SCBF: Exploiting a Collision for Authentication in Backscatter Networks

Hoorin Park, Jieun Yu, Heejun Roh, Wonjun Lee

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Backscatter networks are widely applied in real world such as inventory management, RFID-enabled passport, and access control. The security issues rapidly grow in its importance with the widespread uses. Especially, if the access control application identifies a user using a message from a backscatter device, the message can be used for tracking or replay attacks. However, most of the existing security protocols depending on cryptosystems cannot be applied into the backscatter networks due to the minimalist design of backscatter devices. In order to alleviate the security menaces, we propose a novel concept of authentication scheme for backscatter networks. Our scheme uses an unpredictable collision by applying our own data structure called Shifted Counting Bloom Filter (SCBF). Based on the SCBF, the scheme can reduce the overhead of backscatter devices required for security. Our performance evaluation shows the information-theoretic secrecy and the reliability of our scheme.

Original languageEnglish
Article number7867859
Pages (from-to)1413-1416
Number of pages4
JournalIEEE Communications Letters
Volume21
Issue number6
DOIs
Publication statusPublished - 2017 Jun 1

Fingerprint

Bloom Filter
Access control
Authentication
Counting
Collision
Access Control
Radio frequency identification (RFID)
Cryptography
Data structures
Inventory Management
Security Protocols
Cryptosystem
Radio Frequency Identification
Performance Evaluation
Data Structures
Attack

Keywords

  • Backscatter networks
  • collision-based authentication
  • wireless security

ASJC Scopus subject areas

  • Modelling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

SCBF : Exploiting a Collision for Authentication in Backscatter Networks. / Park, Hoorin; Yu, Jieun; Roh, Heejun; Lee, Wonjun.

In: IEEE Communications Letters, Vol. 21, No. 6, 7867859, 01.06.2017, p. 1413-1416.

Research output: Contribution to journalArticle

Park, Hoorin ; Yu, Jieun ; Roh, Heejun ; Lee, Wonjun. / SCBF : Exploiting a Collision for Authentication in Backscatter Networks. In: IEEE Communications Letters. 2017 ; Vol. 21, No. 6. pp. 1413-1416.
@article{723f4ef471b54cb497cf14330a3a884b,
title = "SCBF: Exploiting a Collision for Authentication in Backscatter Networks",
abstract = "Backscatter networks are widely applied in real world such as inventory management, RFID-enabled passport, and access control. The security issues rapidly grow in its importance with the widespread uses. Especially, if the access control application identifies a user using a message from a backscatter device, the message can be used for tracking or replay attacks. However, most of the existing security protocols depending on cryptosystems cannot be applied into the backscatter networks due to the minimalist design of backscatter devices. In order to alleviate the security menaces, we propose a novel concept of authentication scheme for backscatter networks. Our scheme uses an unpredictable collision by applying our own data structure called Shifted Counting Bloom Filter (SCBF). Based on the SCBF, the scheme can reduce the overhead of backscatter devices required for security. Our performance evaluation shows the information-theoretic secrecy and the reliability of our scheme.",
keywords = "Backscatter networks, collision-based authentication, wireless security",
author = "Hoorin Park and Jieun Yu and Heejun Roh and Wonjun Lee",
year = "2017",
month = "6",
day = "1",
doi = "10.1109/LCOMM.2017.2676773",
language = "English",
volume = "21",
pages = "1413--1416",
journal = "IEEE Communications Letters",
issn = "1089-7798",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "6",

}

TY - JOUR

T1 - SCBF

T2 - Exploiting a Collision for Authentication in Backscatter Networks

AU - Park, Hoorin

AU - Yu, Jieun

AU - Roh, Heejun

AU - Lee, Wonjun

PY - 2017/6/1

Y1 - 2017/6/1

N2 - Backscatter networks are widely applied in real world such as inventory management, RFID-enabled passport, and access control. The security issues rapidly grow in its importance with the widespread uses. Especially, if the access control application identifies a user using a message from a backscatter device, the message can be used for tracking or replay attacks. However, most of the existing security protocols depending on cryptosystems cannot be applied into the backscatter networks due to the minimalist design of backscatter devices. In order to alleviate the security menaces, we propose a novel concept of authentication scheme for backscatter networks. Our scheme uses an unpredictable collision by applying our own data structure called Shifted Counting Bloom Filter (SCBF). Based on the SCBF, the scheme can reduce the overhead of backscatter devices required for security. Our performance evaluation shows the information-theoretic secrecy and the reliability of our scheme.

AB - Backscatter networks are widely applied in real world such as inventory management, RFID-enabled passport, and access control. The security issues rapidly grow in its importance with the widespread uses. Especially, if the access control application identifies a user using a message from a backscatter device, the message can be used for tracking or replay attacks. However, most of the existing security protocols depending on cryptosystems cannot be applied into the backscatter networks due to the minimalist design of backscatter devices. In order to alleviate the security menaces, we propose a novel concept of authentication scheme for backscatter networks. Our scheme uses an unpredictable collision by applying our own data structure called Shifted Counting Bloom Filter (SCBF). Based on the SCBF, the scheme can reduce the overhead of backscatter devices required for security. Our performance evaluation shows the information-theoretic secrecy and the reliability of our scheme.

KW - Backscatter networks

KW - collision-based authentication

KW - wireless security

UR - http://www.scopus.com/inward/record.url?scp=85020940583&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85020940583&partnerID=8YFLogxK

U2 - 10.1109/LCOMM.2017.2676773

DO - 10.1109/LCOMM.2017.2676773

M3 - Article

AN - SCOPUS:85020940583

VL - 21

SP - 1413

EP - 1416

JO - IEEE Communications Letters

JF - IEEE Communications Letters

SN - 1089-7798

IS - 6

M1 - 7867859

ER -