Projekteja vuodessa
Abstrakti
Backscatter communication (BC) represents a wireless communication technology that facilitates the transmission of data by low-power devices, referred to as backscatter devices (BDs), through the modulation or reflection of pre-existing wireless signals, typically sourced from an access point (AP). The advent of the Internet of Things (IoT) has garnered significant attention and witnessed the widespread adoption of BC, primarily due to its exceptional energy- efficiency characteristics. Nevertheless, the security of BC systems faces substantial threats when deployed in practical scenarios due to their inherent openness. Specifically, wireless BDs, which directly engage with users, are susceptible to detrimental consequences in the event of interactions with counterfeit wireless APs. Owing to their non-authenticated and unconditional reflection properties, BDs are vulnerable to spoofing attacks orchestrated by malicious APs. Moreover, their limited computing capabilities make it challenging to employ intricate cryptographic algorithms. To tackle these challenges, we introduce APAuth, a lightweight authentication scheme that leverages the power value of BD to establish AP authentication. In this scheme, BDs and APs share a confidential key and engage in negotiations to determine a key generation algorithm. Subsequently, the current stored power value of BD is utilized to calculate the power value that must be delivered to BD from AP. If the computed charging power value aligns with the value determined by the key generation algorithm, the AP successfully passes the authentication of BD. We perform a thorough theoretical analysis of the security aspects inherent in our proposed scheme. We further conduct numerical simulations to validate the practical viability and desired performance of APAuth in diverse real-world scenarios.
Alkuperäiskieli | Englanti |
---|---|
Otsikko | ICC 2024 - IEEE International Conference on Communications |
Toimittajat | Matthew Valenti, David Reed, Melissa Torres |
Kustantaja | IEEE |
Sivut | 3616-3621 |
Sivumäärä | 6 |
ISBN (elektroninen) | 978-1-7281-9054-9 |
ISBN (painettu) | 978-1-7281-9055-6 |
DOI - pysyväislinkit | |
Tila | Julkaistu - 13 kesäk. 2024 |
OKM-julkaisutyyppi | A4 Artikkeli konferenssijulkaisussa |
Tapahtuma | IEEE International Conference on Communications - Denver, Denver, Yhdysvallat Kesto: 9 kesäk. 2024 → 13 kesäk. 2024 |
Julkaisusarja
Nimi | IEEE International Conference on Communications |
---|---|
ISSN (elektroninen) | 1938-1883 |
Conference
Conference | IEEE International Conference on Communications |
---|---|
Maa/Alue | Yhdysvallat |
Kaupunki | Denver |
Ajanjakso | 09/06/2024 → 13/06/2024 |
Sormenjälki
Sukella tutkimusaiheisiin 'APAuth: Authenticate an Access Point by Backscatter Devices'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.Projektit
- 2 Päättynyt
-
DataTrust mobility: Research Mobility: Theory and Technology of Cross-Border Data Security
Yan, Z. (Vastuullinen tutkija)
01/03/2022 → 31/12/2024
Projekti: RCF Researcher Mobility
-
SecBackCom: Secure Wireless Powered Backscatter Communication for IoT
Yan, Z. (Vastuullinen tutkija)
01/01/2022 → 31/12/2024
Projekti: RCF Other