You are on page 1of 6

Covert Communication in Backscatter Radio

Khurram Shahzad and Xiangyun Zhou


Research School of Engineering, The Australian National University, Canberra, ACT 2601, Australia
Email: {khurram.shahzad, xiangyun.zhou}@anu.edu.au

Abstract—Covert communication in backscatter radio systems apart from protecting the content of communication, it is
is considered, where the transmitter controls its transmit power imperative to hide the transmission, making it undetectable.
to keep the transponder’s response hidden, while a warden Such circumstances arise in sensitive communication scenarios
tries to detect this covert communication. To achieve covertness,
we propose a non-conventional transmission scheme where the or situations where an organization is interested in keeping its
transmitter emits noise-like signal with transmit power varying activities hidden over the air. The aforementioned activities
across different communication slots. Under the assumption of require covert communication that is undetectable by a third
a radiometer as the detector at the warden, we first derive the party [5]. The fundamental limits of covert communication has
optimal detection threshold for this detector. Next, building upon been explored in [6], providing a square root law on the limit
the detection performance of warden, we analyze the condition
on the transmit power to achieve a target level of covertness. of covertly transmitted information. Further research efforts
Our numerical results illustrate the price a backscatter system in this regard have demonstrated a positive communication
has to pay, in terms of bit error rate, for achieving covert rate under the exploitation of channel and noise uncertainty
communication. at the eavesdropper [7–10], presence of friendly jammers [11,
12] and using a full-duplex receiver generating artificial noise
I. I NTRODUCTION
[13] to facilitate covert transmissions.
The Internet of Things (IoT) foresees integration of every Security of backscatter systems and specifically RFIDs has
object for interaction via embedded systems. This will lead been considered widely in the recent literature. The physical
to a highly distributed network of devices communicating layer security of backscatter systems has been considered in
with human beings as well as other devices. The IoT devices detail in [14–16], and references therein. In [17], a frequency
are expected to be equipped with millions of sensors and hopping RFID system in the presence of an adversarial
communication capabilities, making them an intrinsic part reader is considered and a theoretical analysis of decoding
of the existing communication systems. It can be an ardu- error probability is provided. Despite a plethora of research
ous task to keep these energy-hungry sensors alive, since in the security and privacy of backscatter systems, to the
majority of these sensors are not easily accessible, due to best of our knowledge, covert communication in backscatter
their deployment in toxic and unsafe environments, or at communication has not been studied before. In this work,
places hard to reach. Backscatter communication [1, 2] offers we present a study on a backscatter system where the reader
unique advantages, eliminating the need of any active radio (i.e., the transmitter) tries to obtain information from a tag
frequency (RF) components, resulting in a prolonged life-span (i.e., the transponder) in such a way that the transmission
of the wireless devices and continued network functionality. from the tag remains covert from a warden, Willie, who is
These wireless devices can not only harvest energy from the looking to detect the tag’s transmission to the reader.1 In
transmitter’s signal, but can also modulate the same signal our considered system, the reader’s transmitted signal is not
to convey information. Although backscatter communication intended to be hidden, rather the reader looks to manipulate its
has been largely deployed in radio frequency identification signal such that Willie remains unaware of tag’s response state.
(RFID) systems for consumer-based applications e.g., supply-
chain management, RFID cards have also made their way into The main contributions of this work are as follows:
more sensitive arenas, e.g., access control, payment systems • To achieve covert backscatter communication, we pro-
and asset tracking. However, the application of backscatter pose to use a noise-like signal with variable power at the
systems in such sensitive scenarios is limited, owing to their reader when sending its transmitted signal. This trans-
broadcast nature and the ease of snooping information through mission scheme achieves a desired level of covertness by
eavesdropping. One option to alleviate this issue may be to use controlling the variation in reader’s transmit power.
stronger encryption protocols, but the size, cost and power • Under the proposed scheme, we derive a closed-form
constraints of most backscatter transponders do not warrant expression for the optimal detection threshold for a
such luxuries [3]. radiometer at Willie.
Physical layer security techniques offer compelling alter- • We analytically characterize the condition on the reader’s
natives to encryption, by exploiting the varying physical transmit power to achieve a target level of covertness and
characteristics of the wireless channel [4]. These techniques 1 We adopt the terms “reader” and “tag” as is commonly used in RFID
can also be used in conjunction with encryption to strengthen literature, although the analysis is applicable to a variety of systems employing
the existing layer of defense. However, situations exist where backscatter communication.

978-1-5386-8088-9/19/$31.00 ©2019 IEEE

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
numerically investigate the bit error rate (BER) perfor-
mance of the backscatter communication. The tradeoff Energy
between covertness against Willie’s detection and BER CW Transmitter Harvesting
performance at the reader is presented.
Receiver
II. S YSTEM M ODEL Z L1 Z L2

A backscatter communication system with a passive tag


READER TAG
is considered, as shown in Fig. 1, where the tag possesses
sensitive information that needs to be sent to the reader. Being Radiometer
passive, the tag has no power supply, thus it cannot initiate
communication on its own and fully relies on the reader’s WILLIE
signal for its operation. A monostatic reader is considered,
whose transmitted signal is not only used by the tag to Fig. 1. System model for covert communication in a backscatter system.
harvest energy, but is also modulated by the tag to send
information to the reader. The tag utilizes Binary Phase Shift
due to the tag’s backscatter or simply a variation in the power
Keying (BPSK) [1] to send information to the reader, thus the
of the reader’s transmitted signal. Note that we consider the
intentional reflection from the tag has two possible states in
uniform distribution as a first example; other distributions will
each symbol, depending on the data the tag has to transmit.
be investigated in future work.
We define a communication slot as a block of time over which
the transmission of a message from the tag to the reader is B. Tag’s Operation
complete. Each slot contains n symbol periods and we assume
that n is large enough, i.e., n → ∞. Under this setting, If the tag has information to send in a slot, it modulates
a warden Willie is also present as a silent observer, trying the incident signal by changing its load impedance. It reflects
to detect whether or not the tag transmits to the reader in back a certain portion of the power contained in the signal
a given slot. We use the subscripts r, t and w to represent and absorbs the rest of the power for utilization, including
the terms associated with reader, tag and Willie, respectively. energy consumption by the tag’s chip, modulation circuitry and
The distances from reader-tag, tag-Willie and reader-Willie are antenna. Assuming complex impedances, the wave reflection
represented by drt , dtw and drw , respectively. For simplicity, coefficient at the tag is given by [1]
we consider the time delay among the signals arriving at a ∗
ZL − ZA
node to be negligible. The channel coefficient between any Γ= ∗ , (1)
ZL + ZA
two users a and b is denoted by hab , and is dependent upon
the combined antenna gain and distance between the two where ZL and ZA represent the tag’s load and antenna
users. The additive Gaussian noise at the reader’s receiver and impedance, respectively, and (·)∗ denotes the conjugate opera-
Willie is denoted by nr ∼ N (0, σr2 ) and nw ∼ N (0, σw 2
), tion. To convey any information to the reader, the tag chooses
respectively. an appropriate load impedance,
∗ ∗
A. Proposed Reader Transmission Scheme ZA + Γ x ZA
ZL = , (2)
1 − Γx
In conventional backscatter communication, the reader
transmits a continuous wave (CW) with a constant amplitude. where, under BPSK, Γx can be Γ−1 or Γ+1 , depending upon
This approach does not lend itself well to covert communica- the information symbol x ∈ {−1, +1}. In this work, we
