Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205326
S. F. Jilani, Qammer H. Abassi, A. Alomainy
This paper presents a 4-element multiple-input-multiple-output (MIMO) configuration of planar and compact two-dimensional (2D) grid antennas. The proposed grid is a 2D array of thirteen circular patches each with a radius of 0.175$lambda _{mathbf{o}}$, having a single feed point. Measured results of the single-element microstrip-fed grid-array antenna show a 6 GHz bandwidth in the range of 27-33 GHz. The realized gain is above 9 dBi in almost the whole range with a peak gain of 11.57 dBi at 29 GHz. The numerically calculated antenna efficiency is above 80%. The transmission characteristics of the 4-element MIMO array are below –27 dB that indicates low mutual coupling and high isolation. These high-performance aspects of the proposed millimetre-wave (mm-wave) MIMO antenna array validate its potential for the 5$^{mathbf{th}}$ generation (5G) cellular devices especially in indoor base-stations.
{"title":"Millimetre-Wave MIMO Array of a Compact Grid Antenna for 5G Wireless Networks and Beyond","authors":"S. F. Jilani, Qammer H. Abassi, A. Alomainy","doi":"10.1109/UCET51115.2020.9205326","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205326","url":null,"abstract":"This paper presents a 4-element multiple-input-multiple-output (MIMO) configuration of planar and compact two-dimensional (2D) grid antennas. The proposed grid is a 2D array of thirteen circular patches each with a radius of 0.175$lambda _{mathbf{o}}$, having a single feed point. Measured results of the single-element microstrip-fed grid-array antenna show a 6 GHz bandwidth in the range of 27-33 GHz. The realized gain is above 9 dBi in almost the whole range with a peak gain of 11.57 dBi at 29 GHz. The numerically calculated antenna efficiency is above 80%. The transmission characteristics of the 4-element MIMO array are below –27 dB that indicates low mutual coupling and high isolation. These high-performance aspects of the proposed millimetre-wave (mm-wave) MIMO antenna array validate its potential for the 5$^{mathbf{th}}$ generation (5G) cellular devices especially in indoor base-stations.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116698514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205319
S. Goutam, S. Unnikrishnan, A. Karandikar
Globally, there has been a big leap in the use of smart phones which are equipped to provide access to multiple interfaces as required in Next Generation Networks. Next Generation Networks are heterogeneous in nature, supporting various radio access technologies. In such a scenario, efficient Vertical Handover becomes a necessity to provide Ubiquitous connectivity, transparent to the user and the running applications. In this paper, we have presented VHDA based on Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). The input parameters to VHDA are RSS, bandwidth, latency, jitter, packet loss and network coverage.
{"title":"Algorithm for handover decision based on TOPSIS","authors":"S. Goutam, S. Unnikrishnan, A. Karandikar","doi":"10.1109/UCET51115.2020.9205319","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205319","url":null,"abstract":"Globally, there has been a big leap in the use of smart phones which are equipped to provide access to multiple interfaces as required in Next Generation Networks. Next Generation Networks are heterogeneous in nature, supporting various radio access technologies. In such a scenario, efficient Vertical Handover becomes a necessity to provide Ubiquitous connectivity, transparent to the user and the running applications. In this paper, we have presented VHDA based on Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). The input parameters to VHDA are RSS, bandwidth, latency, jitter, packet loss and network coverage.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"123 37","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120818902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205418
O. Yurduseven, S. Podilchak, M. Khalily
We present the concept of holographic beam forming metasurface antenna for CubeSat platforms at X-band frequencies. The proposed metasurface topology exhibits a flat-panel system layout, particularly desirable for integration with CubeSat platforms without a hardware-intense deployment mechanism for launch. It is shown that appropriately interacting the guided-mode (or reference-wave) with a metasurface layer makes it possible to realize the radiation pattern of interest as an objective function - similar to an optical hologram - without the need for dedicated phase shifting circuits. The full-wave simulations of the designed metasurface layer integrated with a 1U CubeSat reveals a high-fidelity beam-control with an aperture efficiency greater than 40% at 10 GHz operating frequency.
