Abstract
The last decade has witnessed an increase in adopting wireless systems. A wireless system enables two devices to utilize radio frequencies to communicate wirelessly. Moreover, in wireless systems, authentication can be performed wirelessly through transferring authentication information over-the-air. Alternatively, antennas in most devices enabled to communicate wirelessly today can control the power level of transmission to improve the wireless system’s performance. In the present study, we examine the feasibility of varying the power level of transmission of a device’s antenna for authentication purposes. This can be used in applications, such as obstructing relay attacks on wireless authentication systems. Furthermore, a prototype is built and tested utilizing Wi-Fi enabled systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Brands, S., Chaum, D.: Distance-bounding protocol. In: Advances in Cryptology-EUROCRYPT 93. LNCS, vol. 765, January 2010
Cho, W., Seo, M., Hoon, M., Lee, D.: Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system. J. Adv. Transp. 2018 (2018). Article ID 1935974
Drimer, S., Murdoch, S.J.: Keep your enemies close: distance bounding against smartcard relay attacks. In: Proceedings of the USENIX Security (2007)
Hamida, S., Thevenon, P., Pierrot, J., Savry, O., Castelluccia, C.: Detecting relay attacks in RFID systems using physical layer characteristics. In: Wireless and Mobile Networking Conference (WMNC) (2013)
Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: IEEE/Create Net Secure Communication (2005)
Markus, L.: Evaluation and modeling of power control information in a 3G cellular mobile network. Techn. Univ., Dipl.-Arb., Wiens (2009)
Oh, S., Doo, T., Ko, T., Kwak, J., Hong, M.: Countermeasure of NFC relay attack with jamming. In: 12th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT) (2015)
Wei Tan, C.: Optimal power control in Rayleigh-fading heterogeneous networks. In: 2011 Proceedings IEEE INFOCOM (2011)
Zhang, J., Wang, Z., Yang, Z., Zhang, Q.: Proximity based IoT device authentication. In: Proceedings IEEE Conference Computer Communication (INFOCOM), pp. 1–9, May 2017
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Alamleh, H., Alqahtani, A.A.S., Alamleh, D. (2020). Implementing Variable Power Transmission Patterns for Authentication Purposes. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing, vol 1230. Springer, Cham. https://doi.org/10.1007/978-3-030-52243-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-52243-8_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52242-1
Online ISBN: 978-3-030-52243-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)