Skip to main content

Implementing Variable Power Transmission Patterns for Authentication Purposes

  • Conference paper
  • First Online:
Intelligent Computing (SAI 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1230))

Included in the following conference series:

  • 625 Accesses

Abstract

The last decade has witnessed an increase in adopting wireless systems. A wireless system enables two devices to utilize radio frequencies to communicate wirelessly. Moreover, in wireless systems, authentication can be performed wirelessly through transferring authentication information over-the-air. Alternatively, antennas in most devices enabled to communicate wirelessly today can control the power level of transmission to improve the wireless system’s performance. In the present study, we examine the feasibility of varying the power level of transmission of a device’s antenna for authentication purposes. This can be used in applications, such as obstructing relay attacks on wireless authentication systems. Furthermore, a prototype is built and tested utilizing Wi-Fi enabled systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Brands, S., Chaum, D.: Distance-bounding protocol. In: Advances in Cryptology-EUROCRYPT 93. LNCS, vol. 765, January 2010

    Google Scholar 

  2. Cho, W., Seo, M., Hoon, M., Lee, D.: Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system. J. Adv. Transp. 2018 (2018). Article ID 1935974

    Google Scholar 

  3. Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of the USENIX Security (2007)

    Google Scholar 

  4. Hamida, S., Thevenon, P., Pierrot, J., Savry, O., Castelluccia, C.: Detecting relay attacks in RFID systems using physical layer characteristics. In: Wireless and Mobile Networking Conference (WMNC) (2013)

    Google Scholar 

  5. Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: IEEE/Create Net Secure Communication (2005)

    Google Scholar 

  6. Markus, L.: Evaluation and modeling of power control information in a 3G cellular mobile network. Techn. Univ., Dipl.-Arb., Wiens (2009)

    Google Scholar 

  7. Oh, S., Doo, T., Ko, T., Kwak, J., Hong, M.: Countermeasure of NFC relay attack with jamming. In: 12th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT) (2015)

    Google Scholar 

  8. Wei Tan, C.: Optimal power control in Rayleigh-fading heterogeneous networks. In: 2011 Proceedings IEEE INFOCOM (2011)

    Google Scholar 

  9. Zhang, J., Wang, Z., Yang, Z., Zhang, Q.: Proximity based IoT device authentication. In: Proceedings IEEE Conference Computer Communication (INFOCOM), pp. 1–9, May 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hosam Alamleh , Ali Abdullah S. Alqahtani or Dalia Alamleh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alamleh, H., Alqahtani, A.A.S., Alamleh, D. (2020). Implementing Variable Power Transmission Patterns for Authentication Purposes. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_16

Download citation

Publish with us

Policies and ethics