Professional Documents
Culture Documents
Abstract—Covert communication in backscatter radio systems apart from protecting the content of communication, it is
is considered, where the transmitter controls its transmit power imperative to hide the transmission, making it undetectable.
to keep the transponder’s response hidden, while a warden Such circumstances arise in sensitive communication scenarios
tries to detect this covert communication. To achieve covertness,
we propose a non-conventional transmission scheme where the or situations where an organization is interested in keeping its
transmitter emits noise-like signal with transmit power varying activities hidden over the air. The aforementioned activities
across different communication slots. Under the assumption of require covert communication that is undetectable by a third
a radiometer as the detector at the warden, we first derive the party [5]. The fundamental limits of covert communication has
optimal detection threshold for this detector. Next, building upon been explored in [6], providing a square root law on the limit
the detection performance of warden, we analyze the condition
on the transmit power to achieve a target level of covertness. of covertly transmitted information. Further research efforts
Our numerical results illustrate the price a backscatter system in this regard have demonstrated a positive communication
has to pay, in terms of bit error rate, for achieving covert rate under the exploitation of channel and noise uncertainty
communication. at the eavesdropper [7–10], presence of friendly jammers [11,
12] and using a full-duplex receiver generating artificial noise
I. I NTRODUCTION
[13] to facilitate covert transmissions.
The Internet of Things (IoT) foresees integration of every Security of backscatter systems and specifically RFIDs has
object for interaction via embedded systems. This will lead been considered widely in the recent literature. The physical
to a highly distributed network of devices communicating layer security of backscatter systems has been considered in
with human beings as well as other devices. The IoT devices detail in [14–16], and references therein. In [17], a frequency
are expected to be equipped with millions of sensors and hopping RFID system in the presence of an adversarial
communication capabilities, making them an intrinsic part reader is considered and a theoretical analysis of decoding
of the existing communication systems. It can be an ardu- error probability is provided. Despite a plethora of research
ous task to keep these energy-hungry sensors alive, since in the security and privacy of backscatter systems, to the
majority of these sensors are not easily accessible, due to best of our knowledge, covert communication in backscatter
their deployment in toxic and unsafe environments, or at communication has not been studied before. In this work,
places hard to reach. Backscatter communication [1, 2] offers we present a study on a backscatter system where the reader
unique advantages, eliminating the need of any active radio (i.e., the transmitter) tries to obtain information from a tag
frequency (RF) components, resulting in a prolonged life-span (i.e., the transponder) in such a way that the transmission
of the wireless devices and continued network functionality. from the tag remains covert from a warden, Willie, who is
These wireless devices can not only harvest energy from the looking to detect the tag’s transmission to the reader.1 In
transmitter’s signal, but can also modulate the same signal our considered system, the reader’s transmitted signal is not
to convey information. Although backscatter communication intended to be hidden, rather the reader looks to manipulate its
has been largely deployed in radio frequency identification signal such that Willie remains unaware of tag’s response state.
(RFID) systems for consumer-based applications e.g., supply-
chain management, RFID cards have also made their way into The main contributions of this work are as follows:
more sensitive arenas, e.g., access control, payment systems • To achieve covert backscatter communication, we pro-
and asset tracking. However, the application of backscatter pose to use a noise-like signal with variable power at the
systems in such sensitive scenarios is limited, owing to their reader when sending its transmitted signal. This trans-
broadcast nature and the ease of snooping information through mission scheme achieves a desired level of covertness by
eavesdropping. One option to alleviate this issue may be to use controlling the variation in reader’s transmit power.
stronger encryption protocols, but the size, cost and power • Under the proposed scheme, we derive a closed-form
constraints of most backscatter transponders do not warrant expression for the optimal detection threshold for a
such luxuries [3]. radiometer at Willie.
Physical layer security techniques offer compelling alter- • We analytically characterize the condition on the reader’s
natives to encryption, by exploiting the varying physical transmit power to achieve a target level of covertness and
characteristics of the wireless channel [4]. These techniques 1 We adopt the terms “reader” and “tag” as is commonly used in RFID
can also be used in conjunction with encryption to strengthen literature, although the analysis is applicable to a variety of systems employing
the existing layer of defense. However, situations exist where backscatter communication.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
numerically investigate the bit error rate (BER) perfor-
mance of the backscatter communication. The tradeoff Energy
between covertness against Willie’s detection and BER CW Transmitter Harvesting
performance at the reader is presented.
Receiver
II. S YSTEM M ODEL Z L1 Z L2
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
Willie has to make a decision at the end of each slot Owing to its low complexity and ease of implementation, we
regarding the tag’s actions in that slot. We define the prob- assume in this work that Willie uses a radiometer [11, 13]
ability of false alarm (or Type I error) as the probability that for the detection of any covert response from the tag. Under
Willie makes a decision in favour of H1 while H0 is true, this assumption, the average power received at Willie becomes
and denote it by PF A . Similarly, the probability of missed a crucial quantity. Based on Frii’s equation [22, 23], we have
K2
detection (or Type II error) is defined as the probability of h2ab = Gab
d2ab
, where Gab represents the combined transmitter-
Willie making a decision in favour of H0 while H1 is true, and receiver antenna gain between users a and b, and K = 4π λ
is
is denoted by PM D . Under the assumption of both hypotheses a constant dependent upon the carrier wavelength. Using (4),
being presented with an equal a priori probability [6, 10], we the average received power at Willie in a slot under H0 can
consider the reader achieving covert communication if, for be calculated as
a target > 0, a communication scheme exists such that
n 2
PF A + PM D ≥ 1 − , as n → ∞. Here signifies the covert 1X
Pw (H0 ) = lim yw (i, H0 )
requirement, since a sufficiently small renders any detector n→∞ n
i=1
employed at Willie to be ineffective [6]. n 2 (6)
1 X
III. D ETECTION S CHEME AT W ILLIE = lim hrw c(i) + Sw (i) + nw (i)
n→∞ n
i=1
Due to the independent and identically distributed 2
= αPR + σw ,
(i.i.d.) nature of Willie’s observation vector yw =
[yw (1), yw (2), . . . , yw (n)], the optimal approach for Willie to where
minimize his detection error, according to Neyman-Pearson Grw K 2 Grt Gtw K 4
criterion, is to use the likelihood ratio test [19], α= + , (7)
2
drw d2rt d2tw
fyw |H1 (yw |H1 ) D1 Pn
Λ(yw ) = ≷ Υ, (3) and in deriving (6), we have used the fact that i=1 c2 (i) cor-
fyw |H0 (yw |H0 ) D0
responds to the sum of n independent and squared Gaussians,
where Υ = 1 due to the assumption of equal a priori each with variance PR , and this sum of squared Gaussians
probabilities of each hypothesis. Here, D1 and D0 corre- results in a Chi-squared random variable. In (7), the first
spond to a decision in favor of hypothesis H1 and H0 , term corresponds to the reader’s signal received directly by
and fyw |H1 (yw |H1 ) and fyw |H0 (yw |H0 ) are the likelihood Willie and the second term corresponds to the structural mode
functions of Willie’s observation vectors for the considered component of tag’s antenna scattering as received by Willie.
slot, under hypothesis H1 and H0 , respectively. Under H0 , Under H1 , the power received at Willie includes an addi-
the tag chooses a load impedance that is conjugate matched tional term, due to the information-bearing reflection from the
to the antenna impedance, resulting in a reflection bearing no tag. Following steps similar to the analysis of H0 , the average
information. The baseband signal received by Willie under H0 power received at Willie in a slot under H1 is given by
is given by
2
Pw (H1 ) = βPR + σw , (8)
yw (i, H0 ) = hrw c(i) + Sw (i) + nw (i), (4)
where i = 1, . . . , n represents the symbol index. Here, c(i) is where
the ith symbol transmitted by the reader, Sw (i) = hrt htw c(i) Grw K 2 Grt Gtw K 4 Grt Gtw K 4 |Γ|2
represents the structural mode scattering component [20, 21] β= + 2 2 + . (9)
2
drw drt dtw d2rt d2tw
of the tag’s reflection received at Willie2 , and nw (i) is Willie’s
receiver noise component. In the following, we derive the optimal threshold of Willie’s
Under H1 , the tag modulates the reader’s signal by in- radiometer that minimizes the detection error probability.
tentionally mismatching its load impedance to the antenna
Proposition 1. Under the assumption of a radiometer, the
impedance, causing a deliberate reflection of the received
optimal value of threshold for Willie’s detector is
signal back to the reader. In this case, the baseband signal
(
received at Willie is γ ∗ ∈ (αPmax + σw 2 2
, βPmin + σw ), if αPmax < βPmin
∗ 2
yw (i, H1 ) = hrw c(i) + Sw (i) + Aw (i) + nw (i), (5) γ = αPmax + σw , otherwise,
(10)
where Aw (i) represents the antenna mode scattering compo- where α and β are as defined in (7) and (9), respectively.
nent of the tag’s reflection received at Willie. The antenna
mode component depends on the load chosen by the tag via Proof. Willie compares the average received power to a
(1) and (2), and is given by Aw (i) = hrt htw |Γ|c(i)x(i). threshold, γ, and decides on either of the hypothesis, H0 or
H1 , being true. In order to minimize his detection error, Willie
2 Note that the tag gives a constant (structural mode) reflection even when
considers the following optimization problem
no information is sent. In the majority of backscatter literature, the term
originating from the structural mode is generally ignored in the analysis, as
it has no impact on the reader’s error probability [1]. min PF A + P M D . (11)
γ
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
2 2
Here, we have (1) αPmin + σw ≤ γ ≤ βPmin + σw : In this case,
PF A = P [D1 |H0 ] = P [Pw > γ|H0 ] αPmax − γ + σw2
2
γ − σw
(12) PF A + PM D = , (17)
= P αPR + σw 2
> γ = P PR > . α(Pmax − Pmin )
α
and ∂(PF A∂γ
+PM D )
= α(Pmax−1
−Pmin ) < 0, which dictates that γ >
Since PR ∼ U (Pmin , Pmax ), 2
2
βPmin + σw should be chosen.
γ−σw 2 2
1,
if α ≤ Pmin (2) βPmin + σw < γ ≤ αPmax + σw : In this case,
γ−σw2
Pmax −
PF A = α γ−σ 2 (13) αPmax − γ + σw2 2
γ − σw − βPmin
Pmax −Pmin , if Pmin < α w ≤ Pmax P F A + PM D = + , (18)
α(Pmax − Pmin ) β(Pmax − Pmin )
2
γ−σw
0, if > Pmax .
α
Similarly, and ∂(PF A∂γ+PM D )
= α(Pmax−1 1
−Pmin ) + β(Pmax −Pmin ) < 0, and
2
PM D = P [D0 |H1 ] = P [Pw < γ|H1 ] resultantly, γ ≥ αPmax + σw should be chosen.
2 2
2
(3) αPmax + σw < γ < βPmax + σw : In this case,
2
γ − σw
= P βPR + σw < γ = P PR < 2
β γ − σw − βPmin
2
PF A + P M D = , (19)
β(Pmax − Pmin )
γ−σw
0, if β ≤ Pmin (14)
2
γ−σw
and ∂(PF A∂γ
+PM D )
= β −Pmin
γ−σ 2 = β(Pmax1−Pmin ) > 0, which dictates that γ ≤
−P , if Pmin < β w ≤ Pmax 2
P max min
2 αPmax + σw should be chosen.
γ−σw
1, if > Pmax .
β Since α and β are fixed quantities determined by the system
Willie has to choose his threshold, γ, such that PF A + PM D parameters and fully known by Willie, the results of Case-I
is minimized. Using (13) and (14), the crucial values on the γ and Case-II complete the proof.
2 2 2 2
axis are αPmin +σw , αPmax +σw , βPmin +σw and βPmax +σw .
From (13) and (14), it can also be seen that choosing γ ≤ IV. R EADER ’ S S TRATEGY FOR C OVERTNESS
2 2
αPmin + σw or γ > βPmax + σw results in PF A + PM D = 1. Under the considered scheme, the reader looks to manip-
Thus the best choice of γ for Willie lies in the interval αPmin + ulate its transmit power for achieving covertness. We first
2 2
σw < γ ≤ βPmax + σw . From the system model, we know that establish a condition on the parameters of reader’s transmit
2
β > α and Pmax > Pmin , resulting in βPmax + σw > αPmin + power distribution such that there are detection errors at Willie.
2 2 2
σw , but the relation between αPmax + σw and βPmin + σw Next we consider the condition on the reader’s transmit power
can not be determined. To resolve this discrepancy in order to to achieve a target covertness level determined by .
determine the best choice of γ for Willie, we consider these
two options in further detail. Lemma 1. To cause any detection errors at Willie, the reader
has to choose the support of its transmit power i.e., Pmin and
Case - I : αPmax < βPmin Pmax , such that
We have three different intervals for the choice of γ here, Pmax β
≥ , (20)
which are considered in the following: Pmin α
2 2
(1) αPmin + σw ≤ γ ≤ αPmax + σw : In this case,
where α and β are as defined in (7) and (9), respectively.
2
αPmax − γ + σw
PF A + P M D = , (15) Proof. The proof builds on the proof of Proposition 1, where
α(Pmax − Pmin )
the condition under which Willie makes detection errors is
and ∂(PF A∂γ
+PM D )
= α(Pmax−1
−Pmin ) < 0, dictating that γ >
derived in Case-II.
2
αPmax + σw should be chosen.
(2) βPmin + σw2
≤ γ ≤ βPmax + σw 2
: In this case, After having derived the condition under which Willie is
forced to make detection errors, we now present the condition
2
γ − σw − βPmin for achieving a target level of covertness.
PF A + PM D = , (16)
β(Pmax − Pmin )
Proposition 2. To achieve a covertness level of , the reader
and ∂(PF A∂γ
+PM D )
= β(Pmax1−Pmin ) > 0, and resultantly, γ < should choose the support of its transmit power i.e., Pmin and
2
βPmin + σw should be chosen. Pmax , such that
2 2
(3) αPmax + σw < γ < βPmin + σw : In this case, PF A +
Pmax β
PM D = 0, which means that a choice of γ in this interval will ≥ , (21)
have no detection errors at Willie. Pmin β − (β − α)
Case - II : αPmax ≥ βPmin where α and β are as defined in (7) and (9), respectively.
Again, we have three different intervals for the choice of γ, Proof. Building on Proposition 1 and Lemma 1, Willie’s
as considered in the following: optimal choice of threshold, γ, under the condition αPmax ≥
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
2
βPmin , is to choose γ = αPmax + σw . For this value of
30
threshold, PF A = 0, and we have Reflection Coefficient |Γ | = 0.3
Reflection Coefficient |Γ | = 0.5
αPmax − βPmin 25 Reflection Coefficient |Γ | = 0.8
PF A + PM D = P M D = . (22)
β(Pmax − Pmin )
20
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
[2] J. Kimionis, A. Bletsas, and J. N. Sahalos, “Increased range bistatic
scatter radio,” IEEE Trans. Commun., vol. 62, no. 3, pp. 1091–1104,
Non-Covert &RPPXQLFDWLRQ
Mar. 2014.
-1
Covert&RPPXQLFDWLRQ ǫ = 0.1 [3] H. Hassanieh, J. Wang, D. Katabi, and T. Kohno, “Securing RFIDs by
10 Covert &RPPXQLFDWLRQ ǫ = 1.1x10-4 randomizing the modulation and channel,” in USENIX NSDI Symposium,
May. 2015, pp. 235–249.
[4] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless
Communications. CRC Press, 2013.
BER
R EFERENCES
[1] C. Boyer and S. Roy, “Backscatter communication and RFID: Coding,
energy, and MIMO analysis,” IEEE Trans. Commun., vol. 62, no. 3, pp.
770–785, Mar. 2014.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.