Physical Layer Authentication in Backscatter Communication: A Review

被引:1
作者
Yang, Yishan [1 ]
Yan, Zheng [1 ]
Zeng, Kai [2 ]
Wang, Pu [1 ]
Li, Jiajun [1 ]
机构
[1] Xidian Univ, Xian, Peoples R China
[2] George Mason Univ, Fairfax, VA USA
基金
中国国家自然科学基金;
关键词
Scattering; Physical layer; Authentication; Low-power electronics; Programmable logic arrays; Cryptography; Fingerprint recognition; Feature extraction; Energy consumption; Costs;
D O I
10.1109/MWC.012.2200364
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Backscatter communication (BC) has been introduced as a cutting-edge technology due to low cost and ultra-low-power consumption. However, its openness and broadcast nature bring severe security threats and vulnerabilities to BC systems. Physical layer authentication (PLA) is viewed as a supplement to cryptography-based authentication on backscatter devices (BDs) to provide enhanced security for BC by ensuring the eligibility of communication parties. Through feature extraction from signals as the fingerprint of a BD for authentication, computation and energy consumption at the resource-limited BD can be greatly reduced due to the avoidance of complex cryptography calculations. Although many existing works are devoted to exploiting PLA on BDs in BC systems, a technical overview of PLA in BC is still missing. Based on a comprehensive analysis of the security threats in BC systems, this article gives a review on PLA schemes in BC by employing a set of proposed criteria to analyze their performance. Based on the review, open issues are pointed out, with valuable suggestions on future research directions.
引用
收藏
页码:264 / 270
页数:7
相关论文
共 15 条
[1]   Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm [J].
Chen, Songlin ;
Wen, Hong ;
Wu, Jinsong ;
Chen, Jie ;
Lin, Wenjie ;
Hu, Lin ;
Chen, Yi .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[2]  
Han J., 2018, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, V2, P1
[3]   GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags [J].
Han, Jinsong ;
Qian, Chen ;
Yang, Panlong ;
Ma, Dan ;
Jiang, Zhiping ;
Xi, Wei ;
Zhao, Jizhong .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) :846-858
[4]   Detecting Colluding Sybil Attackers in Robotic Networks Using Backscatters [J].
Huang, Yong ;
Wang, Wei ;
Jiang, Tao ;
Zhang, Qian .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (02) :793-804
[5]  
Lei Yang, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P1966, DOI 10.1109/INFOCOM.2015.7218580
[6]   RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter [J].
Li, Jiawei ;
Li, Ang ;
Han, Dianqi ;
Zhang, Yan ;
Li, Tao ;
Zhang, Yanchao .
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, :700-709
[7]  
Li JW, 2020, IEEE INFOCOM SER, P2194, DOI [10.1109/INFOCOM41043.2020.9155427, 10.1109/infocom41043.2020.9155427]
[8]   HarvestPrint: Securing Battery-free Backscatter Tags through Fingerprinting [J].
Narayanan, Revathy ;
Varshney, Ambuj ;
Papadimitratos, Panos .
PROCEEDINGS OF THE THE 20TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS, HOTNETS 2021, 2021, :178-184
[9]   Hu-Fu: Replay-Resilient RFID Authentication [J].
Wang, Ge ;
Cai, Haofan ;
Qian, Chen ;
Han, Jinsong ;
Shi, Shouqian ;
Li, Xin ;
Ding, Han ;
Xi, Wei ;
Zhao, Jizhong .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (02) :547-560
[10]   BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications [J].
Wang, Pu ;
Yan, Zheng ;
Zeng, Kai .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :2818-2834