Browsing by Author "Zeng, Kai"
Now showing 1 - 7 of 7
- Results Per Page
- Sort Options
- BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network
A4 Artikkeli konferenssijulkaisussa(2023) Yang, Yishan; Kaveh, Masoud; Li, Jiajun; Zhang, Yifan; Yan, Zheng; Zeng, KaiWith the maturity of the Internet of Things (IoT), many IoT applications have been popularized and promoted. As one of the IoT technology, backscatter communication (BC) has aroused research interest due to its low-cost and ultra-low power consumption characteristics. Due to their simple design and battery-less functionalities, backscatter devices (BDs) have been introduced as the main candidates for deploying in smart home networks (SHN). Although batch authentication in BC systems is crucial and efficient for SHN security, existing schemes have only focused on radio frequency identification (RFID) devices and no literature has given a general solution for BD batch authentication. In this paper, we propose a scheme named BatAu for authenticating batch BDs applied in SHN by extracting physical layer features in multiplexing signals. We conduct numerical simulations with various settings to show its desirable performance. - BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2022) Wang, Pu; Yan, Zheng; Zeng, KaiBackscatter communication (BC) enables ultra-low-power communications and allows devices to harvest energy simultaneously. But its practical deployment faces severe security threats caused by its nature of openness and broadcast. Authenticating backscatter devices (BDs) is treated as the first line of defense. However, complex cryptographic approaches are not desirable due to the limited computation capability of BDs. Existing physical layer authentication schemes cannot effectively support BD mobility, multiple attacker identification and attacker location tracing in an integrated way. To tackle these problems, this paper proposes BCAuth, a multi-stage authentication and attack tracing scheme based on the physical spatial information of BDs to realize enhanced BD authentication security for both static and mobile BDs. After initial authentication based on BD identity with its position information registration, preemptive authentication and re-authentication are performed according to spatial correlation of backscattered signal source locations associated with the BD. By exploiting clustering-based analysis on spacial information, BCAuth is capable of determining the number of attackers and localizing their positions. In addition, we propose a reciprocal channel-based method for BD re-authentication with better authentication performance than the clustering-based method for mobile BDs when the BDs is able to measure received signal strength (RSS), which also enables mutual authentication. We theoretically analyze BCAuth security and conduct extensive numerical simulations with various settings to show its desirable performance. - Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2018-08-01) Yan, Zheng; Zeng, Kai; Xiao, Yu; Hou, Thomas; Samarati, Pierangela - Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise
A4 Artikkeli konferenssijulkaisussa(2019-04-01) Wang, Pu; Wang, Ning; Dabaghchian, Monireh; Zeng, Kai; Yan, ZhengIn this paper, we consider a wireless powered backscatter communication (WPBC) network in which a full-duplex access point (AP) simultaneously transmits information and energy signals by injecting artificial noise (AN) to secure the backscatter transmission from multiple backscatter devices (BDs). To maximize the minimum throughput and ensure fairness and security, we formulate an optimization problem by jointly considering the power splitting ratio between dedicated information signals and AN, backscatter time and signal power allocation among multiple BDs. For a single BD network, we obtain a closed-form solution and evaluate its validity through proof-of-concept experiments. For the general case with multiple BDs, we present an iterative algorithm by leveraging block coordinate descent (BCD) and successive convex approximation optimization to solve a non-convex problem incurred in WPBC. We further show the convergence of the proposed algorithm and analyze its complexity. Finally, extensive simulation results show that the proposed algorithm achieves an optimal and equitable throughput for all BDs, and our work provides a good perspective of resource allocation to improve the performance of WPBC networks. - Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals
A4 Artikkeli konferenssijulkaisussa(2021-05) Wang, Pu; Jiao, Long; Zeng, Kai; Yan, ZhengAmbient backscatter communication (AmBC), which enables energy harvesting and ultra-low-power communication by utilizing ambient radio frequency (RF) signals, has emerged as a cutting-edge technology to realize numerous Internet of Things (IoT) applications. However, the current literature lacks efficient secret key sharing solutions for resource-limited devices in AmBC systems to protect the backscatter communications, especially for private data transmission. Thus, we propose a novel physical layer key generation scheme between backscatter devices (BDs) by exploiting received superposed ambient signals. Based on the repeated patterns (i.e., cyclic prefix in OFDM symbols) in ambient RF signals, we present a joint transceiver design of BD backscatter waveform and BD receiver to extract the downlink signal and the backscatter signal from the superposed signals. By multiplying the downlink signal and the backscatter signal, we can actually obtain the triangle channel information as a shared random secret source for key generation. Besides, we study the trade-off between the rate of secret key generation and harvested energy by modeling it as a joint optimization problem. Finally, extensive numerical simulations are provided to evaluate the key generation performance, energy harvesting performance, and their trade-offs under various system settings. - Resource Allocation Optimization for Secure Multi-device Wirelessly Powered Backscatter Communication with Artificial Noise
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2022-09) Wang, Pu; Yan, Zheng; Wang, Ning; Zeng, KaiWirelessly powered backscatter communications (WPBC) is an emerging technology for providing continuous energy and ultra-low power communications. Despite some progress in WPBC systems, resource allocation for multiple devices towards secure backscatter communications (BC) and efficient-energy harvesting (EH) requests a deep-insight investigation. In this paper, we consider a WPBC system in which a full-duplex access point (AP) transmits multi-sinewave signals to power backscatter devices (BDs) and injects artificial noise (AN) to secure their backscatter transmissions. To maximize the minimum harvested energy and ensure fairness and security of all BDs, we formulate an optimization problem by jointly considering the backscatter time, power splitting ratio between multi-sinewave and AN, and signal power allocation. For a single-BD system, we characterize the achievable secrecy rate-energy region with a non-linear energy harvester and propose two algorithms to solve an energy maximization problem. We then analyze the effect of multi-sinewave and AN signals on BD’s secrecy rate and harvested energy through simulations and proof-of-concept experiments. For a multi-BD system, we propose an iterative algorithm by leveraging block successive upper-bound minimization (BSUM) techniques to solve the non-convex problem of fair resource allocation and show its convergence and complexity. Numerical results show the proposed algorithm achieves optimal and equitable harvested energy for all BDs with satisfying the security constraint. - A Survey on Security, Privacy and Trust in Mobile Crowdsourcing
A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä(2018) Feng, Wei; Yan, Zheng; Zhang, Hengrun; Zeng, Kai; Xiao, Yu; Hou, ThomasWith the popularity of sensor-rich mobile devices (e.g., smart phones and wearable devices), Mobile Crowdsourcing (MCS) has emerged as an effective method for data collection and processing. Compared with traditional Wireless Sensor Networking (WSN), MCS holds many advantages such as mobility, scalability, cost-efficiency, and human intelligence. However, MCS still faces many challenges with regard to security, privacy and trust. This paper provides a survey of these challenges and discusses potential solutions. We analyze the characteristics of MCS, identify its security threats, and outline essential requirements on a secure, privacy-preserving and trustworthy MCS system. Further, we review existing solutions based on these requirements and compare their pros and cons. Finally, we point out open issues and propose some future research directions