APAuth: Authenticate an Access Point by Backscatter Devices

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorChang, Jingdongen_US
dc.contributor.authorLi, Jiajunen_US
dc.contributor.authorYang, Yishanen_US
dc.contributor.authorZhang, Yifanen_US
dc.contributor.authorKaveh, Masouden_US
dc.contributor.authorYan, Zhengen_US
dc.contributor.departmentDepartment of Information and Communications Engineeringen
dc.contributor.editorValenti, Matthewen_US
dc.contributor.editorReed, Daviden_US
dc.contributor.editorTorres, Melissaen_US
dc.contributor.groupauthorNetwork Security and Trusten
dc.contributor.organizationXidian Universityen_US
dc.date.accessioned2024-08-28T08:39:58Z
dc.date.available2024-08-28T08:39:58Z
dc.date.issued2024-06-13en_US
dc.description.abstractBackscatter communication (BC) represents a wireless communication technology that facilitates the transmission of data by low-power devices, referred to as backscatter devices (BDs), through the modulation or reflection of pre-existing wireless signals, typically sourced from an access point (AP). The advent of the Internet of Things (IoT) has garnered significant attention and witnessed the widespread adoption of BC, primarily due to its exceptional energy- efficiency characteristics. Nevertheless, the security of BC systems faces substantial threats when deployed in practical scenarios due to their inherent openness. Specifically, wireless BDs, which directly engage with users, are susceptible to detrimental consequences in the event of interactions with counterfeit wireless APs. Owing to their non-authenticated and unconditional reflection properties, BDs are vulnerable to spoofing attacks orchestrated by malicious APs. Moreover, their limited computing capabilities make it challenging to employ intricate cryptographic algorithms. To tackle these challenges, we introduce APAuth, a lightweight authentication scheme that leverages the power value of BD to establish AP authentication. In this scheme, BDs and APs share a confidential key and engage in negotiations to determine a key generation algorithm. Subsequently, the current stored power value of BD is utilized to calculate the power value that must be delivered to BD from AP. If the computed charging power value aligns with the value determined by the key generation algorithm, the AP successfully passes the authentication of BD. We perform a thorough theoretical analysis of the security aspects inherent in our proposed scheme. We further conduct numerical simulations to validate the practical viability and desired performance of APAuth in diverse real-world scenarios.en
dc.description.versionPeer revieweden
dc.format.extent6
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationChang, J, Li, J, Yang, Y, Zhang, Y, Kaveh, M & Yan, Z 2024, APAuth: Authenticate an Access Point by Backscatter Devices . in M Valenti, D Reed & M Torres (eds), ICC 2024 - IEEE International Conference on Communications ., 10623058, IEEE International Conference on Communications, IEEE, pp. 3616-3621, IEEE International Conference on Communications, Denver, Colorado, United States, 09/06/2024 . https://doi.org/10.1109/ICC51166.2024.10623058en
dc.identifier.doi10.1109/ICC51166.2024.10623058en_US
dc.identifier.isbn978-1-7281-9055-6
dc.identifier.otherPURE UUID: 5a7f1218-64a2-4b3d-96be-54509d79a458en_US
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/5a7f1218-64a2-4b3d-96be-54509d79a458en_US
dc.identifier.otherPURE LINK: http://www.scopus.com/inward/record.url?scp=85202844317&partnerID=8YFLogxKen_US
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/155262769/APAuth_Authenticate_an_Access_Point_by_Backscatter_Devices-7.pdfen_US
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/130365
dc.identifier.urnURN:NBN:fi:aalto-202408285926
dc.language.isoenen
dc.relation.ispartofICC 2024 - IEEE International Conference on Communications
dc.relation.ispartofpp. 3616-3621
dc.relation.ispartofIEEE International Conference on Communicationsen
dc.rightsopenAccessen
dc.subject.keywordAuthenticationen_US
dc.subject.keywordNumerical simulationen_US
dc.subject.keywordPerformance evaluationen_US
dc.subject.keywordPower measurementen_US
dc.subject.keywordProtocolsen_US
dc.subject.keywordPrototypesen_US
dc.subject.keywordWireless communicationen_US
dc.titleAPAuth: Authenticate an Access Point by Backscatter Devicesen
dc.typeA4 Artikkeli konferenssijulkaisussafi
dc.type.versionacceptedVersion
Files