Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-Layer Approach

09/01/2020
by   Ahsan Mehmood, et al.
0

This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a single-reader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag)—having the same ID as the L-tag programmed in its memory by a wizard—attempts to deceive the reader by pretending to be the L-tag. To this end, we counter the identity attack by exploiting the non-reciprocity of the end-to-end channel (i.e., the residual channel) between the reader and the tag as the fingerprint of the tag. The passive nature of the tag(s) (and thus, lack of any computational platform at the tag) implies that the proposed light-weight physical-layer authentication method is implemented at the reader. To be concrete, in our proposed scheme, the reader acquires the raw data via two-way (challenge-response) message exchange mechanism, does least-squares estimation to extract the fingerprint, and does binary hypothesis testing to do authentication. We also provide closed-form expressions for the two error probabilities of interest (i.e., false alarm and missed detection). Simulation results attest to the efficacy of the proposed method.

READ FULL TEXT
research
07/18/2019

Channel Impulse Response-based Physical Layer Authentication in a Diffusion-based Molecular Communication System

Consider impersonation attack by an active malicious nano node (Eve) on ...
research
05/23/2020

Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications

Achieving ultra-reliable, low-latency and secure communications is essen...
research
01/21/2020

Physical Layer Authentication for Non-coherent Massive SIMO-Based Industrial IoT Communications

Achieving ultra-reliable, low-latency and secure communications is essen...
research
02/08/2022

Covert backscatter communication with directional MIMO

We study a backscatter communication protocol over a AWGN channel, where...
research
10/19/2022

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

Radio Frequency Identification (RFID) is a key technology used in many a...
research
02/12/2020

On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

This paper investigates the impact of authentication on effective capaci...
research
07/14/2020

Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band

Nanoscale communication systems operating in Ter-ahertz (THz) band are a...

Please sign up or login with your details

Forgot password? Click here to reset