relay attack. To simulate a wired relay attack, we connected the two coils with a wire, with one coil (reader-emulating coil) being placed close to the normal NFC tag and the other coil (tag-emulating coil) placed within the NFC reader’s radiation field. A wired relay attack includes the following steps. The reader firstly activates the tag-emulating coil and they start to communicate. The tag-emulating coil then sends the signals to the reader-emulating coil through the wire. Finally, the NFC tag and the reader-emulating coil communicate, completing an NFC transaction. We proved the effectiveness of our device, and a better-designed and undetectable realization of such a relay can be found in recent works [36]. Figure 3a shows the process of a wired relay attack and the two coils.
A wireless relay attack device simulates the NFC relay attack over WiFi. The wireless relay attack device simulates an over-the-air scenario where the relay range is no longer limited to the length of the wire. Such attack form is usually conducted using devices with wireless connectivity, e.g., smartphones with BT or Wifi in mobile payment or access control system scenarios [37,38,39,40,41]. In line with previous works on wireless implementations of NFC relay attacks, we implemented a wireless relay attack over WiFi. Note that the realization can be generalized to other wireless techniques, e.g., LTE or 5G.
We developed a set of two emulators: a tag emulator and a reader emulator, as shown in Figure 3b. We started by designing a schematic and PCB (printed circuit board). Then, the tag/reader emulator was fabricated according to the designed PCB. The tag emulator mainly comprised three ICs: TRF7970, STM32F405, and ESP32. TRF7970 worked in the “card emulating” mode for the control of the STM32F405 IC, and TRF7970 was responsible for the communication with the (real) reader. It received the commands sent by the (real) reader and sent the commands to the reader emulator through the WiFi built by the ESP32 IC, and in the other direction, it received the commands sent by the reader emulator and sent the commands to the (real) reader. The reader emulator mainly comprised two ICs: PN532 and ESP32. PN532 worked in the “reader emulating” mode for the control of the ESP32 IC. It was responsible for the communication with the (real) tag.
We conducted experiments with the two emulators to ensure that they both could realize the relay attacks, i.e., they could successfully deceive the real reader and tag.

4.1.3. Data Collection

We used 4 NFC tags of the same batch and manufacturer to generate 4 types of normal NFC signals. For the wired relay attack, we used SDR (see Section 4.1) to collect the relayed signal data samples for each of the NFC tags, ending up with 4 types of wired relay signals. For the wireless relay attack, we acquired the signal from the emulator to the (real) reader, ending with 1 type of wireless relay signal. Eventually, 9 types of signals’ data were collected.
To preserve more details reflecting hardware characteristics, we adopted a high data sampling rate of 10 MSPS. We stored the signals from the physical layer in WAV format files. For each type of signal, we repeated acquiring the signals multiple times, and then located the segments containing ATQAs. All the segments were extracted and served as the data samples. Figure 4 illustrates some collected data samples.
We located and saved the ATQA command segments in the recording files. The data sampling rate was 10 MSPS. As is specified in 14443-A [29], the period for each bit of data was 9.4 μ s. Equation (1) gives the minimum of sampling points to contain the full segment of ATQA command by
N s = N B f c 128 · f s
where N s is the number of sampling points, N B is the number of bits in a single ATQA command, i.e., 19 bits (16 bits of data, 1 starting bit, and 2 parity bits), f c is the carrier frequency of NFC, and f s is the sampling rate. The N s is calculated and rounded to 1794 with N B = 19, f c = 13.56 × 10 6 , and f s = 10 × 10 6 . We set each of our data samples to have 1800 sampling points to contain the complete segment of a single ATQA.
Inspired by previous works on considerations regarding dataset collections, we conducted several intensive data collection phases, one week apart, to make our dataset contain sufficient data samples over the span of several weeks. Figure 5 shows the randomly picked waveform data samples. The normal signals of tags 1–4 from top to bottom are shown in Figure 5a. Figure 5b shows the samples of relayed signals.

4.1.4. Dataset Description

The dataset description is shown below.
  • Dataset content: 66,366 data samples (9 type of tags, i.e., 4 normal + 4 wire-relayed + 1 wireless-relayed signals);
  • Sample rate: 10 M samples/s;
  • Data support for each class: 7474 samples with 1800 sampling points each;
  • Size of each data sample: 4 KBytes;
  • Content of data: ATQA segments (04 00 (hex) in Manchester encoding);
  • Total size of dataset: 230 MBytes.

