메뉴 건너뛰기




Volumn 13, Issue 6, 2014, Pages 3442-3451

On the physical layer security of backscatter wireless systems

Author keywords

artificial noise; backscatter communication; physical layer security; Secrecy rate

Indexed keywords

NETWORK LAYERS; RADIO FREQUENCY IDENTIFICATION (RFID); SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84903209092     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2014.051414.130478     Document Type: Article
Times cited : (107)

References (43)
  • 3
    • 36849036303 scopus 로고    scopus 로고
    • RF tag antenna performance on various materials using radio link budgets
    • Dec.
    • J. D. Griffin, G. D. Durgina, A. Haldi, and B. Kippelen, "RF tag antenna performance on various materials using radio link budgets," IEEE Antennas Wireless Propag. Lett., vol. 5, no. 1, pp. 247-250, Dec. 2006.
    • (2006) IEEE Antennas Wireless Propag. Lett. , vol.5 , Issue.1 , pp. 247-250
    • Griffin, J.D.1    Durgina, G.D.2    Haldi, A.3    Kippelen, B.4
  • 4
    • 30344466340 scopus 로고    scopus 로고
    • Security standards for the RFID market
    • DOI 10.1109/MSP.2005.157
    • T. Philips, T. Karygiannis, and R. Kuhn, "Security standards for the RFID market," IEEE Security Privacy, vol. 3, no. 6, pp. 85-89, Nov. 2005. (Pubitemid 43060402)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.6 , pp. 85-89
    • Phillips, T.1    Karygiannis, T.2    Kuhn, R.3
  • 5
    • 84866599640 scopus 로고    scopus 로고
    • Energy-efficient RF source power control for opportunistic distributed sensing in wireless passive sensor networks
    • A. O. Bicen and O. B. Akan, "Energy-efficient RF source power control for opportunistic distributed sensing in wireless passive sensor networks," in Proc. 2012 IEEE Symp. Comput. Commun.
    • Proc. 2012 IEEE Symp. Comput. Commun.
    • Bicen, A.O.1    Akan, O.B.2
  • 7
    • 40549091679 scopus 로고    scopus 로고
    • Gains for RF tags using multiple antennas
    • DOI 10.1109/TAP.2007.915423
    • J. D. Griffin and G. D. Durgin, "Gains for RF tags using multiple antennas," IEEE Trans. Antennas Propag., vol. 56, no. 2, pp. 563-570, Feb. 2008. (Pubitemid 351359333)
    • (2008) IEEE Transactions on Antennas and Propagation , vol.56 , Issue.2 , pp. 563-570
    • Griffin, J.D.1    Durgin, G.D.2
  • 10
    • 84855460528 scopus 로고    scopus 로고
    • Wideband characterization of backscatter channels: Derivations and theoretical background
    • Jan.
    • D. Arnitz, U. Muehlmann, and K. Witrisal, "Wideband characterization of backscatter channels: derivations and theoretical background," IEEE Trans. Antennas Propag., vol. 60, no. 1, pp. 257-266, Jan. 2012.
    • (2012) IEEE Trans. Antennas Propag. , vol.60 , Issue.1 , pp. 257-266
    • Arnitz, D.1    Muehlmann, U.2    Witrisal, K.3
  • 11
    • 84855345134 scopus 로고    scopus 로고
    • DDC: A novel scheme to directly decode the collisions in UHF RFID systems
    • Dec.
    • L. Kang, K. Wu, J. Zhang, H. Tan, and L. Ni, "DDC: a novel scheme to directly decode the collisions in UHF RFID systems," IEEE Trans. Parallel Distributed Comput., vol. 23, no. 2, pp. 263-270, Dec. 2011.
    • (2011) IEEE Trans. Parallel Distributed Comput. , vol.23 , Issue.2 , pp. 263-270
    • Kang, L.1    Wu, K.2    Zhang, J.3    Tan, H.4    Ni, L.5
  • 12
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • DOI 10.1109/JSAC.2005.861395
    • A. Juels, "RFID security and privacy: a research survey," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 381-394, Feb. 2006. (Pubitemid 43269757)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 15
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • Dec.
    • S. Piramuthu, "SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity," IEEE Trans. Dependable Secure Comput., vol. 4, no. 4, pp. 337-340, Dec. 2007.
    • (2007) IEEE Trans. Dependable Secure Comput. , vol.4 , Issue.4 , pp. 337-340
    • Piramuthu, S.1
  • 21
    • 36248977046 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • T. Li and G. Wang, "Security analysis of two ultra-lightweight RFID authentication protocols," in Proc. 2007 IFIP SEC.
