The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020 International Conference on UK-China Emerging Technologies (UCET) 2020
DOI: 10.1109/ucet51115.2020.9205427
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-layer Approach

Abstract: This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a singlereader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag)-having the same ID as the Ltag programmed in its memory by a wizard-attempts to deceive the reader by pretending t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 21 publications
(13 reference statements)
0
7
0
Order By: Relevance
“…Identity attacks in back-scatter communication are another major concern. A physical layer authentication via a residual channel at the reader end could possibly be one of the solutions (Mehmood et al, 2020), but there is still room to improve the accuracy of such schemes when deployed in densely populated tag areas. Just like the RF sensing and IoT devices, RFID communication also poses several technical challenges and its use in daily life for assistive living.…”
Section: Discussion and Present/future Challengesmentioning
confidence: 99%
“…Identity attacks in back-scatter communication are another major concern. A physical layer authentication via a residual channel at the reader end could possibly be one of the solutions (Mehmood et al, 2020), but there is still room to improve the accuracy of such schemes when deployed in densely populated tag areas. Just like the RF sensing and IoT devices, RFID communication also poses several technical challenges and its use in daily life for assistive living.…”
Section: Discussion and Present/future Challengesmentioning
confidence: 99%
“…Zanetti et al [17] proposed a fingerprinting scheme that measures average baseband power (ABP) and time interval error (TIE) from the fixed RN16 preamble as tag identification information. Mehmood et al [23] used the non-reciprocity of the residual channel between a reader and an RFID tag as the fingerprint of the tag to defend fault tag attacks. However, such features, e.g., modulation shape and TIE, are sensitive to environments, thus unstable for device authentication when BD is moving.…”
Section: B Physical Layer Authenticationmentioning
confidence: 99%
“…Geneprint [22] leverages the internal similarity of backscattered signals to extract BD hardware features for authentication in RFID systems. Mehmood et al [23] used the non-reciprocity of the residual channel between a reader and an RFID tag as the fingerprint of the tag to defend fault tag attacks. However, the existing works about RFID tag authentication including the above [17], [22], [24], [25] assume a sophisticated signal analyzer applied by an RFID reader to extract specific features.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…2) Physical Layer Security (PLS): PLS is increasingly becoming an attractive area of research due to its promising performances in many wireless communication systems [149][150][151][152][153][154][155][156][157][158]. PlS exploits the random nature of the physical layer for security purposes, which not only enhances security, but also greatly improve efficiency.…”
Section: A a Primer On Information Securitymentioning
confidence: 99%