4.2. Relay Attack Identification with Convolutional Neural Networks

Recent works on DL and RF fingerprinting showed that CNNs achieved a high performance in RF fingerprinting tasks on raw wireless signals, demonstrating their capability for extracting features from raw signal data [26,42,43,44]. CNNs automatically extract high-dimensional features, avoiding manual fingerprint extraction, and such advantage is magnified in RF fingerprinting because signal imperfections are typically a synthesis of various sources and exhibit nontrivial spatial and temporal patterns [45]. Moreover, a CNN works in a protocol-independent fashion, which means it is possible to generalize the method to protocols other than NFC or to other wireless devices.
Based on the above advantages of CNNs, we utilize a CNN on raw waveform data to classify normal and relay NFC signals in this work. We apply 1D convolution layers on the 1D data for shift invariance since the hardware impairment features could appear in arbitrary locations.

Structure of CNN

This section employs a convolutional neural network (CNN) to extract the RF fingerprints from the 1D signals for classification. The input signals were classified into 9 types: 4 normal signals, 1 wireless relay attack, and 4 wired relay attacks. We employed a simple CNN structure containing three convolution layers followed by one fully connected layer. The first convolutional layer had 72 kernels of size 8, the second convolutional layer had 64 kernels of size 6, and the third convolutional layer had 32 kernels of size 6. The fully connected layer contained 256 hidden units. Each convolutional layer was followed by the ReLU. The output of the fully connected layer was fed into the softmax activation function for a multiclass classification. In addition, we normalized the data to improve the convergence speed of the training while retaining the original shape of the signals. The proposed CNN architecture is shown in Figure 6.
The CNN structure was built with Keras’s high-level deep learning APIs on TensorFlowGPU 2.4.0 installed on two desktops with NVIDIA RTX 2070S and RTX 3060 GPUs. In the training stage, the cross-entropy was used as the loss function and the Adam optimizer was used with a batch size of 1024. We applied early stopping with the callback of TensorFlow by monitoring the loss on the validation set on every epoch. The tolerance was set to 6 for the early stopping.

5. Results and Analysis

We compared the performance of the built CNN structure with a DNN. The DNN contained four fully connected layers with each layer followed by a ReLU. The L2 regularization penalty terms were used and the dropout rate was set to 0.25. We trained the CNN on our created dataset consisting of 66,366 samples. The dataset was split into a training set, a validation set, and a test set with the proportion of 70%, 20%, and 10%, respectively.

5.1. Performance Metrics

We applied the commonly used metrics, accuracy, precision, recall, and F1-score, to measure the performance. Accuracy is a base evaluation metric calculated by the sum of all correct predictions over all predictions. Precision is the correct positive predictions over all positive predictions. Recall is the fraction of correctly predicted positive samples among all positive samples. The F1-score is a metric that combines precision and recall. We used N T P , N F P , N T N , and N F N to denote a true positive (TP), a false positive (FP), a true negative (TN), and a false negative (FN). The formula for the calculation of the metrics is given in Equation (2).
Precision = N T P N T P + N F P F = 2 · p r e c i s i o n · r e c a l l p r e c i s i o n + r e c a l l Recall = N T P N T P + N F N Accuracy = N T P + N T N N T P + N T N + N F P + N F N
Table 1 gives the performance of the built CNN, DNN, and SVM. While the current task was a multiclassification task, we reported the averaged performance metrics over the nine types of signals. The built CNN outperformed the DNN and SVM in distinguishing nine types of NFC tag signals, achieving 98.90% for the average precision over the nine types of signals, 98.90% for the average recall, 98.89% for the average accuracy, and 98.89% for the average F1-score. The DNN also achieved a rather satisfying performance owing to the large number of data samples. Both the CNN structure and DNN performed better than the SVM since they could learn a better feature representation (fingerprints) from the large dataset we created in this work.
Table 2 gives the precision, recall, accuracy, and F1-score of the built CNN for every type of signal. For the normal signals from the first to fourth type, the built CNN made some prediction errors due to the close similarity of the four signals generated by the four tags from the same batch and manufacturer. For the wireless relayed signals (the fifth type), the built CNN obtained a precision and recall of 100%, all of the attacks were successfully identified and there was no false positive identification. For the sixth and eighth types of wired-relayed signals, the predicted recall and precision were also 100%. The relay process was able to enhance the distinctive features of the NFC signals, and the relayed signals could be better distinguished between the four types of wired relayed signals.
Figure 7 shows the confusion matrix of the classification results by the built CNN model. It is worth noting that Figure 7 also shows the built model could effectively classify the normal and relayed NFC signals. If we take the first type to the fourth type as the normal category and the other types as the relay category, the built CNN model achieved a 100% classification accuracy in terms of the binary classification between the normal and relay categories.

