Skip to search formSkip to main contentSkip to account menu
DOI:10.1109/ICC51166.2024.10623058 - Corpus ID: 271933762
@article{Chang2024APAuthAA, title={APAuth: Authenticate an Access Point by Backscatter Devices}, author={Jingdong Chang and Jiajun Li and Yishan Yang and Yifan Zhang and Masoud Kaveh and Zheng Yan}, journal={ICC 2024 - IEEE International Conference on Communications}, year={2024}, pages={3616-3621}, url={https://api.semanticscholar.org/CorpusID:271933762}}
- Jingdong Chang, Jiajun Li, Zheng Yan
- Published in ICC - IEEE International… 9 June 2024
- Computer Science, Engineering
- ICC 2024 - IEEE International Conference on Communications
APAuth is introduced, a lightweight authentication scheme that leverages the power value of BD to establish AP authentication and conducts numerical simulations to validate the practical viability and desired performance of APAuth in diverse real-world scenarios.
Figures and Tables from this paper
- figure 1
- figure 2
- figure 3
- figure 4
- table I
- table II
14 References
- Pu WangZheng YanK. Zeng
- 2022
Computer Science, Engineering
IEEE Transactions on Information Forensics and…
BAuth, a multi-stage authentication and attack tracing scheme based on the physical spatial information of BDs to realize enhanced BD authentication security for both static and mobile BDs is proposed.
- 16
- Highly Influential
- PDF
- Hoorin ParkJieun YuHeejun RohWonjun Lee
- 2017
Computer Science
IEEE Communications Letters
This work proposes a novel concept of authentication scheme for backscatter networks that uses an unpredictable collision by applying a data structure called Shifted Counting Bloom Filter (SCBF) and can reduce the overhead of back scatter devices required for security.
- 8
- Highly Influential
- Jiajun LiPu WangLong JiaoZheng YanK. ZengYishan Yang
- 2023
Computer Science, Engineering
IEEE Transactions on Information Forensics and…
Tri-Channel, a novel physical layer key generation scheme between two BDs by multiplying downlink signals and backscatter signals to obtain the information of a triangle channel as a shared random secret source for key generation implies that the scheme is advanced in terms of both security and efficiency of key generation.
- 9
- Hoorin ParkHeejun RohWonjun Lee
- 2020
Computer Science, Engineering
IEEE Internet of Things Journal
Tagora is proposed, a cross-layer authentication protocol, which is the first integration work of two-layer approaches that harness the unpredictable properties of tag’s collision responses at both the physical and application layers.
- 13
- Ahsan MehmoodWaqas AmanMuhammad Mahboob Ur RahmanM. ImranQ. Abbasi
- 2020
Computer Science, Engineering
2020 International Conference on UK-China…
This work considers identity attack on a singlereader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag).
- Pu WangZheng YanNing WangK. Zeng
- 2022
Engineering, Computer Science
IEEE Transactions on Wireless Communications
This paper considers a WPBC system in which a full-duplex access point transmits multi-sinewave signals to power back scatter devices (BDs) and injects artificial noise (AN) to secure their backscatter transmissions and proposes two algorithms to solve an energy maximization problem.
- 10
- PDF
- Pu WangNing WangMonireh DabaghchianK. ZengZheng Yan
- 2019
Computer Science, Engineering
IEEE INFOCOM 2019 - IEEE Conference on Computer…
This work presents an iterative algorithm by leveraging block coordinate descent (BCD) and successive convex approximation optimization to solve a non-convex problem incurred in WPBC and shows the convergence of the proposed algorithm and analyze its complexity.
- 15
- PDF
- P. N. GokiThomas Teferi MulugetaN. SamboR. CaldelliL. Potí
- 2022
Engineering, Computer Science
GLOBECOM 2022 - 2022 IEEE Global Communications…
A new method for network authentication, identification, and secure communication, using the optical physical unclonable function Challenge-Response (PUF-CRPs) database protocol is proposed and numerically validated.
- 4
- Highly Influential
- Jiawei LiChuyu Wang Yanchao Zhang
- 2020
Computer Science, Engineering
IEEE INFOCOM 2020 - IEEE Conference on Computer…
This work proposes RF-Rhythm, a secure and usable two-factor RFID authentication system with strong resilience to lost/stolen/cloned RFID cards, and proposes a novel phase-hopping protocol in which the RFID reader emits Continuous Wave with random phases for extracting the user’s secret tapping rhythm.
- 15 [PDF]
- M. StanaćevićA. Ahmad P. Djurić
- 2021
Engineering
2021 International Balkan Conference on…
It is demonstrated that the backscatter channel phase sensing enables quantification of a size of air gap between two RF sensors embedded in sand and the sensitivity of the phase to the strain of the sand is demonstrated.
- 5
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers