Exploiting randomized continuous wave in secure backscatter communications

Q Yang, HM Wang, Q Yin… - IEEE Internet of Things …, 2020‏ - ieeexplore.ieee.org
To enable the low-cost ubiquitous Internet of Things, passive backscatter communication is
envisioned as one of the most prominent and promising techniques; however, the …

Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context

Q Hu, J Zhang, A Mitrokotsa, G Hancke - computers & security, 2018‏ - Elsevier
Edge computing is the concept of moving computation back to the endpoints of a network, as
an alternative to, or in combination with, centralized, cloud-based architectures. It is …

Analysis and validation of active eavesdrop** attacks in passive FHSS RFID systems

F Huo, P Mitran, G Gong - IEEE Transactions on Information …, 2016‏ - ieeexplore.ieee.org
In this paper, we present a generalized framework for active eavesdrop** in a frequency
hop** spread spectrum passive radio frequency identification system. In our model, there …

Preventing overshadowing attacks in self-jamming audio channels

Q Hu, Y Liu, A Yang, GP Hancke - IEEE Transactions on …, 2018‏ - ieeexplore.ieee.org
Recently there has been a growing interest in short-range communication using audio
channels for device pairing and as a self-jamming communication medium. Given that such …

Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization

Q Hu, LM Dinca, A Yang, G Hancke - Computer Networks, 2016‏ - Elsevier
Abstract Radio Frequency Identification (RFID) is a core component of the Internet-of-Things.
In particular cases, the communication between the tag and the reader needs to be …

Device synchronisation: a practical limitation on reader assisted jamming methods for RFID confidentiality

Q Hu, LM Dinca, G Hancke - Information Security Theory and Practice: 9th …, 2015‏ - Springer
Radio frequency identification (RFID) is a core component of the Internet-of-Things. In
certain cases the communication between the tag and the reader needs to be confidential …

Self-jamming audio channels: Investigating the feasibility of perceiving overshadowing attacks

Q Hu, G Hancke - Radio Frequency Identification and IoT Security: 12th …, 2017‏ - Springer
Recently there has been interesting in short-range communication using audio channels for
device pairing and as a self-jamming communication medium. Given that such channels are …

Correlation-based search against friendly jamming data exchange schemes

J Zhang, Q Hu, GP Hancke - 2019 IEEE Conference on …, 2019‏ - ieeexplore.ieee.org
Friendly jamming is a physical-layer approach to protecting the confidentiality of short range
wireless communication. In recent years, several practical friendly jamming scenes have …

[PDF][PDF] A physical layer DSB Enc scheme for RFID systems

MK Kaleem, G Gong‏ - academia.edu
Radio Frequency IDentification (RFID) is a contactless, automatic identification wireless
technology primarily used for identifying and tracking of objects, goods and humans. RFID is …

[PDF][PDF] Optimizable Design Schemes in Communication Systems for Providing Anonymity and Confidentiality

C Yang - 2015‏ - digital.lib.washington.edu
In applications requiring anonymity such as electronic mail, evading website censorship,
and file sharing, the identities of source-destination pairs for each data flow should be …