Safeguarding Backscatter RFID Communication against Proactive Eavesdropping
Passive radio frequency identification (RFID) systems raise new transmission secrecy protection challenges against the special proactive eavesdropper, since it is able to both enhance the information wiretap and interfere with the information detection at the RFID reader simultaneously by broadcasti...
Saved in:
Published in | ICC 2020 - 2020 IEEE International Conference on Communications (ICC) pp. 1 - 6 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Passive radio frequency identification (RFID) systems raise new transmission secrecy protection challenges against the special proactive eavesdropper, since it is able to both enhance the information wiretap and interfere with the information detection at the RFID reader simultaneously by broadcasting its own continuous wave (CW) signal. To defend against proactive eavesdropping attacks, we propose an artificial noise (AN) aided secure transmission scheme for the RFID reader, which superimposes an AN signal on the CW signal to confuse the proactive eavesdropper. The power allocation between the AN signal and the CW signal are optimized to maximize the secrecy rate. Furthermore, we model the attack and defense process between the proactive eavesdropper and the RFID reader as a hierarchical security game, and prove it can achieve the equilibrium. Simulation results show the superiority of our proposed scheme in terms of the secrecy rate and the interactions between the RFID reader and the proactive eavesdropper. |
---|---|
AbstractList | Passive radio frequency identification (RFID) systems raise new transmission secrecy protection challenges against the special proactive eavesdropper, since it is able to both enhance the information wiretap and interfere with the information detection at the RFID reader simultaneously by broadcasting its own continuous wave (CW) signal. To defend against proactive eavesdropping attacks, we propose an artificial noise (AN) aided secure transmission scheme for the RFID reader, which superimposes an AN signal on the CW signal to confuse the proactive eavesdropper. The power allocation between the AN signal and the CW signal are optimized to maximize the secrecy rate. Furthermore, we model the attack and defense process between the proactive eavesdropper and the RFID reader as a hierarchical security game, and prove it can achieve the equilibrium. Simulation results show the superiority of our proposed scheme in terms of the secrecy rate and the interactions between the RFID reader and the proactive eavesdropper. |
Author | Zhao, Bing-Qing Wang, Hui-Ming Jiang, Jia-Cheng |
Author_xml | – sequence: 1 givenname: Bing-Qing surname: Zhao fullname: Zhao, Bing-Qing organization: Xi'an Jiaotong University,School of Information and Communication Engineering – sequence: 2 givenname: Hui-Ming surname: Wang fullname: Wang, Hui-Ming organization: Xi'an Jiaotong University,School of Information and Communication Engineering – sequence: 3 givenname: Jia-Cheng surname: Jiang fullname: Jiang, Jia-Cheng organization: Xi'an Jiaotong University,School of Information and Communication Engineering |