5.2. Model Comparison

Furthermore, we considered the receiver operating characteristic curve (ROC) for the proposed RF fingerprinting method. The goal was to evaluate the performance of our CNN model from a data-independent perspective. The ROC curve takes the true positive rate as the Y-axis and the false positive rate as the X-axis.
Since ROC curves are typically used to analyze a binary model, we first performed a binarization and computed the ROC in the one-vs.-rest scheme to extend and apply it in this multiclassification.
Figure 8 shows the ROC curve of the CNN model plotted for each label based on the backup dataset. The backup dataset was intentionally created for evaluation, which had the same size as the dataset used in the training phase, but the model had never seen the samples before. As seen from the ROC curves’ steepness, the model performed well with AUCs ranging from 0.9990 to 1. The proposed CNN classifier proved to be an effective and stable model for the task.

6. Discussion

Practicability

Finally, we should return to our discussion on the feasibility of DL-aided RF fingerprints for relay attack identification. To verify the practicability of our method, we trialed the model on a trial dataset. In addition, we verified if the model distinguished relayed signals from normal ones on new incoming data.
The trial dataset was obtained on different days than the first data collection in Section 4.1.4, and the two data acquisition rounds were separated by two weeks. Note that the testing dataset contained “completely new data” that the model had never seen in previous training or testing phases. This testing dataset had the exact composition of the nine labels (labels 1–4 for normal signals of four tags, and corresponding wire-relayed signals labeled 6–9, label 5 for the wireless-relayed signal) as the previous one, with only fewer data samples—only 6000 samples per label. The prediction result on the trial dataset is shown in Table 3.
The result showed that the model achieved an accuracy of 99.8% on 54,000 samples, with 107 normal signals miscategorized as relayed signals and thus rejected even if they were from authentic tags. On the other hand, as expected, none of the relayed signals were recognized as normal. A relayed signal being accepted is usually a worse case since an attacker may succeed and cause property loss.
Finally, the time required for the prediction on 54,000 data samples was 8.603 s, equivalent to 0.159 ms for a single prediction if averaged over all samples. Note that the proposed method relied on the ATQA segment returned by the tags at the beginning of transactions, hence it enabled the identification of relay attacks in advance of the completion of NFC transactions rather than responding to it after the fact. Meanwhile, the single inference time was relatively short and met existing requirements for NFC verification time.

7. Conclusions

We focused on one of NFC’s potential security problems of susceptibility to relay attacks and provided an RF-fingerprinting-based solution as a countermeasure to such attacks. The main contributions of this article are summarized as follows: First, we reviewed current mainstream countermeasures of NFC relay attacks, and we suggested that RF fingerprinting techniques could be used to identify relay attacks. Second, we demonstrated in detail two typical realizations for NFC relay attacks, namely, the wired and wireless relay attacks. We created the NFC ATQA waveform dataset of four M1 NFC tags’ normal and relayed signals, which consisted of 66,366 data samples. Based on our knowledge, the public datasets relating to the current research are scarce, so we made our dataset publicly available as a supplement. Third, we proved the feasibility of employing deep learning techniques for NFC relay attack identification. The CNN built and trained on our dataset effectively distinguished the relayed NFC signals from normal ones on the test set and the new arrival data samples on the trial dataset. In addition, our deep-learning-based method did not require additional manual fingerprint feature extraction on raw data samples.
Compared to previous proposals on distance-bounding and ambient-based methods that also served as effective countermeasures, our proposed method did not add additional DB verification operations, thus not requiring a modification of a specific protocol. Meanwhile, the method did not require monitoring a set of specified ambient parameters. Finally, the proposed model could identify relay attacks in the early stage of NFC transactions, preventing loss in such applications as PKES of cars or NFC payments.

