[go: up one dir, main page]

Di Candia et al., 2022 - Google Patents

Covert backscatter communication with directional MIMO

Di Candia et al., 2022

View PDF
Document ID
5827399357942399142
Author
Di Candia R
Malik S
Yiğitler H
Jäntti R
Publication year
Publication venue
arXiv preprint arXiv:2202.03899

External Links

Snippet

We study a backscatter communication protocol over a AWGN channel, where a transmitter illuminates a tag with a directional multi-antenna. The tag performs load modulation on the signal while hiding its physical presence from a warden. We show that, if the transmitter-to …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B13/00Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise

Similar Documents

Publication Publication Date Title
Saad et al. On the physical layer security of backscatter wireless systems
Wang et al. Energy-efficient covert communications for bistatic backscatter systems
US20080012688A1 (en) Secure rfid based ultra-wideband time-hopped pulse-position modulation
Shahzad et al. Covert communication in backscatter radio
Al‐nahari Physical layer security using massive multiple‐input and multiple‐output: passive and active eavesdroppers
WO2011131745A1 (en) Authenticated key exchange using distance bounding protocol
Zhao et al. Safeguarding RFID wireless communication against proactive eavesdropping
Soderi et al. Physical layer security based on spread‐spectrum watermarking and jamming receiver
CN114651422B (en) Communication device and method for secure communication
Di Candia et al. Covert backscatter communication with directional MIMO
Lu et al. A FMCW-based cross layer RF distance bounding scheme
Song et al. A distinctive method to improve the security capacity of backscatter wireless system
Yu et al. Securing RFID with ultra-wideband modulation
Zhang et al. Covert backscatter communication in the presence of multi-antenna eavesdropper
Chai Design and analysis of security schemes for low-cost RFID systems
Van Huynh et al. Defeating eavesdroppers with ambient backscatter communications
Kim et al. Covert communication by exploiting node multiplicity and channel variations
Ranganathan et al. Low-power distance bounding
Taha et al. Secret key establishment technique using channel state information driven phase randomisation in multiple‐input multiple‐output orthogonal frequency division multiplexing
Huo et al. A framework to securing RFID transmissions by varying transmitted reader's power
Zhang et al. CASCADE and CREAM: covert communications enhancement based on frequency diverse array
Desouky et al. Directional Modulation for Secure RFID in Health Systems
Chai et al. BUPLE: securing passive RFID communication through physical layer enhancements
Chinaei et al. An experimental study of secret key generation for passive Wi-Fi wearable devices
Hamida et al. Detecting relay attacks in RFID systems using physical layer characteristics