    • Proc. 2007 IFIP SEC.
    • Li, T.1    Wang, G.2
  • 23
    • 84871285357 scopus 로고    scopus 로고
    • EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications
    • EPCGlobal
    • EPCGlobal, "EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications," Tech. Rep. Available: http://www.epcglobalinc.org
    • Tech. Rep.
  • 24
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell System Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell System Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 26
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Sept.
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Sept. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 29
    • 84893468086 scopus 로고    scopus 로고
    • A broadcast approach for fading wiretap channels
    • Feb.
    • Y. Liang, L. Lai, S. Shamai, and H. V. Poor, "A broadcast approach for fading wiretap channels," IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 842-858, Feb. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.2 , pp. 842-858
    • Liang, Y.1    Lai, L.2    Shamai, S.3    Poor, H.V.4
  • 30
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 32
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two way relay communications with untrusted relay and friendly jammers
    • to appear
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two way relay communications with untrusted relay and friendly jammers," IEEE Trans. Veh. Technol., to appear, 2012.
    • (2012) IEEE Trans. Veh. Technol.
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 33
    • 79960857245 scopus 로고    scopus 로고
    • Physical layer wireless security made fast and channel independent
    • S. Gollakota and D. Katabi, "Physical layer wireless security made fast and channel independent," in Proc. 2011 IEEE INFOCOM.
    • Proc. 2011 IEEE INFOCOM.
    • Gollakota, S.1    Katabi, D.2
  • 34
    • 80053983111 scopus 로고    scopus 로고
    • Secrecy throughput of MANETs with active and passive attacks
    • Oct.
    • Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs with active and passive attacks," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6692-6702, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6692-6702
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 36
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • June
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 37
    • 84855381750 scopus 로고    scopus 로고
    • Outage probability based power distribution between data and artificial noise for physical layer security
    • Feb.
    • N. Romero-Zurita, M. Ghogho, and D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
    • (2012) IEEE Signal Process. Lett. , vol.19 , Issue.2 , pp. 71-74
    • Romero-Zurita, N.1    Ghogho, M.2    McLernon, D.3
  • 38
    • 84858390705 scopus 로고    scopus 로고
    • Secrecy outage in MISO systems with partial channel information
    • Apr.
    • S. Gerbracht, C. Scheunert, and E. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 704-716
    • Gerbracht, S.1    Scheunert, C.2    Jorswieck, E.3
  • 39
    • 79955491895 scopus 로고    scopus 로고
    • Interference assisted secret communication
    • May
    • X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 3153-3167
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.V.4
  • 40
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar.
    • G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.-C.2    Wong, K.-K.3
  • 41
    • 78650419602 scopus 로고    scopus 로고
    • RFID reader receivers for physical layer collision recovery
    • Dec.
    • C. M. Angerer, R. Langwieser, and M. Rupp, "RFID reader receivers for physical layer collision recovery," IEEE Trans. Commun., vol. 58, no. 12, pp. 3526-3537, Dec. 2010.
    • (2010) IEEE Trans. Commun. , vol.58 , Issue.12 , pp. 3526-3537
    • Angerer, C.M.1    Langwieser, R.2    Rupp, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.