Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and size that is driving the technology, a tag has limited computational capabilities and resources. This limitation makes the implementation of conventional security protocols to prevent cloning and counterfeiting inefficient. We have uniquely fingerprinted RFID tags based upon the minimum power response of the tag measured at multiple frequencies. The fingerprint can be used effectively to identify the tags in the future with high probability and to detect counterfeit tags. This mechanism does not increase the cost of the RED tags because it is independent of the computational capabilities and resources of the RFID tag. |