8. Limitations and Future Work

The current study has certain limitations: 1. The current dataset consists of only one typical way of wireless relay using WiFi. At the same time, wireless relay attacks can also be conducted using Bluetooth or cellular networks, etc. One of our future works will be proving the feasibility of such implementations and enlarging the dataset with multiple realizations of relays for enhanced sample diversity. 2. While the current dataset consists of signal samples from different positions of the tag and reader, we did not include different communication ranges, since the off-the-shelf product-level NFC reader used power suppression, lowering its range for transaction safety considerations and requiring the tags be placed close to the reader.
Other open research directions worth further investigations include the interpretation of RF fingerprints, optimal deep learning model structure, and the acquisition and efficient utilization of data on terminal devices. As for our future work, we intend to further optimize our data acquisition method and develop lightweight (CNN) models and deploy them on low-power-consumption microcontrollers. Therefore, the computation cost of deep learning should be taken into consideration. Possible techniques include quantization methods or adopting a lightweight training framework, e.g., TFLite, to meet the requirements of resource-constrained devices.

Author Contributions

Conceptualization, Y.W., J.Z. and K.Z.; data curation, Y.W.; formal analysis, Y.W.; investigation, Y.W. and K.Z.; methodology, Y.W. and J.Z.; project administration, J.Z.; resources, J.Z.; software, Y.W.; supervision, J.Z.; validation, Y.W., J.Z. and K.Z.; visualization, Y.W. and K.Z.; writing—original draft, Y.W.; writing—review and editing, J.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The dataset in Section 4.1.4 is available at 20 January 2023, https://github.com/Yifeng-Wang/nfc-relayattack.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Francillon, A.; Danev, B.; Capkun, S. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In Network and Distributed System Security Symposium; Eidgenossische Technische Hochschule Zurich: Zurich, Switzerland, 2011. [Google Scholar]
  2. Tu, Y.J.; Piramuthu, S. On addressing RFID/NFC-based relay attacks: An overview. Decis. Support Syst. 2020, 129, 113194. [Google Scholar] [CrossRef]
  3. Brands, S.; Chaum, D. Distance-Bounding Protocols. In Advances in Cryptology—EUROCRYPT’93; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1994; Volume 765, pp. 344–359. [Google Scholar] [CrossRef] [Green Version]
  4. Hancke, G.P.; Kuhn, M.G. An RFID distance bounding protocol. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), Athens, Greece, 5–9 September 2005. [Google Scholar] [CrossRef]
  5. Reid, J.; Nieto, J.M.G.; Tang, T.; Senadji, B. Detecting relay attacks with timing-based protocols. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS ’07, Singapore, 20–22 March 2007; pp. 204–213. [Google Scholar] [CrossRef] [Green Version]
  6. Tu, Y.J.; Piramuthu, S. RFID distance bounding protocols. In Proceedings of the First International EURASIP Workshop on RFID Technology, Vienna, Austria, 24–25 September 2007; pp. 67–68. [Google Scholar]
  7. Kim, C.H.; Avoine, G.; Koeune, F.; Standaert, F.X.; Pereira, O. The Swiss-Knife RFID Distance Bounding Protocol. In Information Security and Cryptology—ICISC 2008; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5461, pp. 98–115. [Google Scholar] [CrossRef] [Green Version]
  8. Rasmussen, K.B.; Čapkun, S. Location privacy of distance bounding protocols. In Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 27–31 October 2008; pp. 149–159. [Google Scholar] [CrossRef]
  9. Abidin, A.; Marin, E.; Singelée, D.; Preneel, B. Towards quantum distance bounding protocols. In Radio Frequency Identification and IoT Security; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2017; Volume 10155, pp. 151–162. [Google Scholar] [CrossRef]
