<?xml version="1.0"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-05-20T16:57:33Z</responseDate><request verb="GetRecord" metadataPrefix="oai_dc">https://keep.lib.asu.edu/oai/request</request><GetRecord><record><header><identifier>oai:keep.lib.asu.edu:node-201886</identifier><datestamp>2025-07-17T19:39:31Z</datestamp><setSpec>oai_pmh:all</setSpec><setSpec>oai_pmh:repo_items</setSpec></header><metadata><oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><dc:identifier>201886</dc:identifier>
          <dc:identifier>https://hdl.handle.net/2286/R.2.N.201886</dc:identifier>
                  <dc:rights>http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
          <dc:rights>All Rights Reserved</dc:rights>
                  <dc:date>2025</dc:date>
                  <dc:format>142 pages</dc:format>
                  <dc:type>Doctoral Dissertation</dc:type>
          <dc:type>Academic theses</dc:type>
                  <dc:language>en</dc:language>
                  <dc:contributor>Li, Jiawei</dc:contributor>
          <dc:contributor>Zhang, Yanchao</dc:contributor>
          <dc:contributor>Reisslein, Martin</dc:contributor>
          <dc:contributor>Xue, Guoliang</dc:contributor>
          <dc:contributor>Zou, Shaofeng</dc:contributor>
          <dc:contributor>Arizona State University</dc:contributor>
                  <dc:description>Partial requirement for: Ph.D., Arizona State University, 2025</dc:description>
          <dc:description>Field of study: Computer Engineering</dc:description>
          <dc:description>Radio-frequency identification (RFID) tags are now common in stores, factories, and everyday devices. These small, low-cost tags make tracking and access easy, yet they also open new doors for security and privacy problems. This dissertation shows how modern machine-learning tools can both protect RFID systems and power new attacks that use RFID tags in unexpected ways.

This work contains three main chapters and a final chapter. Chapter 2 introduces RF-Rhythm (Radio Frequency Rhythm) for two-factor authentication. Chapter 3 presents RCID (Reflection Coefficient-based RFID Fingerprint). Chapter 4 describes TagStroke, a keystroke inference attack using an RFID tag array under a keyboard. Chapter 5 presents the conclusion and future directions.

RF-Rhythm turns a standard RFID card into a two-factor authenticator. Users tap a personal rhythm, producing unique phase patterns in the backscatter. A machine learning model learns the pattern, while phase hopping prevents eavesdropping. User tests show near-zero false accepts or rejects.

RCID secures the RFID system with each tag’s wideband RF fingerprints. A special Orthogonal Frequency Division Multiplexing (OFDM) powered RFID reader captures a 20 MHz profile in milliseconds, and a convolutional neural network tells tags apart. In tests with 600 off-the-shelf tags, RCID reached 97% accuracy and offered about 202 bits of fingerprint entropy.

TagStroke shows the other side of RFID use. By hiding a small tag array under a keyboard, an attacker can read tiny signal changes caused by typing, even from a few meters away. A temporal-convolution and transformer model spots keystrokes, and a large language model improves text recovery. Experiments with 11 volunteers achieved 87% key accuracy and a 21% word-error rate.

</dc:description>
                  <dc:subject>Computer Engineering</dc:subject>
          <dc:subject>Electrical Engineering</dc:subject>
          <dc:subject>Computer Science</dc:subject>
          <dc:subject>RFID</dc:subject>
          <dc:subject>Security</dc:subject>
                  <dc:title>AI-Based RFID System Security and Privacy: Challenges and Solutions</dc:title></oai_dc:dc></metadata></record></GetRecord></OAI-PMH>
