METHOD AND APPARATUS FOR PHYSICALLY SECURE BACKSCATTER COMMUNICATIONS
20220261565 · 2022-08-18
Inventors
- Gehad DESOUKY (Doha, QA)
- Tamer Khattab (Doha, QA)
- Khalid Abualsaud (Doha, QA)
- Mohsin GUIZANI (Doha, QA)
- Elias Yaacoub (Doha, QA)
- Heba SHEHATA (New South Wales, AU)
Cpc classification
G06K7/10089
PHYSICS
G06K7/10366
PHYSICS
G06K7/10475
PHYSICS
International classification
Abstract
Systems, methods, apparatuses, and computer program products for backscatter RFID communication security. In some example embodiments, a system may include a RFID reader, and a passive RFID tag. A desired direction channel H.sub.θ.sub.
Claims
1. A system, comprising: a radio frequency identification reader; a passive radio frequency identification tag, wherein a desired direction channel H.sub.θ.sub.
2. The system of claim 1, wherein an antenna of the radio frequency identification reader antenna is configured to transmit an excitation signal E according to E=PX+W, wherein P is a beamforming vector fed into the tuneable phase shifters of the radio frequency identification reader's antennas, X is the radio frequency identification reader's signal, and W is an artificially injected noise designed to be null to the desired channel direction channel H.sub.θ.sub.
3. The system of claim 1, wherein the radio frequency identification reader is configured to transmit a signal according to
4. The system of claim 1, wherein a beamforming vector of the radio frequency identification reader is defined according to
5. The system of claim 1, wherein a beamforming vector of the radio frequency identification reader is defined according to
6. The system of claim 1, wherein a beamforming vector of the radio frequency identification reader is defined according to
7. The system of claim 1, wherein a signal backscattered from the passive radio frequency identification tag is transmitted in all directions according to
8. A system, comprising: a first radio frequency identification reader; a second radio frequency identification reader; a passive radio frequency identification tag, wherein the first radio frequency identification reader is aware of the location of the second radio frequency identification reader and the location of the passive radio frequency identification tag, wherein the second radio frequency identification reader is aware of the location of the first radio frequency identification reader and the location of the passive radio frequency identification tag, and wherein the first radio frequency identification reader and the second radio frequency identification reader are aware of each others generated reader signals.
9. The system of claim 8, wherein the first radio frequency identification reader is configured to transmit a randomly generated signal X.sub.1 to the passive radio frequency identification tag at angle Θ.sub.R1, and wherein the second radio frequency identification reader is configured to transmit a randomly generated signal X.sub.2 to the passive radio frequency identification tag at angle Θ.sub.R2.
10. The system of claim 9, wherein the passive radio frequency identification tag is configured to receive X.sub.1 and X.sub.2.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] For proper understanding of example embodiments, reference should be made to the accompanying drawings, wherein:
[0005]
[0006]
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
DETAILED DESCRIPTION
[0024] It will be readily understood that the components of certain example embodiments, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of some example embodiments of systems, methods, apparatuses, and computer program products for using dynamic directional modulation technology to secure the communication links between an RF reader and an RF tag is not intended to limit the scope of certain example embodiments, but is instead representative of selected example embodiments.
[0025] Certain example embodiments described herein may have various benefits and/or advantages to overcome the disadvantages described above. For example, certain example embodiments may maintain the power consumption limitations from the reader's side, and maintain the reduced complexity and reduced cost of RFID tags. Furthermore, the performance of the eavesdropper with breaching system security does not improve with higher signal-to-noise ratios (SNR values) (i.e., closer distances). Thus, certain example embodiments discussed below are directed to improvements in computer-related technology.
[0026] Some example embodiments described herein may provide a secure RFID system (or any backscatter communication-based system) without sacrificing the simplicity of the RFID tag component. In particular, dynamic directional modulation (DM) technology may secure the communication links between the reader and the tag. Such DM technology may be exploited by a reader equipped with multiple antennas to transmit a readable signal only in the direction of a legitimate tag, while a scrambled signal is sent in other directions.
[0027]
[0028] This DM used synthesis approach utilizes artificial orthogonal noise injection, where a noise vector may be created to be null in the direction of the tag 102, as shown in
[0029] The overall DM system may be defined according to E=PX+W (Equation 2), where E is the excitation signal transmitted from the antennas of reader 101, P is the beamforming vector fed into the tuneable phase shifters of the antennas of reader 101, X is the signal of reader 101, and W is the artificial injected noise designed to be null to the desired channel direction.
[0030] In order to secure this system, the signal of reader 101 must be unknown to eavesdropper 103, which may be accomplished by using a pseudorandom uniform distribution generator for the signal of reader 101, such as
[0031]
[0032]
[0033] The beamforming vector may be designed to point in the direction of Θ.sub.R, i.e.,
and the artificial noise may be null in the direction of Θ.sub.R, i.e., H.sub.θ.sub.
[0034] It is noted that, despite that both the reader and the eavesdropper receiving approximately the same scattered signal from the tag defined by Equation (7), both of the reader and the eavesdropper need to know how to extract the tag information, s, which is derivable from term ∥H.sub.ΘR∥Xs if the receiver (i.e., reader or eavesdropper) know X Furthermore, Equation 7 (above) multiplies s by noise, resulting in a noise term. Since X is a signal generated by a reader, the reader can derive s from the aforementioned term. If a conventional (nonsecure) RFID method were used, the reader may inadvertently transmit X to the eavesdropper when transmitting to the tag, enabling the eavesdropper to use X to deduce s. By using the techniques described herein, using the DM at the time of sending X from the reader to the tag prevents the eavesdropper from receiving X, and thereby deducing s, allowing for secure communication of tag information.
[0035] The effectiveness of the techniques described herein can be demonstrated using bit error rate (BER) criteria (probability of bit error at the receivers). For a secure link, the BER at the reader would preferably be a very low value <<0.5, and the BER at the eavesdropper would preferably be approximately 0.5. Communication links can be used between the reader, tag, and eavesdropper that have a fading effect and follow a random model, e.g., Rayleigh distribution, and the direction of the tag with respect to the reader (desired direction) is Θ.sub.R=80°.
[0036]
[0037]
[0038]
[0039] In various embodiments, two cooperative readers may be used in situations where it is possible for an eavesdropper to align itself with the direction of the tag with respect to the reader. As illustrated in
[0040] The two readers may transmit their two different randomly generated signals simultaneously, X.sub.1,X.sub.2, using the DM on each one of them which is directed to the tag's direction at angles Θ.sub.R1 and Θ.sub.R2 from the two readers, respectively. Furthermore, the activation signal arriving at the tag may be the superposition of the two signals X.sub.1+X.sub.2, which is known to both readers due to their cooperation setup. Any one of the readers may use X.sub.1,X.sub.2 to recover the tag's signal from the backscatter signal.
[0041] Due to the use of the combinations of X.sub.1+X.sub.2 as the base signal for activating the tag, the eavesdropper needs to read the leakage of both reader's signals (arrows from readers and tag to eavesdropper in
[0042]
[0043]
[0044]
[0045] In some example embodiments, RFID reader 1710 may be a RF transmitter and receiver that can read and write information to RFID tag 1720.
[0046] RFID tag 1720 may include at least an integrated circuit for modulating and demodulating RF, and an antenna for transmitting and receiving signals. As an example, RFID tag 1720 may use frequency ranges from low frequencies of 125-134 kHz and 140-148.5 kHz, and high frequencies of 850-950 MHz and 2.4-2.5 GHz.
[0047] RFID reader 1710 and/or RFID tag 1720 may be part of a passive reader active tag (PRAT) system having a passive reader which only receives radio signals from active tags (battery operated, transmit only). The reception range of a PRAT system reader can be adjusted from 1-2,000 feet (0-600 m), allowing flexibility in applications such as asset protection and supervision. RFID reader 1710 and/or RFID tag 1720 may be part of an active reader passive tag (ARPT) system, where the reader is active, transmitting an interrogator radio signal, receiving authentication signal replies from passive tags. Furthermore, RFID reader 1710 and/or RFID tag 1720 may be part of an active reader active tag (ARAT) system, where the reader is active, and interacts with active or battery-assistive passive tags.
[0048] The features, structures, or characteristics of example embodiments described throughout this specification may be combined in any suitable manner in one or more example embodiments. For example, the usage of the phrases “various embodiments,” “certain embodiments,” “some embodiments,” or other similar language throughout this specification refers to the fact that a particular feature, structure, or characteristic described in connection with an example embodiment may be included in at least one example embodiment. Thus, appearances of the phrases “in various embodiments,” “in certain embodiments,” “in some embodiments,” or other similar language throughout this specification does not necessarily all refer to the same group of example embodiments, and the described features, structures, or characteristics may be combined in any suitable manner in one or more example embodiments.
[0049] Additionally, if desired, the different functions or procedures discussed above may be performed in a different order and/or concurrently with each other. Furthermore, if desired, one or more of the described functions or procedures may be optional or may be combined. As such, the description above should be considered as illustrative of the principles and teachings of certain example embodiments, and not in limitation thereof.
[0050] One having ordinary skill in the art will readily understand that the example embodiments discussed above may be practiced with procedures in a different order, and/or with hardware elements in configurations which are different than those which are disclosed. Therefore, although some embodiments have been described based upon these example embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions would be apparent, while remaining within the spirit and scope of the example embodiments.
Partial Glossary
[0051] BER Block Error Rate
[0052] CPU Central Processing Unit
[0053] DM Directional Modulation
[0054] GPS Global Positioning System
[0055] HDD Hard Disk Drive
[0056] IEEE Institute of Electrical and Electronics Engineers
[0057] IMSI International Mobile Subscriber Identity
[0058] IoT Internet of Things
[0059] PDA Personal Digital Assistance
[0060] RAM Random Access Memory
[0061] RF Radio Frequency
[0062] RFID Radio Frequency Identification
[0063] SNR Signal-to-Noise Ratio
[0064] WLAN Wireless Local Area Network