  10. Abidin, A. Quantum distance bounding. In Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, FL, USA, 15–17 May 2019; pp. 233–238. [Google Scholar] [CrossRef]
  11. Avoine, G.; Boureanu, I.; Gérault, D.; Hancke, G.P.; Lafourcade, P.; Onete, C. From Relay Attacks to Distance-Bounding Protocols. In Security of Ubiquitous Computing Systems; Springer: Cham, Switzerland, 2021; pp. 113–130. [Google Scholar] [CrossRef]
  12. Sultan, A.R.; Rashid, I.; Khan, F.; Tahir, S.; Pasha, M.; Sultan, A. A New Secure Authentication Based Distance Bounding Protocol. PeerJ Comput. Sci. 2021, 7, 1–28. [Google Scholar] [CrossRef] [PubMed]
  13. Ma, D.; Saxena, N.; Xiang, T.; Zhu, Y. Location-aware and safer cards: Enhancing RFID security and privacy via location sensing. IEEE Trans. Dependable Secur. Comput. 2013, 10, 57–69. [Google Scholar] [CrossRef]
  14. Shrestha, B.; Saxena, N.; Truong, H.T.T.; Asokan, N. Drone to the rescue: Relay-resilient authentication using ambient multi-sensing. In Financial Cryptography and Data Security; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2014; Volume 8437. [Google Scholar] [CrossRef]
  15. Truong, H.T.T.; Gao, X.; Shrestha, B.; Saxena, N.; Asokan, N.; Nurmi, P. Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication. In Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communications, PerCom 2014, Budapest, Hungary, 24–28 March 2014. [Google Scholar] [CrossRef]
  16. Zaidi, A.; Vandendorpe, L. Coding schemes for relay-assisted information embedding. IEEE Trans. Inf. Forensics Secur. 2009, 4, 70–85. [Google Scholar] [CrossRef]
  17. Guan, T.; Chen, Y. A node clone attack detection scheme based on digital watermark in WSNs. In Proceedings of the 2016 1st IEEE International Conference on Computer Communication and the Internet, ICCCI 2016, Wuhan, China, 13–15 October 2016; pp. 257–260. [Google Scholar] [CrossRef]
  18. Nguyen, V.T.; Hoang, T.M.; Duong, T.A.; Nguyen, Q.S.; Bui, V.H. A lightweight watermark scheme utilizing MAC layer behaviors for wireless sensor networks. In Proceedings of the 2019 3rd International Conference on Recent Advances in Signal Processing, Telecommunications and Computing, SigTelCom 2019, Hanoi, Vietnam, 21–22 March 2019; pp. 176–180. [Google Scholar] [CrossRef]
  19. Huang, H.; Zhang, L.; Wu, Z. Secure and Reliable Multidimensional Orthogonal Code aided RF Watermark Design for NB-IoT Systems. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020. [Google Scholar] [CrossRef]
  20. Liu, H.; Mo, Y.; Johansson, K.H. Active Detection Against Replay Attack: A Survey on Watermark Design for Cyber-Physical Systems. In Safety, Security and Privacy for Cyber-Physical Systems; Lecture Notes in Control and Information Sciences; Springer: Cham, Switzerland, 2021; Volume 486, pp. 145–171. [Google Scholar] [CrossRef]
  21. Trapiello, C.; Puig, V. Optimal Finite-time Watermark Signal Design for Replay Attack Detection using Zonotopes. IFAC-PapersOnLine 2022, 55, 292–297. [Google Scholar] [CrossRef]
  22. Danev, B.; Zanetti, D.; Capkun, S. On physical-layer identification of wireless devices. ACM Comput. Surv. 2012, 45, 6. [Google Scholar] [CrossRef]
  23. Hao, P.; Wang, X.; Behnad, A. Relay authentication by exploiting I/Q imbalance in amplify-and-forward system. In Proceedings of the 2014 IEEE Global Communications Conference, GLOBECOM 2014, Austin, TX, USA, 8–12 December 2014. [Google Scholar] [CrossRef]
  24. Bertoncini, C.; Rudd, K.; Nousain, B.; Hinders, M. Wavelet fingerprinting of radio-frequency identification (RFID) tags. IEEE Trans. Ind. Electron. 2012, 59, 4843–4850. [Google Scholar] [CrossRef]
  25. Zhang, G.; Xia, L.; Jia, S.; Ji, Y. Physical-layer identification of HF RFID cards based on RF fingerprinting. In Information Security Practice and Experience; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2016; Volume 10060. [Google Scholar] [CrossRef]
