Di Candia et al., 2022 - Google Patents
Covert backscatter communication with directional MIMODi Candia et al., 2022
View PDF- Document ID
- 5827399357942399142
- Author
- Di Candia R
- Malik S
- Yiğitler H
- Jäntti R
- Publication year
- Publication venue
- arXiv preprint arXiv:2202.03899
External Links
Snippet
We study a backscatter communication protocol over a AWGN channel, where a transmitter illuminates a tag with a directional multi-antenna. The tag performs load modulation on the signal while hiding its physical presence from a warden. We show that, if the transmitter-to …
- 238000004891 communication 0 title abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Saad et al. | On the physical layer security of backscatter wireless systems | |
| Wang et al. | Energy-efficient covert communications for bistatic backscatter systems | |
| US20080012688A1 (en) | Secure rfid based ultra-wideband time-hopped pulse-position modulation | |
| Shahzad et al. | Covert communication in backscatter radio | |
| Al‐nahari | Physical layer security using massive multiple‐input and multiple‐output: passive and active eavesdroppers | |
| WO2011131745A1 (en) | Authenticated key exchange using distance bounding protocol | |
| Zhao et al. | Safeguarding RFID wireless communication against proactive eavesdropping | |
| Soderi et al. | Physical layer security based on spread‐spectrum watermarking and jamming receiver | |
| CN114651422B (en) | Communication device and method for secure communication | |
| Di Candia et al. | Covert backscatter communication with directional MIMO | |
| Lu et al. | A FMCW-based cross layer RF distance bounding scheme | |
| Song et al. | A distinctive method to improve the security capacity of backscatter wireless system | |
| Yu et al. | Securing RFID with ultra-wideband modulation | |
| Zhang et al. | Covert backscatter communication in the presence of multi-antenna eavesdropper | |
| Chai | Design and analysis of security schemes for low-cost RFID systems | |
| Van Huynh et al. | Defeating eavesdroppers with ambient backscatter communications | |
| Kim et al. | Covert communication by exploiting node multiplicity and channel variations | |
| Ranganathan et al. | Low-power distance bounding | |
| Taha et al. | Secret key establishment technique using channel state information driven phase randomisation in multiple‐input multiple‐output orthogonal frequency division multiplexing | |
| Huo et al. | A framework to securing RFID transmissions by varying transmitted reader's power | |
| Zhang et al. | CASCADE and CREAM: covert communications enhancement based on frequency diverse array | |
| Desouky et al. | Directional Modulation for Secure RFID in Health Systems | |
| Chai et al. | BUPLE: securing passive RFID communication through physical layer enhancements | |
| Chinaei et al. | An experimental study of secret key generation for passive Wi-Fi wearable devices | |
| Hamida et al. | Detecting relay attacks in RFID systems using physical layer characteristics |