BookMark | eNotj9tKxDAURaMoOB39AhHyA605SZrLo9YZLQ4oXp6HtDkpUXuh7Qz49w44TxsWrAU7IWdd3yEhN8AyAGZvy6KQjGudccZZZkFapuQJSUBzAzkzlp-SBVhhUjBGXJBkmr4Yy7kVsCDP7y5gs3Ojj11D7139PdVunnGkb-vygRZ92-66eECx76hrXOymmb6OvavnuEe6cnuc_NgPw0G_JOfB_Ux4ddwl-VyvPoqndPPyWBZ3mzRyJuZUS0AMaFUQIJUUogqVzhXnlakU6JwJ4W0uXOVrBK18yCsrpfIuGG8BQSzJ9X83IuJ2GGPrxt_t8bj4A9BpT7A |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/ICC40277.2020.9149064 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1728150892 9781728150895 |
EISSN | 1938-1883 |
EndPage | 6 |
ExternalDocumentID | 9149064 |
Genre | orig-research |
GroupedDBID | 29F 29I 6IE 6IF 6IH 6IK 6IM AAJGR ACGFS ALMA_UNASSIGNED_HOLDINGS CBEJK IPLJI JC5 M43 RIE RIO |
ID | FETCH-LOGICAL-i203t-741eefe96f3146433bfb75622b8b6175033d953abdce176df5b9446daf8d91e13 |
IEDL.DBID | RIE |
IngestDate | Mon Jul 08 05:38:32 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-741eefe96f3146433bfb75622b8b6175033d953abdce176df5b9446daf8d91e13 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9149064 |
PublicationCentury | 2000 |
PublicationDate | 2020-June |
PublicationDateYYYYMMDD | 2020-06-01 |
PublicationDate_xml | – month: 06 year: 2020 text: 2020-June |
PublicationDecade | 2020 |
PublicationTitle | ICC 2020 - 2020 IEEE International Conference on Communications (ICC) |
PublicationTitleAbbrev | ICC |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0052931 |
Score | 2.1578872 |
Snippet | Passive radio frequency identification (RFID) systems raise new transmission secrecy protection challenges against the special proactive eavesdropper, since it... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | artificial noise Backscatter Backscatter communication Eavesdropping Games Optimization physical layer security proactive eavesdropping Radiofrequency identification Resource management RFID Security |
Title | Safeguarding Backscatter RFID Communication against Proactive Eavesdropping |
URI | https://ieeexplore.ieee.org/document/9149064 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nWDh0SLeysBI0rwTr5RWLagIAZW6VXZ8jiqkFJWUgV_P2UkLRQxskSUnlm3dfZe77zuAq9SNKERTaPMUFQUoLrfTOJG2p6X3IpUJ3_RPGT_Ew0l4N42mDbjecGEQ0RSfoaMfTS5fLrKV_lXWZQTnyYU2oZkwVnG11lY3Irfl1Qwdz2XdUa8X6vQkRYC-69QTtzqoGAcy2IPx-tNV3cirsyqFk33-UmX879r2ofNN1bMeN07oABpYHMLuD5XBNtw_c4W5uQpFbt1oUn1mVDWtp8Ho1tqiiFg853NCjPqd3JhCq88_8F0uF1rIIe_AZNB_6Q3tuoeCPffdoLQJMCAqZLEKyCaGQSCUSAjz-CIVBF50ElOyKOBCZuglsVSRYBQhSq5SyTz0giNoFYsCj8FK0ghDxVPmI4ZZGAuaFBOc8iUmTHjqBNp6W2ZvlUzGrN6R07-Hz2BHH01VdXUOrXK5wgvy76W4NAf7BQnSpm4 |
link.rule.ids | 310,311,783,787,792,793,799,23942,23943,25152,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKGYCFR0G8ycBI2rxjr5RWLX0IQSt1q-z4HFVIKSopA7-es5MWihjYIktOLNu6-y5333eE3FInxBBNgc0pKAxQHG7TKJa2q6X3QpUIz_RPGQyjzjh4nISTCrlbc2EAwBSfQV0_mly-nCdL_auswRDOowvdItuIq2lUsLVWdjdEx-WWHB3XYY1usxnoBCXGgJ5TL6du9FAxLqS9TwarjxeVI6_1ZS7qyecvXcb_ru6AHH-T9ayntRs6JBXIjsjeD53BGum9cAWpuQxZat1rWn1idDWt53b3wdogiVg85TPEjPqd3BhDq8U_4F0u5lrKIT0m43Zr1OzYZRcFe-Y5fm4jZABQwCLlo1UMfF8oESPq8QQVCF90GlOy0OdCJuDGkVShYBgjSq6oZC64_gmpZvMMTokV0xACxSnzAIIkiAROihBQeRJiJlx1Rmp6W6ZvhVDGtNyR87-Hb8hOZzToT_vdYe-C7OpjKmqwLkk1XyzhCr19Lq7NIX8B7FSpuQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=ICC+2020+-+2020+IEEE+International+Conference+on+Communications+%28ICC%29&rft.atitle=Safeguarding+Backscatter+RFID+Communication+against+Proactive+Eavesdropping&rft.au=Zhao%2C+Bing-Qing&rft.au=Wang%2C+Hui-Ming&rft.au=Jiang%2C+Jia-Cheng&rft.date=2020-06-01&rft.pub=IEEE&rft.eissn=1938-1883&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICC40277.2020.9149064&rft.externalDocID=9149064 |