  26. Riyaz, S.; Sankhe, K.; Ioannidis, S.; Chowdhury, K. Deep Learning Convolutional Neural Networks for Radio Identification. IEEE Commun. Mag. 2018, 56, 146–152. [Google Scholar] [CrossRef]
  27. Chatterjee, B.; Das, D.; Maity, S.; Sen, S. RF-PUF: Enhancing IoT Security through Authentication of Wireless Nodes Using In-Situ Machine Learning. IEEE Internet Things J. 2019, 6, 388–398. [Google Scholar] [CrossRef] [Green Version]
  28. Lee, W.; Baek, S.Y.; Kim, S.H. Deep-Learning-Aided RF Fin-gerprinting for NFC Security. IEEE Commun. Mag. 2021, 59, 96–101. [Google Scholar] [CrossRef]
  29. ISO/IEC 14443-3:2016; Identification Cards—Contact-Less Integrated Circuit Cards—Proximity Cards—Part 3: Initialization and Anticollision. ISO: Geneva, Switzerland, 2016.
  30. Trujillo-Rasua, R.; Martin, B.; Avoine, G. Distance bounding facing both mafia and distance frauds. IEEE Trans. Wirel. Commun. 2014, 13, 5690–5698. [Google Scholar] [CrossRef] [Green Version]
  31. Fishkin, K.P.; Roy, S. Enhancing RFID Privacy via Antenna Energy Analysis; MIT RFID Privacy Workshop: Boston, MA, USA, 2003. [Google Scholar]
  32. Danev, B.; Heydt-Benjamin, T.S.; Čapkun, S. Physical-layer identification of RFID devices. In Proceedings of the 18th USENIX Security Symposium, Montreal, QC, Canada, 10–14 August 2009. [Google Scholar]
  33. Al-Shawabka, A.; Restuccia, F.; D’Oro, S.; Jian, T.; Rendon, B.C.; Soltani, N.; Dy, J.; Ioannidis, S.; Chowdhury, K.; Melodia, T. Exposing the Fingerprint: Dissecting the Impact of the Wireless Channel on Radio Fingerprinting. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 646–655. [Google Scholar] [CrossRef]
  34. Cekic, M.; Gopalakrishnan, S.; Madhow, U. Wireless Fingerprinting via Deep Learning: The Impact of Confounding Factors. In Proceedings of the 2021 55th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 31 October–3 November 2021; pp. 677–684. [Google Scholar] [CrossRef]
  35. Hanna, S.; Karunaratne, S.; Cabric, D. Open Set Wireless Transmitter Authorization: Deep Learning Approaches and Dataset Considerations. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 59–72. [Google Scholar] [CrossRef]
  36. Sun, Y.; Kumar, S.; He, S.; Chen, J.; Shi, Z. You foot the bill! Attacking NFC with passive relays. IEEE Internet Things J. 2020, 8, 1197–1210. [Google Scholar] [CrossRef]
  37. Francis, L.; Hancke, G.; Mayes, K.; Markantonakis, K. Practical NFC peer-to-peer relay attack using mobile phones. In Radio Frequency Identification: Security and Privacy Issues; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6370, pp. 35–49. [Google Scholar] [CrossRef]
  38. Francis, L.; Hancke, G.; Mayes, K.; Markantonakis, K. A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones. Int. J. Rfid Secur. Cryprography (IJRFIDSC) 2013, 2, 92–106. [Google Scholar] [CrossRef]
  39. Vila, J.; Rodríguez, R.J. Practical experiences on NFC relay attacks with Android: Virtual pickpocketing revisited. In Radio Frequency Identification; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2015; Volume 9440, pp. 87–103. [Google Scholar] [CrossRef]
  40. Bocek, T.; Killer, C.; Tsiaras, C.; Stiller, B. An NFC relay attack with off-the-shelf hardware and software. In Management and Security in the Age of Hyperconnectivity; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2016; Volume 9701, pp. 71–83. [Google Scholar] [CrossRef] [Green Version]
  41. Klee, S.; Maass, M.; Roussos, A.; Hollick, M. NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit. In Proceedings of the WOOT 2020—14th USENIX Workshop on Offensive Technologies, Co-Located with USENIX Security 2020, Boston, MA, USA, 10–11 August 2020. [Google Scholar] [CrossRef]
  42. Merchant, K.; Revay, S.; Stantchev, G.; Nousain, B. Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks. IEEE J. Sel. Top. Signal Process. 2018, 12, 160–167. [Google Scholar] [CrossRef]
  43. Sankhe, K.; Belgiovine, M.; Zhou, F.; Riyaz, S.; Ioannidis, S.; Chowdhury, K. ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks. In Proceedings of the IEEE INFOCOM 2019—IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 370–378. [Google Scholar] [CrossRef] [Green Version]
  44. Sankhe, K.; Belgiovine, M.; Zhou, F.; Angioloni, L.; Restuccia, F.; D’Oro, S.; Melodia, T.; Ioannidis, S.; Chowdhury, K. No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments. IEEE Trans. Cogn. Commun. Netw. 2020, 6, 165–178. [Google Scholar] [CrossRef]
  45. Yu, J.; Hu, A.; Li, G.; Peng, L. A Robust RF Fingerprinting Ap-proach Using Multisampling Convolutional Neural Network. IEEE Internet Things J. 2019, 6, 6786–6799. [Google Scholar] [CrossRef]
Figure 1. The measurement setup for NFC signal recording.
Figure 1. The measurement setup for NFC signal recording.
Electronics 12 00559 g001
Figure 2. The experimental environment and the used SDR testbed.
Figure 2. The experimental environment and the used SDR testbed.
Electronics 12 00559 g002
Figure 3. Hardware devices for the relay attacks. (a) Implementation of the hardware device for wired relay attacks. (b) Implementation of the hardware device for relay-over-WiFi attacks.
Figure 3. Hardware devices for the relay attacks. (a) Implementation of the hardware device for wired relay attacks. (b) Implementation of the hardware device for relay-over-WiFi attacks.
Electronics 12 00559 g003
Figure 4. Magnitudes of ATQA corresponding to “04 00” in Manchester encoding.
Figure 4. Magnitudes of ATQA corresponding to “04 00” in Manchester encoding.
Electronics 12 00559 g004
Figure 5. Example of randomly picked data samples of the 9 types. (a) The normal signals of NFC tags. (b) The first row for wireless-relayed signal, followed by four wire-relayed signals.
Figure 5. Example of randomly picked data samples of the 9 types. (a) The normal signals of NFC tags. (b) The first row for wireless-relayed signal, followed by four wire-relayed signals.
Electronics 12 00559 g005
Figure 6. The proposed CNN architecture.
Figure 6. The proposed CNN architecture.
Electronics 12 00559 g006
Figure 7. Confusion matrix of the CNN model for 9 classes of signals.
Figure 7. Confusion matrix of the CNN model for 9 classes of signals.
Electronics 12 00559 g007
Figure 8. ROC curve of the CNN model.
Figure 8. ROC curve of the CNN model.
Electronics 12 00559 g008
Table 1. Performance Metrics of Considered Models.
Table 1. Performance Metrics of Considered Models.
MethodPrecisionRecallAccuracyF1-Score
CNN0.98900.98900.98890.9889
DNN0.96770.96690.96690.9669
SVM0.86380.86570.86570.8645
Table 2. Performance Metrics of CNN.
Table 2. Performance Metrics of CNN.
ClassesPrecisionRecallF1-ScoreData Support
11.00000.99870.9993759
20.97520.93540.9549758
30.94430.98910.9662737
40.98320.97910.9812719
51.00001.00001.0000750
61.00001.00001.0000734
71.00000.99860.9993722
81.00001.00001.0000743
90.99861.00000.9993715
Table 3. Result of distinguishing between normal and relayed signals on testing dataset.
Table 3. Result of distinguishing between normal and relayed signals on testing dataset.
Normal but RejectedRelay but Accepted
1070
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Y.; Zou, J.; Zhang, K. Deep-Learning-Aided RF Fingerprinting for NFC Relay Attack Detection. Electronics 2023, 12, 559. https://doi.org/10.3390/electronics12030559

AMA Style

Wang Y, Zou J, Zhang K. Deep-Learning-Aided RF Fingerprinting for NFC Relay Attack Detection. Electronics. 2023; 12(3):559. https://doi.org/10.3390/electronics12030559

Chicago/Turabian Style

Wang, Yifeng, Junwei Zou, and Kai Zhang. 2023. "Deep-Learning-Aided RF Fingerprinting for NFC Relay Attack Detection" Electronics 12, no. 3: 559. https://doi.org/10.3390/electronics12030559

APA Style

Wang, Y., Zou, J., & Zhang, K. (2023). Deep-Learning-Aided RF Fingerprinting for NFC Relay Attack Detection. Electronics, 12(3), 559. https://doi.org/10.3390/electronics12030559

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop