LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

SCBF: Exploiting a Collision for Authentication in Backscatter Networks

Photo by scottwebb from unsplash

Backscatter networks are widely applied in real world such as inventory management, RFID-enabled passport, and access control. The security issues rapidly grow in its importance with the widespread uses. Especially,… Click to show full abstract

Backscatter networks are widely applied in real world such as inventory management, RFID-enabled passport, and access control. The security issues rapidly grow in its importance with the widespread uses. Especially, if the access control application identifies a user using a message from a backscatter device, the message can be used for tracking or replay attacks. However, most of the existing security protocols depending on cryptosystems cannot be applied into the backscatter networks due to the minimalist design of backscatter devices. In order to alleviate the security menaces, we propose a novel concept of authentication scheme for backscatter networks. Our scheme uses an unpredictable collision by applying our own data structure called Shifted Counting Bloom Filter (SCBF). Based on the SCBF, the scheme can reduce the overhead of backscatter devices required for security. Our performance evaluation shows the information-theoretic secrecy and the reliability of our scheme.

Keywords: backscatter networks; authentication; security; collision; backscatter; scbf exploiting

Journal Title: IEEE Communications Letters
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.