<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>BatAu: A Batch Authentication Scheme for Backscatter Devices in a Smart Home Network</title></titleStmt>
			<publicationStmt>
				<publisher>IEEE</publisher>
				<date>05/28/2023</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10483713</idno>
					<idno type="doi">10.1109/ICC45041.2023.10279771</idno>
					
					<author>Yishan Yang</author><author>Masoud Kaveh</author><author>Jiajun Li</author><author>Yifan Zhang</author><author>Zheng Yan</author><author>Kai Zeng</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[With the maturity of the Internet of Things (IoT), many IoT applications have been popularized and promoted. As one of the IoT technology, backscatter communication (BC) has aroused research interest due to its low-cost and ultralow power consumption characteristics. Due to their simple design and battery-less functionalities, backscatter devices (BDs) have been introduced as the main candidates for deploying in smart home networks (SHN). Although batch authentication in BC systems is crucial and efficient for SHN security, existing schemes have only focused on radio frequency identification (RFID) devices and no literature has given a general solution for BD batch authentication. In this paper, we propose a scheme named BatAu for authenticating batch BDs applied in SHN by extracting physical layer features in multiplexing signals. We conduct numerical simulations with various settings to show its desirable performance.]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>I. INTRODUCTION</head><p>With the development of the Internet of Things (IoT) technology, IoT applications have increased with exponential growth in both size and number of devices. More energy is needed to be consumed to drive IoT devices for ensuring the normal operation of an entire network. However, battery-powered wireless devices need regular maintenance and replacement. This kind of expensive and inflexible power supplication has become the bottleneck of IoT applications. Backscatter communication (BC), a kind of low-cost and ultralow power consumption technology, has received widespread attention due to its potential to alleviate the above challenges. By reflecting incident signals, backscatter devices (BD) can communicate with others without generating signals by themselves. This kind of simple and inexpensive device is very suitable to be deployed in IoT applications such as smart homes, smart cities, and the Internet of Vehicles.</p><p>A smart home network (SHN) can provide a comfortable residence environment by controlling in-house equipment such as lighting and air conditioning systems. As environmentalfriendly and energy-saving devices, BDs can be deployed as an important part of SHN. Such an SHN system consists of two main types of devices: BDs and an access point (AP). BDs can be placed at different locations and have a wide range of functionalities, such as gas leak detection. AP is a controller which can communicate with multiple BDs to obtain the current state of the SHN and control a corresponding system to act. However, the open nature of wireless communication leads to security threats in SHN like impersonation, replay, and relay attacks. For example, once attackers get illegal access to the AP, sensitive information of the system could be stolen. To ensure information credibility from multiple BDs, it is crucial for AP to authenticate all involved BDs efficiently. Authenticating multiple BDs in a batch can effectively provide fundamental security for SHN with high efficiency to defend against such attacks.</p><p>As a supplement for upper layer protocol, physical layer authentication (PLA) establishes a secure channel for wireless communication systems <ref type="bibr">[1]</ref>. PLA exploits inherent physical layer attributes, like channel statement information (CSI), received signal strength (RSS), and time of arrival/flight (ToA/ToF), as fingerprints for identifying or locating a device. For hard cloning and forging of fingerprints and not requiring additional computation, PLA is regarded as a promising security solution. However, the existing literature in PLA lacks a solution for batch authentication of BDs. Most of the existing physical layer authentication schemes are focused on how to identify a single BD in various applications, such as wearable BD <ref type="bibr">[2]</ref>, RFID <ref type="bibr">[3]</ref>, <ref type="bibr">[4]</ref>, robotic network <ref type="bibr">[5]</ref> and general BC system <ref type="bibr">[6]</ref>. A few works <ref type="bibr">[7]</ref>, <ref type="bibr">[8]</ref> can authenticate two BDs simultaneously. But they cannot authenticate more than two tags in a batch.</p><p>A solution for multiple BDs authentication by utilizing physical layer fingerprints is still an opening question. Difficulties lie in the following two aspects when solving batch authentication by PLA. Firstly, signal collision happens when multiple BDs send signals together. Secondly, feature selection is not a trivial problem when deploying multiple BDs in a system.</p><p>In this paper, we explore the possibility of batch authentication by proposing an authentication scheme named BatAu to authenticate a group of BDs simultaneously and enhance the security of SHN with high efficiency. Power-domain nonorthogonal multiple access (PD-NOMA) has been shown as an attractive technology to allow multiple devices to be served by the same source <ref type="bibr">[9]</ref>, <ref type="bibr">[10]</ref>. Mixed incident signals in an SHN enabled by BDs can be treated as a PD-NOMA-aided BC system. CSI describes the propagation process of the wireless signal between the transmitter and the receiver, which includes the effects of distance, scattering, and fading on the signals. We adopt different parameters in extensive numerical simulations to evaluate the performance of BatAu regarding accuracy, latency, and availability. The rest of the paper is organized as follows. We review a number of existing schemes related to batch authentication and PLA in Section II. Then, we elaborate the system/security model of BatAu, its design and its security against different attacks in Section III. In section IV, we present our evaluation results by conducting numerical simulations. Finally, we draw a conclusion in the last section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. RELATED WORK</head><p>This section reviews existing batch authentication and PLA schemes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Batch Authentication Schemes</head><p>Existing batch authentication schemes applied in BC systems have mainly focused on distinguishing RFID tags. Weis et al. <ref type="bibr">[11]</ref> proposed a hash function-based scheme named HashLock, which can support multiple RFID tags authenticated in a batch. In HashLock, the reader sent a random number r as an authentication request. After receiving the request, the tag calculates a hash value by inputting its secret key and r as a response. The authentication server then searches for whether there exists a key to satisfy the hash value to make an authentication decision. The complexity of the key search is linear to the number of tags in the system,</p><p>MLA: machine learning avoidance; SAI: signal analyzer independence; BA: batch authentication supporting; &#8730; :supported; &#215;:not supported;</p><p>which leads to low authentication efficiency and inapplicability in a large-scale system. Tree-based approaches are proposed to improve authentication efficiency. For example, in <ref type="bibr">[12]</ref>, the keys of all tags are organized with a balanced tree. Each node of the tree stores a key and the keys in the path from the root to a leaf node are assigned to the tag related to the leaf node. However, each tag needs to store all keys from the root to leaf nodes. ACTION <ref type="bibr">[13]</ref> employs a novel sparse tree architecture, such that the key of every tag is independent of one another. The common disadvantage of the above schemes lies in the high cost of authentication. They <ref type="bibr">[11]</ref>- <ref type="bibr">[13]</ref> need a large search time and employ an anti-collision algorithm to identify them before obtaining their hash values. Besides, the volume of authentication data is high due to the use of hash functions, leading to huge communication costs.</p><p>To address the high cost of the hash function-based method, some probabilistic approaches aimed to authenticate the validity of a batch of tags. Different from the hash functionbased approaches, a single echo-based batch authentication (SEBA) scheme <ref type="bibr">[14]</ref> considers a batch of tags as a whole and authenticates the distribution of their replies. To overcome the scalability problem, Lin et al. <ref type="bibr">[15]</ref> proposed a scheme called FISH to meet the requirement of prompting reliable batch authentications in large-scale RFID applications. However, these kinds of methods authenticate the validity of RFID tags with a probability of 1&#948; if the number of fake tags is less than n * in a n tags system, where &#948; and are two security parameters. Meanwhile, the schemes proposed in <ref type="bibr">[14]</ref> and <ref type="bibr">[15]</ref> only focus on RFID systems and authenticate the group of tags sequentially within a specified time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. PLA Schemes</head><p>By extracting the physical layer features as fingerprints, a number of schemes have been proposed to identify or locate a BD. Founding the propagation difference regarding RSS between on-body and off-body BDs, Luo et al. <ref type="bibr">[16]</ref> proposed a low-power authentication scheme for authenticating wearable BD. Zhao et al. <ref type="bibr">[3]</ref> utilized unique phase features generated when a user touches the BD as a fingerprint. This kind of fingerprint can be extracted by a signal analyzer. With this approach, the device and its holder can be authenticated simultaneously with a machine learning (ML) based classifier. Li et al. proposed an RFID authentication scheme <ref type="bibr">[4]</ref> by building a fully connected multi-class neural network for fingerprint classification. The reflection coefficient of each tag circuit is defined as the unique fingerprint for authentication. If two tags are placed in a close position, the backscattered The difference can be analyzed by deploying a professional signal analyzer. Butterfly <ref type="bibr">[7]</ref> and Hu-Fu <ref type="bibr">[8]</ref> utilize this kind of difference to authenticate a pair of tags. Wang et al. proposed a multi-stage authentication scheme named BCAuth <ref type="bibr">[6]</ref> to authenticate a BD in both static and dynamic scenarios. By exploiting clustering-based analysis on RSS and ToA, BCAuth can detect the number of attackers and localize their positions. BCAuth also offers mutual authentication for capable BDs. ML-based methods need adequate labeled data sets to train a classifier. In addition, deploying a sophisticated signal analyzer increases hardware costs, which causes limitations in the scenario of the schemes. Table I compares the above-related PLA works with BatAu in terms of ML avoidance (MLA), signal analyzer independence (SAI), and batch authentication (BA). We can see that although the existing PLA schemes have the potential for practical applications, there still lacks a general method for efficiently authenticating multiple BDs in a batch. BatAu shows a great advance in supporting batch device authentication. Besides, BatAu does not depend on an ML model and a signal analyzer.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. BATAU OVERVIEW</head><p>In this section, we first introduce the system and security models of BatAu and then give a detailed description of its design. Furthermore, we theoretically analyze the security of BatAu.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. System Model</head><p>Fig. <ref type="figure">1</ref> illustrates the system model of the proposed scheme. Equipped with omnidirectional antennas, AP can send RF signals to all BDs in order to authenticate them. The RF signals can carry information and energy simultaneously. Each BD contains a backscatter modulator, an information receiver, an RF energy harvester, and other modules (i.e., sensors) that can operate in two modes, backscattering mode and listening mode, respectively. In the backscattering mode, BDs transmit signals by reflecting incident signals and intentionally altering their information. In the listening mode, BDs decode information from a part of received signals while the remaining signals are used for energy harvesting. The harvested energy is used to power up the circuit and sensing elements. In SHN, BDs can be placed at different locations as sensors and can be grouped based on diverse functions. As a controller, AP can obtain the present condition of SHN by getting responses from BDs.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Security Model</head><p>In this paper, we consider AP as an honest and trusted party for all BDs in the system. BDs honestly transmit data only when inquired by the AP.</p><p>The attacker has two actions: eavesdropping and attacking. By eavesdropping, the attacker eavesdrops on the channel between the AP and a legal BD to acquire sensitive information. By attacking, the attackers intend to pass the authentication and transmit fake messages to AP to intrude on the SHN system. We define three kinds of attackers as follows:</p><p>An impersonate attacker, i.e. AD 1 in Fig. <ref type="figure">1</ref>, has the ability to eavesdrop on the backscatter signals from a genuine BD or a group to obtain its or their identity information. Then the attacker impersonates the legal BD or the group with the identity to pass the authentication.</p><p>A replay attacker, AD 2 as shown in Fig. <ref type="figure">1</ref>, records the backscatter signals from a legal group and replays identical signals of prior communication to the AP when the group is required by AP.</p><p>A relay attacker, namely AD 3 in Fig. <ref type="figure">1</ref>, relays the signal of a legitimate group to the AP when the group is required for authentication.</p><p>We assume that the adversary cannot be very close to a legal BD and outside of the scope of a BD group. The correlation of fingerprints between two transmitters significantly reduces as the distance between the two transmitters increases. For example, in a wireless communication system with large multi-paths and rich scatters, the features of two transmitters with half wavelength distance can be treated as completely independent <ref type="bibr">[17]</ref>. Thus, this assumption avoids attackers from getting highly correlated fingerprints and ensures they measure different channels with the legal BDs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. The Proposed Scheme</head><p>Herein, we describe the design of BatAu by utilizing mixed CSI from NOMA signals as the fingerprint of group BDs for authentication. As shown in Fig. <ref type="figure">2</ref>, the scheme contains two stages: a training stage and an authentication stage.</p><p>Training stage. AP sends a training signal s T with total power P to a certain group which contains n BDs, for example, Group i , as shown in Fig. <ref type="figure">1</ref>. The received signal at BD k , denoted as y k T can be expressed as</p><p>) where h k denotes the CSI between BD k and AP, and N k denotes additive white Gaussian noise (AWGN) at BD k .</p><p>After receiving the signal, BD k reflects the signal y k T with a power reflection coefficient (PRC) &#945; ik , but does not alter any information in the training stage. &#945; ik is preassigned by AP to the group member and satisfies n k=1 &#945; ik = 1. In order to decode information of each BD from mixed-signals by successive interference cancellation (SIC) strategy, the PRC of different BDs varies <ref type="bibr">[18]</ref>. Then, the reflected signal</p><p>(3) where N A denotes AWGN at AP and I k = &#8730; &#945; ik h k N k denotes internal interference. AP extracts CSI in y R as a group fingerprint e to form a white list for authentication, denote as</p><p>which is steady in a static situation. Authentication stage. At the beginning of the authentication stage, the AP sends an authentication signal s with transmission power P to select a certain group of BDs to get responses, e.g., Group i in Fig. <ref type="figure">1</ref>. The received signal at BD k is similar to <ref type="bibr">(1)</ref> and can be denoted as</p><p>(5) Different from the training stage, the selected BD k reflects the received signal by intentionally altering its information x k with PRC. The reflected signal by BD k in this stage is:</p><p>The mixed signals received at AP are also similar to 3, which is denoted as AP can make an authentication decision by measuring the difference between fingerprint e and the observed value &#234; as E = |e -&#234;| . (9) If the observed &#234; is from a legal group, the results of |e -&#234;| can be negligible. According to the security assumption, the attacker cannot get highly correlated fingerprints with any legal BDs, which leads to a substantial difference of E when the signals are not from a legal group. By formulating a hypothesis text with a threshold &#952; as H 0 : E &#8804; &#952;, (10) AP can make an authentication decision. Selecting an appropriate value of the threshold is essential for the performance of the scheme. We can adjust the threshold by evaluating the detection error.</p><p>If this authentication is accepted, AP decodes this mixed signal with the SIC strategy. Since every BD k in the group reflects the signal by altering its information x k , AP can decode x k in the mixed signals.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D. Security Analysis</head><p>1) Identity impersonation attacks: Assuming an identity impersonation attacker knows the authentication scheme. The attacker can obtain the identity of one legal BD and know which group it belongs to. The attacker muddles through by counterfeiting the legal BD in the group. Since the attacker cannot be very close to the legal BD, the independence of the Rayleigh fading channel causes the sent signals from the attacker to have uncorrelated CSI with the legal one. This leads to a remarkable difference for AP to reject the authentication. The situation is similar if a strong attacker can launch a group identity impersonation attack by owning multiple counterfeit BDs. It can also be detected by AP due to the difference of mixed CSI. Thus, identity impersonation attackers only with legal identities cannot succeed at AP.</p><p>2) Replay attacks: Assuming a replay attacker can intercept the authentication signals from a legal group of BDs, the attacker only replays the captured signal without any modification to raise a replay attack. The received signals at AP consist of the group signals with the CSI of the attacker mixed in it, which leads to an error value and causes an authentication failure. Therefore, BatAu is capable of defending against replay attacks.</p><p>3) Relay attacks: Assuming a relay attacker relays the authentication signal of a legal group to the AP. In this situation, AP receives both signals from the legal group and the attacker. The received signals at AP from the attacker have a significantly different fingerprint from the legal one. Hence, AP can directly detect relay attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. EVALUATION</head><p>In this section, we analyze and discuss the performance of BatAu with extensive simulations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A. Simulation Setting</head><p>In our simulations, we consider a batch authentication system as illustrated in Fig. <ref type="figure">3</ref> with two kinds of entities: an AP and six BDs. Six BDs with the same function are enough for deploying in an SHN. The distance from BD to the AP varies from BD to BD. These six BDs are grouped into five groups, and each group includes two to six BDs. Regarding the surroundings of SHN, it is unavoidable that obstacles may block the main channel between the AP and BDs. So we model the channel between AP and BDs with the Rayleigh channel model <ref type="bibr">[19]</ref>. The channel gains are set as 10 -2 d -2 k according to <ref type="bibr">[6]</ref>, <ref type="bibr">[20]</ref>, where d k denotes the distance between the BD k and the AP. The uplink of the system is modeled as NOMA <ref type="bibr">[18]</ref>, where PRC for each BD k in the group is set to different values. All PRC of the grouped BDs is preassigned </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B. Metrics</head><p>We use accuracy, latency, and availability to evaluate our proposed scheme.</p><p>Accuracy. Accuracy indicates the probability of correctly identifying a group, including accepting a legitimate group and rejecting an illegal group. We define the true positive rate (TPR) as the rate of a legal group accepted by BatAu, and the false positive rate (FPR) as the rate of an illegal group accepted by BatAu. A receiver operating characteristic (ROC) curve, a classical measure for describing the relationship between FPR and TPR, can show the resolving ability under varying thresholds.</p><p>Latency. Latency refers to the time spent in processing authentication. The main purpose of batch authentication is to improve the efficiency of BD authentication. The latency refers to the time spent from sending an authentication request to making an authentication decision.</p><p>Availability. Availability shows the performance of the proposed scheme under attacks. It indicates the accuracy of authentication when attackers launch different kinds of attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C. Simulation Results</head><p>In this part, we show the performance of BatAu regarding the metrics above. Due to none of the work providing a solution for batch authentication in BC based on physical layer characteristics, we cannot set a comparison simulation with the existing work.</p><p>Fig. <ref type="figure">4</ref> shows the ROC curve of our proposed scheme when the signal-to-noise ratio (SNR) is 30dB regarding different numbers N of BDs in one group. When TPR grows, FPR also grows, as illustrated in Fig. <ref type="figure">4</ref>, which indicates that by setting an appropriate hypothesis test threshold, the scheme can authenticate the legal group of BDs. Fig. <ref type="figure">5</ref> shows the ROC curve of the group consisting of four BDs under different SNR conditions. From Fig. <ref type="figure">5</ref>, we observe that the higher the SNR, the better the authentication performance. Even though the noise could affect the authentication accuracy, BatAu has the capability to make a correct authentication decision by setting a proper threshold under poor communication conditions. Fig. <ref type="figure">6</ref> shows the latency of the scheme with regard to different numbers N of BDs in the group and different SNR conditions. To avoid an experimental error, we measure the latency five times and take the average as the result. The latency of the scheme is highly related to the number N of BDs in the group. SNR conditions have little effect on latency. Fig. <ref type="figure">7</ref> shows the ROC curve of the group consisting of four BDs under different numbers N of identity impersonation attackers. As illustrated in Fig. <ref type="figure">7</ref>, the bigger the number of imposters who launch attacks simultaneously, the better the performance of BatAu. Because a large number of attackers sneaking into a legal group leads to extracted observation fingerprints deviating from the original value recorded in a white list. It is indicated that it is easier for BatAu to detect attacks when more attackers exist.</p><p>Fig. <ref type="figure">8</ref> shows the bit error rates (BER) of the decoding signal from the BD that has the biggest PRC in the group containing N members. BatAu can obtain a more satisfactory BER under a higher SNR. However, when there are more than six BDs in the group, due to internal interference caused by NOMA, some received signals from BDs suffer from undesired BER, which causes meaningless communications. How to enhance the scalability of BatAu to support batch authentication in large-scale BD deployment scenarios is an interesting research topic worth further investigation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. CONCLUSION</head><p>In this paper, we proposed BatAu, a scheme for simultaneously authenticating multiple BDs deployed in an SHN. By exploiting physical layer features CSI from multiplexing NOMA signals, BatAu is capable of authenticating the eligibility of a group of BDs and defending against identity impersonation, replay, and relay attacks. We evaluate the performance of BatAu through extensive simulations with regard to accuracy, latency, and availability. The results showed that BatAu has a desirable performance and efficiency. However, BatAu only considers a static scenario and has an undesirable performance </p></div></body>
		</text>
</TEI>
