BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications

被引:23
作者
Wang, Pu [1 ]
Yan, Zheng [1 ,2 ]
Zeng, Kai [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab ISN, Xian 710026, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
[3] George Mason Univ, Dept Elect & Comp Engn, Dept Cyber Secur Engn, Fairfax, VA 22030 USA
[4] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
基金
芬兰科学院; 中国国家自然科学基金;
关键词
Authentication; Security; Physical layer; Feature extraction; Servers; RF signals; Backscatter; Backscatter communication; physical layer security; device authentication; attack detection; positioning; WIRELESS; SECURITY; PROTOCOL; SCHEME;
D O I
10.1109/TIFS.2022.3195407
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Backscatter communication (BC) enables ultra-low-power communications and allows devices to harvest energy simultaneously. But its practical deployment faces severe security threats caused by its nature of openness and broadcast. Authenticating backscatter devices (BDs) is treated as the first line of defense. However, complex cryptographic approaches are not desirable due to the limited computation capability of BDs. Existing physical layer authentication schemes cannot effectively support BD mobility, multiple attacker identification and attacker location tracing in an integrated way. To tackle these problems, this paper proposes BCAuth, a multi-stage authentication and attack tracing scheme based on the physical spatial information of BDs to realize enhanced BD authentication security for both static and mobile BDs. After initial authentication based on BD identity with its position information registration, preemptive authentication and re-authentication are performed according to spatial correlation of backscattered signal source locations associated with the BD. By exploiting clustering-based analysis on spacial information, BCAuth is capable of determining the number of attackers and localizing their positions. In addition, we propose a reciprocal channel-based method for BD re-authentication with better authentication performance than the clustering-based method for mobile BDs when the BDs is able to measure received signal strength (RSS), which also enables mutual authentication. We theoretically analyze BCAuth security and conduct extensive numerical simulations with various settings to show its desirable performance.
引用
收藏
页码:2818 / 2834
页数:17
相关论文
共 59 条
[1]   Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices [J].
Ali, Syed Taha ;
Sivaraman, Vijay ;
Ostry, Diethelm .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) :2763-2776
[2]  
[Anonymous], 1999, MODERN INFORM RETRIE
[3]  
[Anonymous], 2013, Wirelessly powered sensor networks and computational RFID
[4]   An Aloha protocol for multihop mobile wireless networks [J].
Baccelli, F ;
Blaszczyszyn, B ;
Mühlethaler, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (02) :421-436
[5]   Stochastic properties of the random waypoint mobility model [J].
Bettstetter, C ;
Hartenstein, H ;
Pérez-Costa, X .
WIRELESS NETWORKS, 2004, 10 (05) :555-567
[6]  
Calder K., 1953, Statistical inference
[7]   Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks [J].
Chen, Yingying ;
Yang, Jie ;
Trappe, Wade ;
Martin, Richard P. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (05) :2418-2434
[8]   SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].
Chien, Hung-Yu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :337-340
[9]  
Cho Y., 2010, MIMO OFDMWIRELESS CO
[10]  
Danev B., 2009, P USENIX SEC S, P199