A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab, M. Guizani
{"title":"无源RFID通信的混合物理层安全","authors":"A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab, M. Guizani","doi":"10.1109/CSCI51800.2020.00033","DOIUrl":null,"url":null,"abstract":"Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such devices have limited computational capabilities and resources which makes them unable to incorporate traditional security protocols and are there-fore vulnerable to several types of attacks including cloning and counterfeiting. Therefore, in this paper, a novel hybrid RFID tags identification and malicious devices detection system is proposed by exploiting the estimated tags locations and manufacturing imperfections. In particular, an iterative approach is proposed to estimate the minimum power response at each frequency of the tag in addition to its location. The conducted simulation results show the efficiency of this technique in detecting all the malicious tags and classify the legitimate ones under different network configurations.","PeriodicalId":336929,"journal":{"name":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Hybrid Physical Layer Security for Passive RFID Communication\",\"authors\":\"A. Gouissem, K. Abualsaud, E. Yaacoub, T. Khattab, M. Guizani\",\"doi\":\"10.1109/CSCI51800.2020.00033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such devices have limited computational capabilities and resources which makes them unable to incorporate traditional security protocols and are there-fore vulnerable to several types of attacks including cloning and counterfeiting. Therefore, in this paper, a novel hybrid RFID tags identification and malicious devices detection system is proposed by exploiting the estimated tags locations and manufacturing imperfections. In particular, an iterative approach is proposed to estimate the minimum power response at each frequency of the tag in addition to its location. The conducted simulation results show the efficiency of this technique in detecting all the malicious tags and classify the legitimate ones under different network configurations.\",\"PeriodicalId\":336929,\"journal\":{\"name\":\"2020 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCI51800.2020.00033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI51800.2020.00033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hybrid Physical Layer Security for Passive RFID Communication
Thanks to its low cost, small weight and energy efficiency, passive radio frequency identification (RFID) backscatter communications systems have attracted a lot of attention in several application fields. However, such devices have limited computational capabilities and resources which makes them unable to incorporate traditional security protocols and are there-fore vulnerable to several types of attacks including cloning and counterfeiting. Therefore, in this paper, a novel hybrid RFID tags identification and malicious devices detection system is proposed by exploiting the estimated tags locations and manufacturing imperfections. In particular, an iterative approach is proposed to estimate the minimum power response at each frequency of the tag in addition to its location. The conducted simulation results show the efficiency of this technique in detecting all the malicious tags and classify the legitimate ones under different network configurations.