tion, since under the assumption of Willie knowing the reader’s assume that |Γ−1 | = |Γ+1 | = |Γ|.
constant transmit power, it is straightforward for Willie to raise
an alarm when an additional reflection from the tag is received C. Requirement for Covertness
at Willie alongside the reader’s signal. Based on the signals received in a slot, Willie has to decide
To achieve covertness, we propose the following trans- whether the tag transmitted any information by modulating
mission scheme: Instead of transmitting a simple unmodu- the reader’s signal. Here, Willie faces a binary hypothesis
lated CW, the reader transmits a noise-like signal following testing problem. The null hypothesis, H0 , says that the tag did
Gaussian distribution. This creates confusion at Willie and not send any information to the reader, while the alternative
makes it impossible for Willie to cancel such a signal. More hypothesis, H1 , says that the tag did modulate the reader’s
importantly, the transmit power of the noise-like signal is signal, hence sending information to the reader. It is assumed
randomized such that the reader’s transmit power in each slot, that Willie is unaware of the exact transmit power used by
PR , is a random variable, following a uniform distribution, i.e., the reader in each slot, although the transmission model and
PR ∼ U (Pmin , Pmax ). The introduction of randomness in the distribution of reader’s transmit power is known to Willie.
reader’s transmit power creates uncertainty in Willie’s received Also, Willie has full knowledge of the associated antenna
power, effectively creating an artificial fading [18], such that gains, reflection coefficients utilized by the tag under BPSK
Willie is unsure whether an increase in the received power is and his receiver’s noise variance.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
Willie has to make a decision at the end of each slot Owing to its low complexity and ease of implementation, we
regarding the tag’s actions in that slot. We define the prob- assume in this work that Willie uses a radiometer [11, 13]
ability of false alarm (or Type I error) as the probability that for the detection of any covert response from the tag. Under
Willie makes a decision in favour of H1 while H0 is true, this assumption, the average power received at Willie becomes
and denote it by PF A . Similarly, the probability of missed a crucial quantity. Based on Frii’s equation [22, 23], we have
K2
detection (or Type II error) is defined as the probability of h2ab = Gab
d2ab
, where Gab represents the combined transmitter-
Willie making a decision in favour of H0 while H1 is true, and receiver antenna gain between users a and b, and K = 4π λ
is
is denoted by PM D . Under the assumption of both hypotheses a constant dependent upon the carrier wavelength. Using (4),
being presented with an equal a priori probability [6, 10], we the average received power at Willie in a slot under H0 can
consider the reader achieving covert communication if, for be calculated as
a target  > 0, a communication scheme exists such that
n  2 
PF A + PM D ≥ 1 − , as n → ∞. Here  signifies the covert 1X 
Pw (H0 ) = lim yw (i, H0 )
requirement, since a sufficiently small  renders any detector n→∞ n
i=1
employed at Willie to be ineffective [6]. n  2  (6)
1 X
III. D ETECTION S CHEME AT W ILLIE = lim hrw c(i) + Sw (i) + nw (i)
n→∞ n
i=1
Due to the independent and identically distributed 2
= αPR + σw ,
