Loading [MathJax]/extensions/MathMenu.js
Backscattering Rectifier for Security and Identification in the context of Simultaneous Wireless Information and Power Transfer | IEEE Conference Publication | IEEE Xplore

Backscattering Rectifier for Security and Identification in the context of Simultaneous Wireless Information and Power Transfer


Abstract:

This article presents a proof-of-concept of an innovative security and identification mechanism for Internet of Things applications within the context of Simultaneous Wir...Show More

Abstract:

This article presents a proof-of-concept of an innovative security and identification mechanism for Internet of Things applications within the context of Simultaneous Wireless Information and Power Transfer. This easily integrable solution involves modifications only at the RF rectifier level of the wireless Sensing Node, enabling backscattering of the power source wave as a function of a digital private key. The wireless Sensing Node will be able to transmit identification information for a brief period. These details allow the power source system to identify the object and confirm its operational status. This mechanism adds an additional layer of security, independent and complementary of the communication protocol of the wireless Sensing Node.
Date of Conference: 24-26 September 2024
Date Added to IEEE Xplore: 31 October 2024
ISBN Information:
Conference Location: Paris, France

I. Introduction

In today's rapidly evolving landscape, the Internet of Things (IoT) has become ubiquitous across diverse sectors, including Structural Health Monitoring (SHM), healthcare monitoring, smart tracking, smart factory, and beyond. This proliferation of wirelessly interconnected devices has revolutionized how to monitor health, optimize industrial processes, and enhance daily life. However, with the increasing reliance on wireless communication within these systems, there emerges a significant vulnerability to cyber threats. The interconnected nature of IoT devices, coupled with their often insufficiently secured communication protocols, presents a challenge in safeguarding against potential attacks [1]. Several IoT protocols have evolved complex Medium Access Control (MAC) layers for authentication and cryptography to mitigate such attacks, as seen in LoRaWAN. However, they remain vulnerable to various cyber-attacks scenarios [2], [3]. Implementing these enhanced security layers into an IoT protocol requires additional computing resources and results in higher power consumption. Furthermore, integrating them into already operational IoT networks adds complexity to the process. In the context of Simultaneous Wireless Information and Power Transfer (SWIPT) and Wireless Power Transfer (WPT) [4], the protocols of IoT systems remain unchanged at the level of information transfer, while the power wave is only utilized for powering the wireless node.

Contact IEEE to Subscribe

References

References is not available for this document.