APAuth: Authenticate an Access Point by Backscatter Devices | Semantic Scholar (2024)

Skip to search formSkip to main contentSkip to account menu

Semantic ScholarSemantic Scholar's Logo
@article{Chang2024APAuthAA, title={APAuth: Authenticate an Access Point by Backscatter Devices}, author={Jingdong Chang and Jiajun Li and Yishan Yang and Yifan Zhang and Masoud Kaveh and Zheng Yan}, journal={ICC 2024 - IEEE International Conference on Communications}, year={2024}, pages={3616-3621}, url={https://api.semanticscholar.org/CorpusID:271933762}}
  • Jingdong Chang, Jiajun Li, Zheng Yan
  • Published in ICC - IEEE International… 9 June 2024
  • Computer Science, Engineering
  • ICC 2024 - IEEE International Conference on Communications

APAuth is introduced, a lightweight authentication scheme that leverages the power value of BD to establish AP authentication and conducts numerical simulations to validate the practical viability and desired performance of APAuth in diverse real-world scenarios.

Figures and Tables from this paper

  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
  • table II

14 References

BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications

BAuth, a multi-stage authentication and attack tracing scheme based on the physical spatial information of BDs to realize enhanced BD authentication security for both static and mobile BDs is proposed.

  • 16
  • Highly Influential
  • PDF
SCBF: Exploiting a Collision for Authentication in Backscatter Networks
    Hoorin ParkJieun YuHeejun RohWonjun Lee

    Computer Science

    IEEE Communications Letters

  • 2017

This work proposes a novel concept of authentication scheme for backscatter networks that uses an unpredictable collision by applying a data structure called Shifted Counting Bloom Filter (SCBF) and can reduce the overhead of back scatter devices required for security.

  • 8
  • Highly Influential
Security Analysis of Triangle Channel-Based Physical Layer Key Generation in Wireless Backscatter Communications
    Jiajun LiPu WangLong JiaoZheng YanK. ZengYishan Yang

    Computer Science, Engineering

    IEEE Transactions on Information Forensics and…

  • 2023

Tri-Channel, a novel physical layer key generation scheme between two BDs by multiplying downlink signals and backscatter signals to obtain the information of a triangle channel as a shared random secret source for key generation implies that the scheme is advanced in terms of both security and efficiency of key generation.

  • 9
Tagora: A Collision-Exploitative RFID Authentication Protocol Based on Cross-Layer Approach
    Hoorin ParkHeejun RohWonjun Lee

    Computer Science, Engineering

    IEEE Internet of Things Journal

  • 2020

Tagora is proposed, a cross-layer authentication protocol, which is the first integration work of two-layer approaches that harness the unpredictable properties of tag’s collision responses at both the physical and application layers.

  • 13
Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-layer Approach
    Ahsan MehmoodWaqas AmanMuhammad Mahboob Ur RahmanM. ImranQ. Abbasi

    Computer Science, Engineering

    2020 International Conference on UK-China…

  • 2020

This work considers identity attack on a singlereader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag).

Resource Allocation Optimization for Secure Multi-device Wirelessly Powered Backscatter Communication with Artificial Noise
    Pu WangZheng YanNing WangK. Zeng

    Engineering, Computer Science

    IEEE Transactions on Wireless Communications

  • 2022

This paper considers a WPBC system in which a full-duplex access point transmits multi-sinewave signals to power back scatter devices (BDs) and injects artificial noise (AN) to secure their backscatter transmissions and proposes two algorithms to solve an energy maximization problem.

  • 10
  • PDF
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise
    Pu WangNing WangMonireh DabaghchianK. ZengZheng Yan

    Computer Science, Engineering

    IEEE INFOCOM 2019 - IEEE Conference on Computer…

  • 2019

This work presents an iterative algorithm by leveraging block coordinate descent (BCD) and successive convex approximation optimization to solve a non-convex problem incurred in WPBC and shows the convergence of the proposed algorithm and analyze its complexity.

  • 15
  • PDF
Optical Network Authentication through Rayleigh Backscattering Fingerprints of the Composing Fibers
    P. N. GokiThomas Teferi MulugetaN. SamboR. CaldelliL. Potí

    Engineering, Computer Science

    GLOBECOM 2022 - 2022 IEEE Global Communications…

  • 2022

A new method for network authentication, identification, and secure communication, using the optical physical unclonable function Challenge-Response (PUF-CRPs) database protocol is proposed and numerically validated.

  • 4
  • Highly Influential
RF-Rhythm: Secure and Usable Two-Factor RFID Authentication
    Jiawei LiChuyu Wang Yanchao Zhang

    Computer Science, Engineering

    IEEE INFOCOM 2020 - IEEE Conference on Computer…

  • 2020

This work proposes RF-Rhythm, a secure and usable two-factor RFID authentication system with strong resilience to lost/stolen/cloned RFID cards, and proposes a novel phase-hopping protocol in which the RFID reader emits Continuous Wave with random phases for extracting the user’s secret tapping rhythm.

RF Backscatter-Based Sensors for Structural Health Monitoring
    M. StanaćevićA. Ahmad P. Djurić

    Engineering

    2021 International Balkan Conference on…

  • 2021

It is demonstrated that the backscatter channel phase sensing enables quantification of a size of air gap between two RF sensors embedded in sand and the sensitivity of the phase to the strain of the sand is demonstrated.

  • 5

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    APAuth: Authenticate an Access Point by Backscatter Devices | Semantic Scholar (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Frankie Dare

    Last Updated:

    Views: 6105

    Rating: 4.2 / 5 (73 voted)

    Reviews: 88% of readers found this page helpful

    Author information

    Name: Frankie Dare

    Birthday: 2000-01-27

    Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

    Phone: +3769542039359

    Job: Sales Manager

    Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

    Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.