(i.i.d.) nature of Willie’s observation vector yw =
[yw (1), yw (2), . . . , yw (n)], the optimal approach for Willie to where
minimize his detection error, according to Neyman-Pearson Grw K 2 Grt Gtw K 4
criterion, is to use the likelihood ratio test [19], α= + , (7)
2
drw d2rt d2tw
fyw |H1 (yw |H1 ) D1 Pn
Λ(yw ) = ≷ Υ, (3) and in deriving (6), we have used the fact that i=1 c2 (i) cor-
fyw |H0 (yw |H0 ) D0
responds to the sum of n independent and squared Gaussians,
where Υ = 1 due to the assumption of equal a priori each with variance PR , and this sum of squared Gaussians
probabilities of each hypothesis. Here, D1 and D0 corre- results in a Chi-squared random variable. In (7), the first
spond to a decision in favor of hypothesis H1 and H0 , term corresponds to the reader’s signal received directly by
and fyw |H1 (yw |H1 ) and fyw |H0 (yw |H0 ) are the likelihood Willie and the second term corresponds to the structural mode
functions of Willie’s observation vectors for the considered component of tag’s antenna scattering as received by Willie.
slot, under hypothesis H1 and H0 , respectively. Under H0 , Under H1 , the power received at Willie includes an addi-
the tag chooses a load impedance that is conjugate matched tional term, due to the information-bearing reflection from the
to the antenna impedance, resulting in a reflection bearing no tag. Following steps similar to the analysis of H0 , the average
information. The baseband signal received by Willie under H0 power received at Willie in a slot under H1 is given by
is given by
2
Pw (H1 ) = βPR + σw , (8)
yw (i, H0 ) = hrw c(i) + Sw (i) + nw (i), (4)
where i = 1, . . . , n represents the symbol index. Here, c(i) is where
the ith symbol transmitted by the reader, Sw (i) = hrt htw c(i) Grw K 2 Grt Gtw K 4 Grt Gtw K 4 |Γ|2
represents the structural mode scattering component [20, 21] β= + 2 2 + . (9)
2
drw drt dtw d2rt d2tw
of the tag’s reflection received at Willie2 , and nw (i) is Willie’s
receiver noise component. In the following, we derive the optimal threshold of Willie’s
Under H1 , the tag modulates the reader’s signal by in- radiometer that minimizes the detection error probability.
tentionally mismatching its load impedance to the antenna
Proposition 1. Under the assumption of a radiometer, the
impedance, causing a deliberate reflection of the received
optimal value of threshold for Willie’s detector is
signal back to the reader. In this case, the baseband signal
(
received at Willie is γ ∗ ∈ (αPmax + σw 2 2
, βPmin + σw ), if αPmax < βPmin
∗ 2
yw (i, H1 ) = hrw c(i) + Sw (i) + Aw (i) + nw (i), (5) γ = αPmax + σw , otherwise,
(10)
where Aw (i) represents the antenna mode scattering compo- where α and β are as defined in (7) and (9), respectively.
nent of the tag’s reflection received at Willie. The antenna
mode component depends on the load chosen by the tag via Proof. Willie compares the average received power to a
(1) and (2), and is given by Aw (i) = hrt htw |Γ|c(i)x(i). threshold, γ, and decides on either of the hypothesis, H0 or
H1 , being true. In order to minimize his detection error, Willie
2 Note that the tag gives a constant (structural mode) reflection even when
considers the following optimization problem
no information is sent. In the majority of backscatter literature, the term
originating from the structural mode is generally ignored in the analysis, as
it has no impact on the reader’s error probability [1]. min PF A + P M D . (11)
γ

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
2 2
Here, we have (1) αPmin + σw ≤ γ ≤ βPmin + σw : In this case,
PF A = P [D1 |H0 ] = P [Pw > γ|H0 ] αPmax − γ + σw2
 2
γ − σw

(12) PF A + PM D = , (17)

= P αPR + σw 2

> γ = P PR > . α(Pmax − Pmin )
α
and ∂(PF A∂γ
+PM D )
= α(Pmax−1
−Pmin ) < 0, which dictates that γ >
Since PR ∼ U (Pmin , Pmax ), 2
 2
βPmin + σw should be chosen.
γ−σw 2 2


 1,  
if α ≤ Pmin (2) βPmin + σw < γ ≤ αPmax + σw : In this case,
 γ−σw2
Pmax −
PF A = α γ−σ 2 (13) αPmax − γ + σw2 2
γ − σw − βPmin
 Pmax −Pmin , if Pmin < α w ≤ Pmax P F A + PM D = + , (18)
α(Pmax − Pmin ) β(Pmax − Pmin )
 2
 γ−σw
0, if > Pmax .

α
Similarly, and ∂(PF A∂γ+PM D )
= α(Pmax−1 1
−Pmin ) + β(Pmax −Pmin ) < 0, and
2
PM D = P [D0 |H1 ] = P [Pw < γ|H1 ] resultantly, γ ≥ αPmax + σw should be chosen.
2 2
 2
 (3) αPmax + σw < γ < βPmax + σw : In this case,
 2
 γ − σw
= P βPR + σw < γ = P PR < 2
β γ − σw − βPmin
2
PF A + P M D = , (19)
β(Pmax − Pmin )
 γ−σw

 0, if β ≤ Pmin (14)
 2 
γ−σw
and ∂(PF A∂γ
+PM D )

= β −Pmin
γ−σ 2 = β(Pmax1−Pmin ) > 0, which dictates that γ ≤
−P , if Pmin < β w ≤ Pmax 2

 P max min
2 αPmax + σw should be chosen.
γ−σw

1, if > Pmax .

β Since α and β are fixed quantities determined by the system
Willie has to choose his threshold, γ, such that PF A + PM D parameters and fully known by Willie, the results of Case-I
is minimized. Using (13) and (14), the crucial values on the γ and Case-II complete the proof. 
2 2 2 2
axis are αPmin +σw , αPmax +σw , βPmin +σw and βPmax +σw .
From (13) and (14), it can also be seen that choosing γ ≤ IV. R EADER ’ S S TRATEGY FOR C OVERTNESS
2 2
αPmin + σw or γ > βPmax + σw results in PF A + PM D = 1. Under the considered scheme, the reader looks to manip-
Thus the best choice of γ for Willie lies in the interval αPmin + ulate its transmit power for achieving covertness. We first
2 2
σw < γ ≤ βPmax + σw . From the system model, we know that establish a condition on the parameters of reader’s transmit
2
β > α and Pmax > Pmin , resulting in βPmax + σw > αPmin + power distribution such that there are detection errors at Willie.
2 2 2
σw , but the relation between αPmax + σw and βPmin + σw Next we consider the condition on the reader’s transmit power
can not be determined. To resolve this discrepancy in order to to achieve a target covertness level determined by .
determine the best choice of γ for Willie, we consider these
two options in further detail. Lemma 1. To cause any detection errors at Willie, the reader
has to choose the support of its transmit power i.e., Pmin and
Case - I : αPmax < βPmin Pmax , such that
We have three different intervals for the choice of γ here, Pmax β
≥ , (20)
which are considered in the following: Pmin α
2 2
(1) αPmin + σw ≤ γ ≤ αPmax + σw : In this case,
where α and β are as defined in (7) and (9), respectively.
2
αPmax − γ + σw
PF A + P M D = , (15) Proof. The proof builds on the proof of Proposition 1, where
α(Pmax − Pmin )
the condition under which Willie makes detection errors is
and ∂(PF A∂γ
+PM D )
= α(Pmax−1
−Pmin ) < 0, dictating that γ >
derived in Case-II. 
2
αPmax + σw should be chosen.
(2) βPmin + σw2
≤ γ ≤ βPmax + σw 2
: In this case, After having derived the condition under which Willie is
forced to make detection errors, we now present the condition
2
γ − σw − βPmin for achieving a target level of covertness.
PF A + PM D = , (16)
β(Pmax − Pmin )
Proposition 2. To achieve a covertness level of , the reader
and ∂(PF A∂γ
+PM D )
= β(Pmax1−Pmin ) > 0, and resultantly, γ < should choose the support of its transmit power i.e., Pmin and
2
βPmin + σw should be chosen. Pmax , such that
2 2
(3) αPmax + σw < γ < βPmin + σw : In this case, PF A +
Pmax β
PM D = 0, which means that a choice of γ in this interval will ≥ , (21)
have no detection errors at Willie. Pmin β − (β − α)

Case - II : αPmax ≥ βPmin where α and β are as defined in (7) and (9), respectively.
Again, we have three different intervals for the choice of γ, Proof. Building on Proposition 1 and Lemma 1, Willie’s
as considered in the following: optimal choice of threshold, γ, under the condition αPmax ≥

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
2
βPmin , is to choose γ = αPmax + σw . For this value of
30
threshold, PF A = 0, and we have Reflection Coefficient |Γ | = 0.3
Reflection Coefficient |Γ | = 0.5
αPmax − βPmin 25 Reflection Coefficient |Γ | = 0.8
PF A + PM D = P M D = . (22)
β(Pmax − Pmin )
20

Pmax / Pmin (dB)


To achieve a target covertness of , we require
αPmax − βPmin 15
PF A + PM D = ≥ 1 − , (23)
β(Pmax − Pmin )
10
and a simple rearrangement gives the desired result. 
Remark 1. We note that condition (21) in Proposition 2 holds 5

as long as  > 1 − α β , thus the achievable value of  depends


0
on the ratio αβ . This condition manifests in such a way that 10-4 10-3 10-2 10-1
for given system parameters, covertness beyond a certain  in Covertness Parameter (ǫ )
not achievable, regardless of the choice of PPmax
min
.
Fig. 2. Ratio of Pmax and Pmin required for a target covertness.
V. R EADER ’ S BER A NALYSIS
The reader can easily tell whether the tag has transmitted
BPSK-modulated signal by looking at its received power VI. N UMERICAL R ESULTS AND D ISCUSSION
because it completely knows its transmit power in any slot. In this section, we present numerical results to study the
The reader’s receiver looks to decide about the tag’s message performance of our proposed covert communication scheme.
symbol x being +1 or −1 from the received signal. The A UHF system with a carrier frequency of 915 MHz is con-
baseband signal received at the reader after being reflected sidered. The reader-tag, tag-Willie and reader-Willie distances
from the tag is are assumed to be 2 m, and all the users are assumed to have
isotropic antennas. The noise variance at Willie and reader’s
yr (i, H1 ) = Ar (i) + Sr (i) + nr (i), (24)
receiver is −100dBm [15].
where Sr (i) = hrt htr c(i) and Ar (i) = hrt htr |Γ|c(i)x(i) rep- Fig. 2 shows the ratio of the support parameters of the
resent the structural and antenna mode reflections from the tag reader’s transmit power, PPmax
min
, plotted in dB against the covert-
at the reader, respectively. Having complete knowledge of c(i), ness requirement, , for different values of the reflection coef-
hrt and htr , the reader can perfectly cancel out the structural ficient, |Γ|. For a given value of the reflection coefficient, the
mode component from the received signal. Resultantly required power ratio increases as the covertness requirement
increases. Thus for a given |Γ|, the reader needs to have
y r (i, H1 ) = Ar (i) + nr (i)
(25) higher variations in its transmit power to achieve a better
= hrt htr |Γ|c(i)x(i) + nr (i), covert performance. However, as discussed in Remark 1, for
as the received signal. Rewriting (25), we get a given combination of the reflection coefficient and system
parameters (antenna gains, distances, carrier frequency), the
nr (i)
y r (i, H1 ) = x(i) + , (26) achievable covertness does not increase beyond a certain value.
hrt htr |Γ|c(i) Reducing the reflection coefficient |Γ| helps to achieve a lower
where we recall that nr ∼ N (0, σr2 ) and c ∼ N (0, PR ). , hence better covertness. However, lowering |Γ| reduces
The second term in (26) results in a Cauchy distribution with the received SNR at the receiver, hence degrading the BER
a location parameter of l0 = 0 [24]. Thus the maximum performance of backscatter communication. We note here that
likelihood decision rule at the reader’s receiver is the achievable covert performance depends on Pmin and Pmax
( only through the ratio PPmax , not their individual values.
x̂(i) = +1, if y r (i, H1 ) > 0 min
Fig. 3 plots the BER of a conventional non-covert commu-
(27)
x̂(i) = −1, else. nication, where the reader transmits a constant-amplitude CW
Using the probability density function (pdf) of a Cauchy signal, and the BER of the proposed covert communication
random variable, the BER for the reader, pbr , can be obtained with variable power at the reader. For the covert communi-
as cation, we consider two covert requirements of  = 0.1 and
Z ∞
    = 1.1 × 10−4 . The tag’s reflection coefficient is |Γ| = 0.8.
1 1 1 Note that  = 0.1 represents a poor covert performance while
pbr =  − arctan  q  fPR (z)dz,
−∞ 2 π 2 d4
σr rt  = 1.1 × 10−4 represents almost the best possible covert
|Γ|2 G 4
rt Gtr K z
(28) performance that can be achieved (see the curve for |Γ| = 0.8
where the argument of arctan(·) is the square-root reciprocal in Fig. 2). The BER is plotted against the received SNR at
of the received signal-to-noise ratio (SNR) at the reader, and the reader. For the covert communication with variable power,
fPR (·) denotes the probability density function of PR ∼ the distribution of transmit power (i.e., the values of Pmax
U (Pmin , Pmax ). and Pmin ) is set such that the average received SNR is the

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.
[2] J. Kimionis, A. Bletsas, and J. N. Sahalos, “Increased range bistatic
scatter radio,” IEEE Trans. Commun., vol. 62, no. 3, pp. 1091–1104,
Non-Covert &RPPXQLFDWLRQ
Mar. 2014.
-1
Covert&RPPXQLFDWLRQ ǫ = 0.1 [3] H. Hassanieh, J. Wang, D. Katabi, and T. Kohno, “Securing RFIDs by
10 Covert &RPPXQLFDWLRQ ǫ = 1.1x10-4 randomizing the modulation and channel,” in USENIX NSDI Symposium,
May. 2015, pp. 235–249.
[4] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless
Communications. CRC Press, 2013.
BER

[5] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information


10-2 in noise: Fundamental limits of covert wireless communication,” IEEE
Commun. Mag, vol. 53, no. 12, pp. 26–31, Dec. 2015.
[6] B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communi-
cation with low probability of detection on AWGN channels,” IEEE J.
Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013.
[7] K. Shahzad, X. Zhou, and S. Yan, “Covert communication in fading
10-3 channels under channel uncertainty,” in IEEE VTC Spring, Jun. 2017,
pp. 1–5.
0 10 20 30 40 50
SNR (dB)
[8] B. He, S. Yan, X. Zhou, and V. K. N. Lau, “On covert communication
with noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, pp. 941–
944, Apr. 2017.
Fig. 3. BER Comparison of non-covert and covert communication schemes. [9] D. Goeckel, B. A. Bash, S. Guha, and D. Towsley, “Covert communi-
The tag’s reflection coefficient |Γ| = 0.8. cations when the warden does not know the background noise power,”
IEEE Commun. Lett., vol. 20, no. 2, pp. 236–239, Feb. 2016.
[10] S. Lee, R. Baxley, M. Weitnauer, and B. Walkenhorst, “Achieving
undetectable communication,” IEEE J. Sel. Topics Signal Process.,
same as the received SNR in the non-covert communication. vol. 9, no. 7, pp. 1195–1205, Oct. 2015.
Firstly, we observe a huge BER difference between the non- [11] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert
covert and covert communication schemes. This is due to communication in the presence of an uninformed jammer,” IEEE Trans.
Wireless Commun., vol. 16, no. 19, pp. 6193–6206, Sep. 2017.
the difference between constant-amplitude signaling and the [12] R. Soltani, D. Goeckel, D. Towsley, B. A. Bash, and S. Guha, “Covert
proposed signaling scheme. As explained in Sec II-A, the wireless communication with artificial noise generation,” IEEE Trans.
variation in reader’s transmit power is necessary to create Wireless Commun., vol. 17, no. 11, pp. 7252–7267, Nov. 2018.
[13] K. Shahzad, X. Zhou, S. Yan, J. Hu, F. Shu, and J. Li, “Achieving covert
confusion at Willie, regardless of tag’s transmission state, as an wireless communications using a full-duplex receiver,” IEEE Trans.
essential design to achieve covertness in the proposed scheme. Wireless Commun., vol. 17, no. 12, pp. 8517–8530, Dec. 2018.
Unfortunately, such a design pays a significant price in terms [14] Q. Yang, H. M. Wang, Y. Zhang, and Z. Han, “Physical layer security in
MIMO backscatter wireless systems,” IEEE Trans. Wireless Commun.,
of BER. Next, focusing on the covert communication, we see vol. 15, no. 11, pp. 7547–7560, Nov. 2016.
that the BER gap between a poorly covert system (i.e.,  = 0.1) [15] W. Saad, X. Zhou, Z. Han, and H. V. Poor, “On the physical layer se-
and a strongly covert system (i.e.,  = 1.1 × 10−4 ) is small, curity of backscatter wireless systems,” IEEE Trans. Wireless Commun.,
vol. 13, no. 6, pp. 3442–3451, Jun. 2014.
roughly 1.5 − 2.5 dB. This tells us that the price to pay for [16] X. Wang, Z. Su, and G. Wang, “Relay selection for secure backscatter
improving the covert performance from a poorly covert system wireless communications,” Electronics Letters, vol. 51, no. 12, pp. 951–
is reasonably small. 952, Jun. 2015.
[17] F. Huo, P. Mitran, and G. Gong, “Analysis and validation of active
eavesdropping attacks in passive FHSS RFID systems,” IEEE Trans.
VII. C ONCLUSION Inf. Forensics Security, vol. 11, no. 7, pp. 1528–1541, Mar. 2016.
[18] H. M. Wang, T. Zheng, and X. G. Xia, “Secure MISO wiretap channels
In this work, we showed how a backscatter communication with multiantenna passive eavesdropper: Artificial noise vs. artificial fast
system can achieve covertness in the presence of a warden fading,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 94–106, Jun.
2014.
Willie. The proposed scheme requires the reader to use a noise- [19] B. C. Levy, Principles of Signal Detection and Parameter Estimation.
like signal with variable transmit power drawn from a uniform New York: Springer, 2010.
distribution. By controlling the maximum and minimum trans- [20] P. V. Nikitin and K. V. S. Rao, “Theory and measurement of backscat-
tering from RFID tags,” IEEE Antennas Propag. Mag., vol. 48, no. 6,
mit powers of the reader, the system is able to achieve a target pp. 212–218, Dec. 2006.
level of covertness. Comparing with a conventional backscatter [21] F. Fuschini, C. Piersanti, F. Paolazzi, and G. Falciasecca, “Analytical
system with no covertness, the BER degradation from no approach to the backscattering from UHF RFID transponder,” IEEE
Antennas Wireless Propag. Lett., vol. 7, pp. 33–35, Feb. 2008.
covertness to some (poor) covertness is huge. Nevertheless, the [22] D. M. Dobkin, The RF in RFID: Passive UHF RFID in Practice.
additional BER degradation for improving covert performance Newnes, 2007.
is much smaller. This paper presented the first study on [23] J. D. Griffin and G. D. Durgin, “Complete link budgets for backscatter-
radio and RFID systems,” IEEE Antennas Propag. Mag., vol. 51, no. 2,
covert communication in backscatter systems. It is expected pp. 11–25, Apr. 2009.
that future work will devise improved transmission schemes [24] K. Krishnamoorthy, Handbook of Statistical Distributions with Applica-
resulting in better tradeoff performance between BER and tions. CRC Press, 2016.
covertness.

R EFERENCES
[1] C. Boyer and S. Roy, “Backscatter communication and RFID: Coding,
energy, and MIMO analysis,” IEEE Trans. Commun., vol. 62, no. 3, pp.
770–785, Mar. 2014.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY DELHI. Downloaded on June 02,2020 at 10:59:21 UTC from IEEE Xplore. Restrictions apply.

You might also like