Safeguarding Backscatter RFID Communication against Proactive Eavesdropping

被引:1
作者
Zhao, Bing-Qing [1 ]
Wang, Hui-Ming
Jiang, Jia-Cheng
机构
[1] Xi An Jiao Tong Univ, Sch Informat & Commun Engn, Xian 710049, Shaanxi, Peoples R China
来源
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2020年
基金
中国国家自然科学基金;
关键词
Backscatter communication; RFID; physical layer security; proactive eavesdropping; artificial noise; optimization; SECURITY; ENERGY;
D O I
10.1109/icc40277.2020.9149064
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Passive radio frequency identification (RFID) systems raise new transmission secrecy protection challenges against the special proactive eavesdropper, since it is able to both enhance the information wiretap and interfere with the information detection at the RFID reader simultaneously by broadcasting its own continuous wave (CW) signal. To defend against proactive eavesdropping attacks, we propose an artificial-noise (AN) aided secure transmission scheme for the RFID reader, which superimposes an AN signal on the CW signal to confuse the proactive eavesdropper. The power allocation between the AN signal and the CW signal are optimized to maximize the secrecy rate. Furthermore, we model the attack and defense process between the proactive eavesdropper and the RFID reader as a hierarchical security game, and prove it can achieve the equilibrium. Simulation results show the superiority of our proposed scheme in terms of the secrecy rate and the interactions between the RFID reader and the proactive eavesdropper.
引用
收藏
页数:6
相关论文
共 15 条
[1]   Backscatter Communication and RFID: Coding, Energy, and MIMO Analysis [J].
Boyer, Colby ;
Roy, Sumit .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (03) :770-785
[2]  
Chai Q., 2012, P IEEE INT S WORLD W, P1
[3]   SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].
Chien, Hung-Yu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :337-340
[4]   Secrecy Capacity in CRN With Malicious Energy Harvester Using Game Theoretic Techniques [J].
Ghosh, Saptarshi ;
Bhatnagar, Manav R. ;
Singh, Ajay ;
Panigrahi, Bijaya K. .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2017, 3 (03) :343-360
[5]  
He B., 2013, ZTE COMMUN, V11, P11
[6]   Analysis and Validation of Active Eavesdropping Attacks in Passive FHSS RFID Systems [J].
Huo, Fei ;
Mitran, Patrick ;
Gong, Guang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) :1528-1541
[7]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394
[8]   Fully-Coherent Reader With Commodity SDR for Gen2 FM0 and Computational RFID [J].
Kargas, Nikos ;
Mavromatis, Fanis ;
Bletsas, Aggelos .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (06) :617-620
[9]  
Lucchetti R., 1987, Optimization, V18, P857, DOI 10.1080/02331938708843300
[10]   On the Physical Layer Security of Backscatter Wireless Systems [J].
Saad, Walid ;
Zhou, Xiangyun ;
Han, Zhu ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (06) :3442-3451