2022
DOI: 10.1109/tifs.2022.3195407
|View full text |Cite
|
Sign up to set email alerts
|

BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications

Abstract: Backscatter communication (BC) enables ultra-lowpower communications and allows devices to harvest energy simultaneously. But its practical deployment faces severe security threats caused by its nature of openness and broadcast. Authenticating backscatter devices (BDs) is treated as the first line of defense. However, complex cryptographic approaches are not desirable due to the limited computation capability of BDs. Existing physical layer authentication schemes cannot effectively support BD mobility, multipl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 52 publications
0
4
0
Order By: Relevance
“…Hence, researchers work on novel physical layer security algorithms for BC. Some of the proposed solutions are to generate artificial noise to degrade the channel quality of adversary nodes and tune the reflection coefficient to increase the security of the communication link [69][70][71][72][73].…”
Section: Future Research Directionsmentioning
confidence: 99%
“…Hence, researchers work on novel physical layer security algorithms for BC. Some of the proposed solutions are to generate artificial noise to degrade the channel quality of adversary nodes and tune the reflection coefficient to increase the security of the communication link [69][70][71][72][73].…”
Section: Future Research Directionsmentioning
confidence: 99%
“…For IoT devices, in addition to improving their power storage and computational capacity, green technologies are highly expected. Besides, parallel processing of big data (e.g., MapReduce [140] and cloud computing [141]), backscatter communication [142] and 6G technologies [143] should be applied to improve processing, communication and connectivity efficiency.…”
Section: B Efficiencymentioning
confidence: 99%
“…Moreover, the unlicensed and shared nature of the wireless spectrum in which BC operates raises concerns about interference and unauthorized access. Hence, ensuring the security of the BC system remains a critical challenge that should be considered in future wireless communication technologies such as sixth generation (6G) [5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%