SCBF: Exploiting a Collision for Authentication in Backscatter Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Hoorin | - |
dc.contributor.author | Yu, Jieun | - |
dc.contributor.author | Roh, Heejun | - |
dc.contributor.author | Lee, Wonjun | - |
dc.date.accessioned | 2021-09-03T05:30:38Z | - |
dc.date.available | 2021-09-03T05:30:38Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2017-06 | - |
dc.identifier.issn | 1089-7798 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/83256 | - |
dc.description.abstract | Backscatter networks are widely applied in real world such as inventory management, RFID-enabled passport, and access control. The security issues rapidly grow in its importance with the widespread uses. Especially, if the access control application identifies a user using a message from a backscatter device, the message can be used for tracking or replay attacks. However, most of the existing security protocols depending on cryptosystems cannot be applied into the backscatter networks due to the minimalist design of backscatter devices. In order to alleviate the security menaces, we propose a novel concept of authentication scheme for backscatter networks. Our scheme uses an unpredictable collision by applying our own data structure called Shifted Counting Bloom Filter (SCBF). Based on the SCBF, the scheme can reduce the overhead of backscatter devices required for security. Our performance evaluation shows the information-theoretic secrecy and the reliability of our scheme. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | SCBF: Exploiting a Collision for Authentication in Backscatter Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Roh, Heejun | - |
dc.contributor.affiliatedAuthor | Lee, Wonjun | - |
dc.identifier.doi | 10.1109/LCOMM.2017.2676773 | - |
dc.identifier.scopusid | 2-s2.0-85020940583 | - |
dc.identifier.wosid | 000403431300049 | - |
dc.identifier.bibliographicCitation | IEEE COMMUNICATIONS LETTERS, v.21, no.6, pp.1413 - 1416 | - |
dc.relation.isPartOf | IEEE COMMUNICATIONS LETTERS | - |
dc.citation.title | IEEE COMMUNICATIONS LETTERS | - |
dc.citation.volume | 21 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 1413 | - |
dc.citation.endPage | 1416 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Backscatter networks | - |
dc.subject.keywordAuthor | wireless security | - |
dc.subject.keywordAuthor | collision-based authentication | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.