{"title":"Towards Holographic Beam-Forming Metasurface Technology for Next Generation CubeSats","authors":"O. Yurduseven, S. Podilchak, M. Khalily","doi":"10.1109/UCET51115.2020.9205418","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205418","url":null,"abstract":"We present the concept of holographic beam forming metasurface antenna for CubeSat platforms at X-band frequencies. The proposed metasurface topology exhibits a flat-panel system layout, particularly desirable for integration with CubeSat platforms without a hardware-intense deployment mechanism for launch. It is shown that appropriately interacting the guided-mode (or reference-wave) with a metasurface layer makes it possible to realize the radiation pattern of interest as an objective function - similar to an optical hologram - without the need for dedicated phase shifting circuits. The full-wave simulations of the designed metasurface layer integrated with a 1U CubeSat reveals a high-fidelity beam-control with an aperture efficiency greater than 40% at 10 GHz operating frequency.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115473024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205454
K. Hayama, S. Fujita, Y. Kuriyama, Keiichiro Maeda, M. Tsujimoto, I. Kakeya
We present a direct proof of synchronized macroscopic Josephson oscillations excited in two intrinsic Josephson junction stacks formed on a Bi 2 Sr 2 CaCu $_{2} mathrm{O}_{{8+} {delta }}$ single crystal. The strong coupling between the Josephson oscillations in the two mesas via the base crystal is detected by polarization analysis of emitted terahertz waves from individually biased mesas and simultaneously biased mesas.
{"title":"Mutual Synchronization of Terahertz Emissions from Multiple Intrinsic Josephson Junction Mesas","authors":"K. Hayama, S. Fujita, Y. Kuriyama, Keiichiro Maeda, M. Tsujimoto, I. Kakeya","doi":"10.1109/UCET51115.2020.9205454","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205454","url":null,"abstract":"We present a direct proof of synchronized macroscopic Josephson oscillations excited in two intrinsic Josephson junction stacks formed on a Bi 2 Sr 2 CaCu $_{2} mathrm{O}_{{8+} {delta }}$ single crystal. The strong coupling between the Josephson oscillations in the two mesas via the base crystal is detected by polarization analysis of emitted terahertz waves from individually biased mesas and simultaneously biased mesas.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205412
Shahzad Ashraf, Tauqeer Ahmed
Almost all smart appliances are operated through wireless sensor networks. With the passage of time, due to various applications, the WSN becomes prone to various external attacks. Preventing such attacks, Intrusion Detection strategy (IDS) is very crucial to secure the network from the malicious attackers. The proposed IDS methodology discovers the pattern in large data corpus which works for different types of algorithms to detect four types of Denial of service (DoS) attacks, namely, Grayhole, Blackhole, Flooding, and TDMA. The state-of-the-art detection algorithms, such as KNN, Naïve Bayes, Logistic Regression, Support Vector Machine (SVM), and ANN are applied to the data corpus and analyze the performance in detecting the attacks. The analysis shows that these algorithms are applicable for the detection and prediction of unavoidable attacks and can be recommended for network experts and analysts.
{"title":"Sagacious Intrusion Detection Strategy in Sensor Network","authors":"Shahzad Ashraf, Tauqeer Ahmed","doi":"10.1109/UCET51115.2020.9205412","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205412","url":null,"abstract":"Almost all smart appliances are operated through wireless sensor networks. With the passage of time, due to various applications, the WSN becomes prone to various external attacks. Preventing such attacks, Intrusion Detection strategy (IDS) is very crucial to secure the network from the malicious attackers. The proposed IDS methodology discovers the pattern in large data corpus which works for different types of algorithms to detect four types of Denial of service (DoS) attacks, namely, Grayhole, Blackhole, Flooding, and TDMA. The state-of-the-art detection algorithms, such as KNN, Naïve Bayes, Logistic Regression, Support Vector Machine (SVM), and ANN are applied to the data corpus and analyze the performance in detecting the attacks. The analysis shows that these algorithms are applicable for the detection and prediction of unavoidable attacks and can be recommended for network experts and analysts.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122974664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205320
Haoyang Jiang, Qingkui Song, J. Kernec
Deep learning technology achieves state of the art result in many computer vision missions. However, some researchers point out that current widely used deep learning architectures are vulnerable to adversarial examples. Adversarial examples are inputs generated by applying small and often imperceptible perturbation to examples in the dataset, such that the perturbed examples can degrade the performance of the deep learning architecture.In the paper, we propose a novel adversarial examples generation method. Adversarial examples generated using this method can have small perturbation and have more diversity compare to adversarial examples generated by other method.
{"title":"Searching the Adversarial Example in the Decision Boundary","authors":"Haoyang Jiang, Qingkui Song, J. Kernec","doi":"10.1109/UCET51115.2020.9205320","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205320","url":null,"abstract":"Deep learning technology achieves state of the art result in many computer vision missions. However, some researchers point out that current widely used deep learning architectures are vulnerable to adversarial examples. Adversarial examples are inputs generated by applying small and often imperceptible perturbation to examples in the dataset, such that the perturbed examples can degrade the performance of the deep learning architecture.In the paper, we propose a novel adversarial examples generation method. Adversarial examples generated using this method can have small perturbation and have more diversity compare to adversarial examples generated by other method.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129196098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205376
R. Khan, M. Abbas, Rubia Anjum, Fatima Waheed, Sheeraz Ahmed, F. Bangash
Human activity recognition is gaining increasing importance because of its implication in remote monitoring application including security, health and fitness apps. This paper provides an analysis of different machine learning techniques for recognizing human activity. Firstly, all the recent work related to human activity recognition using accelerometer data is analyzed and presented in the paper. In this study the accelerometer used in smartphones as well as those embedded in wearable devices are compared and recognition methodologies applied on both the devices are presented. The dataset used in this project is a transformed version of "Activity Recognition using Cell Phone Accelerometers," by the Wireless Sensor Data Mining WSDM. Some important features were extracted from the data and based on it different models were assessed using Matlab Classification Learner App. Four distinct machine learning techniques were applied on the dataset, namely, linear regression, logistic regression, support vector machine and neural network. For the purposed of applying classifier Weka tool is used. The results of these algorithms are compared and presented in the form of tables and graphs and Bagged Tree is identified to be the best algorithm based on accuracy results.
{"title":"Evaluating Machine Learning Techniques on Human Activity Recognition Using Accelerometer Data","authors":"R. Khan, M. Abbas, Rubia Anjum, Fatima Waheed, Sheeraz Ahmed, F. Bangash","doi":"10.1109/UCET51115.2020.9205376","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205376","url":null,"abstract":"Human activity recognition is gaining increasing importance because of its implication in remote monitoring application including security, health and fitness apps. This paper provides an analysis of different machine learning techniques for recognizing human activity. Firstly, all the recent work related to human activity recognition using accelerometer data is analyzed and presented in the paper. In this study the accelerometer used in smartphones as well as those embedded in wearable devices are compared and recognition methodologies applied on both the devices are presented. The dataset used in this project is a transformed version of \"Activity Recognition using Cell Phone Accelerometers,\" by the Wireless Sensor Data Mining WSDM. Some important features were extracted from the data and based on it different models were assessed using Matlab Classification Learner App. Four distinct machine learning techniques were applied on the dataset, namely, linear regression, logistic regression, support vector machine and neural network. For the purposed of applying classifier Weka tool is used. The results of these algorithms are compared and presented in the form of tables and graphs and Bagged Tree is identified to be the best algorithm based on accuracy results.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205451
Lun Ma
Time-interleaved (TI) architecture with several slow but accurate sub-ADCs in parallel is a promising approach to implement high speed sampling rate and high quantization precision simultaneously. A major bottleneck in realizing a TIADC is mismatches such as offset and gain mismatches among channel ADCs as well as timing skew of the clocks distributed to them, which may reduce the achievable linearity and significantly degrade the sampling performance. The fundamental challenge of existing mismatches estimator is getting rid of the interaction between the gain and timing mismatch effects. In this paper, two frequency bins are jointly considered, corresponding to which the linear phased vectors, generated by TI architecture, are studied in terms of their rotational relationships. The timing errors can be directly estimated without the impact of gain mismatch by making use of the fact that the rotational matrix only depends on the timing skew and the frequency spacing between these two frequency bins. Moreover, the presented method is robust to residual offset errors and system noise. The effectiveness of the proposed approach will be verified by the simulated radar echo data.
