• Corpus ID: 249018186

Defeating Eavesdroppers with Ambient Backscatter Communications

@inproceedings{Huynh2022DefeatingEW,
  title={Defeating Eavesdroppers with Ambient Backscatter Communications},
  author={Nguyen Van Huynh and Nguyen Quang Hieu and Nam H. Chu and Diep N. Nguyen and Dinh Thai Hoang and Eryk Dutkiewicz},
  year={2022}
}
—Unlike conventional anti-eavesdropping methods that always require additional energy or computing resources (e.g., in friendly jamming and cryptography-based solutions), this work proposes a novel anti-eavesdropping solution that comes with mostly no extra power nor computing resource require- ment. This is achieved by leveraging the ambient backscatter communications in which secret information can be transmitted by backscattering it over ambient radio signals. Specifically, the original… 

Figures from this paper

References

SHOWING 1-10 OF 13 REFERENCES

On Secure Wireless Communications for IoT Under Eavesdropper Collusion

The techniques of Laplace transform, keyhole contour integral, and Cauchy Integral Theorem are jointly adopted to work around the highly cumbersome multifold convolution problem involved in such analysis.

Noncoherent Multiantenna Receivers for Cognitive Backscatter System with Multiple RF Sources.

The signal transmission problem is investigated, in which a basic transmission model is considered which consists of K RF sources, one BD and one reader equipped with M antennas, and a fully blind channel estimation method is proposed to learn the detection-required parameters based on clustering.

Constellation Learning-Based Signal Detection for Ambient Backscatter Communication Systems

This paper proposes a label-assisted transmission framework, in which two known labels are transmitted from the tag before data transmission, and proposes modulation-constrained expectation maximization algorithm, based on which two detection methods are developed.

Ambient Backscatter Communications: A Contemporary Survey

This paper aims to provide a contemporary and comprehensive literature review on fundamentals, applications, challenges, and research efforts/progress of ambient backscatter communications.

Ambient backscatter: wireless communication out of thin air

The design of a communication system that enables two devices to communicate using ambient RF as the only source of power is presented, enabling ubiquitous communication where devices can communicate among themselves at unprecedented scales and in locations that were previously inaccessible.

Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis

The more power the jammer uses to attack the channel, the better bit error rate performance the transmitter can achieve, and a deep learning-based detector is proposed that can dynamically adapt to any channels and noise distributions.

Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper

Optimal relay selection is investigated for secure cooperative communications against an adaptive eavesdropper that can perform eavesdropping if the eavesdropping link has good channel quality or

Covert Communication Achieved by a Greedy Relay in Wireless Networks

This paper examines the possibility and achievable performance of covert communication in amplify-and-forward one-way relay networks and proposes two strategies for the relay to transmit its covert information, namely rate-control and power-control transmission schemes.

Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications

Findings reveal that FDJ increases the average secrecy rate 150% over HDJ and 260% overHD relaying without jammer, and the degree of improvement is highly dependent on time split for energy harvesting, amount of self-interference, the channel gains, and locations of the nodes.

Covert Wireless Communication With Artificial Noise Generation

A strategy where the friendly node closest to the adversary, without close coordination with Alice, produces artificial noise is proposed, which allows Alice to reliably and covertly send bits to Bob when other “friendly” nodes distributed according to a two-dimensional Poisson point process are present.