Physical layer security-enhancing transmission protocol against eavesdropping for ambient backscatter communication system
Physical layer security-enhancing transmission protocol against eavesdropping for ambient backscatter communication system
- Author(s): Jia You ; Gongpu Wang ; Zhangdui Zhong
- DOI: 10.1049/cp.2015.0911
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
6th International Conference on Wireless, Mobile and Multi-Media (ICWMMN 2015) — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): Jia You ; Gongpu Wang ; Zhangdui Zhong Source: 6th International Conference on Wireless, Mobile and Multi-Media (ICWMMN 2015), 2015 page ()
- Conference: 6th International Conference on Wireless, Mobile and Multi-Media (ICWMMN 2015)
- DOI: 10.1049/cp.2015.0911
- ISBN: 978-1-78561-046-2
- Location: Beijing, China
- Conference date: 20-23 Nov. 2015
- Format: PDF
Ambient backscatter is a new communication technology that utilizes ambient radio frequency signals of other systems to enable battery-free devices, such as tags and sensors, to communicate with each other. This paper investigates the physical layer security problem for ambient backscatter communication systems with multiple tags/sensors. Specifically, a new protocol is suggested to facilitate communication process and enhance the security of data transmission between the multiple tags and the reader. This protocol can lead to much lower bit error rate (BER) for the uplink from the tags to the reader, and meanwhile maintain almost the same BER for the wiretap link from the tags to the eavesdropper. We also propose detection approaches and derive closed-form detection thresholds for the reader and the eavesdropper. It is shown that increasing number of tags can lower BER at the reader receiver. It is also found that the number of tags and the number of training symbols can be optimized to maximize data rate gap between the reader and the the eavesdropper. Interestingly, it is found that the maximum data rate gap, a measure for secrecy capacity, is not obtained at high signal-to-noise ratio (SNR). Simulation results are then provided to corroborate our proposed studies.
Inspec keywords: radiofrequency identification; error statistics; wireless sensor networks; telecommunication security; protocols; radiofrequency power transmission
Subjects: Protocols; Wireless power transmission; RFID systems; Wireless sensor networks
Related content
content/conferences/10.1049/cp.2015.0911
pub_keyword,iet_inspecKeyword,pub_concept
6
6