{"title":"A subspace based channel mismatch estimator for time-interleaved ADC systems","authors":"Lun Ma","doi":"10.1109/UCET51115.2020.9205451","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205451","url":null,"abstract":"Time-interleaved (TI) architecture with several slow but accurate sub-ADCs in parallel is a promising approach to implement high speed sampling rate and high quantization precision simultaneously. A major bottleneck in realizing a TIADC is mismatches such as offset and gain mismatches among channel ADCs as well as timing skew of the clocks distributed to them, which may reduce the achievable linearity and significantly degrade the sampling performance. The fundamental challenge of existing mismatches estimator is getting rid of the interaction between the gain and timing mismatch effects. In this paper, two frequency bins are jointly considered, corresponding to which the linear phased vectors, generated by TI architecture, are studied in terms of their rotational relationships. The timing errors can be directly estimated without the impact of gain mismatch by making use of the fact that the rotational matrix only depends on the timing skew and the frequency spacing between these two frequency bins. Moreover, the presented method is robust to residual offset errors and system noise. The effectiveness of the proposed approach will be verified by the simulated radar echo data.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121329829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205475
Lemayian Joel Poncha, Jehad M. Hamamreh
In this work, an advanced novel small-scale non-orthogonal multiple access (NOMA) utilizing physical layer security (PLS) techniques used for enhancing communication security and reliability for two users is proposed. This work is motivated by current challenges faced by the conventional NOMA techniques. For instance, the recent exclusion of power-domain NOMA (PD-NOMA) from 3GPP release 17 due to its performance degradation. The efficiency and novelty of the proposed system are presented via mathematical analysis and validated by Monte Carlo simulations. Results indicate that the proposed model achieves secure and efficient communication, suitable for low power consumption and limited processing applications.
{"title":"Novel Small-Scale NOMA Communication Technique Using Auxiliary Signal Superposition","authors":"Lemayian Joel Poncha, Jehad M. Hamamreh","doi":"10.1109/UCET51115.2020.9205475","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205475","url":null,"abstract":"In this work, an advanced novel small-scale non-orthogonal multiple access (NOMA) utilizing physical layer security (PLS) techniques used for enhancing communication security and reliability for two users is proposed. This work is motivated by current challenges faced by the conventional NOMA techniques. For instance, the recent exclusion of power-domain NOMA (PD-NOMA) from 3GPP release 17 due to its performance degradation. The efficiency and novelty of the proposed system are presented via mathematical analysis and validated by Monte Carlo simulations. Results indicate that the proposed model achieves secure and efficient communication, suitable for low power consumption and limited processing applications.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/UCET51115.2020.9205427
Ahsan Mehmood, Waqas Aman, Muhammad Mahboob Ur Rahman, M. Imran, Q. Abbasi
This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a singlereader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag)—having the same ID as the Ltag programmed in its memory by a wizard—attempts to deceive the reader by pretending to be the L-tag. To this end, we counter the identity attack by exploiting the non-reciprocity of the end-to-end channel (i.e., the residual channel) between the reader and the tag as the fingerprint of the tag. The passive nature of the tag(s) (and thus, lack of any computational platform at the tag) implies that the proposed light-weight physical-layer authentication method is implemented at the reader. To be concrete, in our proposed scheme, the reader acquires the raw data via two-way (challenge-response) message exchange mechanism, does least-squares estimation to extract the fingerprint, and does binary hypothesis testing to do authentication. We also provide closed-form expressions for the two error probabilities of interest (i.e., false alarm and missed detection). Simulation results attest to the efficacy of the proposed method.
{"title":"Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-layer Approach","authors":"Ahsan Mehmood, Waqas Aman, Muhammad Mahboob Ur Rahman, M. Imran, Q. Abbasi","doi":"10.1109/UCET51115.2020.9205427","DOIUrl":"https://doi.org/10.1109/UCET51115.2020.9205427","url":null,"abstract":"This work considers identity attack on a radio-frequency identification (RFID)-based backscatter communication system. Specifically, we consider a singlereader, single-tag RFID system whereby the reader and the tag undergo two-way signaling which enables the reader to extract the tag ID in order to authenticate the legitimate tag (L-tag). We then consider a scenario whereby a malicious tag (M-tag)—having the same ID as the Ltag programmed in its memory by a wizard—attempts to deceive the reader by pretending to be the L-tag. To this end, we counter the identity attack by exploiting the non-reciprocity of the end-to-end channel (i.e., the residual channel) between the reader and the tag as the fingerprint of the tag. The passive nature of the tag(s) (and thus, lack of any computational platform at the tag) implies that the proposed light-weight physical-layer authentication method is implemented at the reader. To be concrete, in our proposed scheme, the reader acquires the raw data via two-way (challenge-response) message exchange mechanism, does least-squares estimation to extract the fingerprint, and does binary hypothesis testing to do authentication. We also provide closed-form expressions for the two error probabilities of interest (i.e., false alarm and missed detection). Simulation results attest to the efficacy of the proposed method.","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132421640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}