期刊文献+

频移反向散射系统的窃听与欺骗攻击方法 被引量:2

Method of Eavesdropping and Spoofing Attacks on Frequency Shift Backscatter Systems
下载PDF
导出
摘要 频移反向散射系统(Frequency Shift Backscatter Systems)是一种新型低功耗通信系统,即将广泛应用于物联网应用。本文提出了一种基于探针信号对频移反向散射系统进行窃听和欺骗攻击的方法,展示现有系统安全漏洞。首先,发射探针信号并采集标签反射信号进行比对,获取标签对探针的频移量和调制方式,对标签上数据解调,完成窃听。其次,使用软件定义无线电(Software Defined Radio,SDR)采集时域信号,进行下变频处理后与自身做相关性计算,通过阈值筛选出激励信号中心频率。最后,构建错误数据的标签反射信号,同步发送激励信号,欺骗接收机收到合法数据。实验验证该方法在频移反向散射系统中的可行性,实验结果表明,该方法可以解码标签数据并成功向接收机发送虚假数据。 Frequency shift backscatter system is a new low power communication system that will be widely used in Io T applications.In this paper,a method of eavesdropping and spoofing attacks on frequency shift backscatter systems based on a probe signal was proposed to demonstrate the security vulnerability of existing systems.Firstly,the probe signal was transmitted and the reflected signal from the tag was collected for comparison to obtain the frequency shift and modulation method of the tag,and the data on the tag was demodulated to eavesdrop.Secondly,the time domain signal was captured by software defined radio(SDR),downconverted and correlated with itself,and the center frequency of the excitation signal was filtered by a threshold.Finally,a tagreflected signal of the wrong data was constructed and the excitation signal was sent simultaneously to trick the receiver into receiving the legitimate data.Experiments were conducted to verify the feasibility of the method in frequency shift backscatter systems.The experimental results showed that the method can decode the tag data and sent fake data to the receiver successfully.
作者 王天祎 朱丰源 田晓华 WANG Tianyi;ZHU Fengyuan;TIAN Xiaohua(Department of Electronic Engineering,School of Electronic Information and Electrical Engineering,Shanghai Jiao Tong University,Shanghai 200240,China)
出处 《信号处理》 CSCD 北大核心 2022年第4期690-699,共10页 Journal of Signal Processing
基金 国家重点研发计划项目(2020YFB1708700) 国家自然科学基金项目(61922055,61872233)。
关键词 频移反向散射系统 探针信号 窃听攻击 欺骗攻击 frequency shift backscatter systems probe signal eavesdropping attack spoofing attack
  • 相关文献

参考文献1

二级参考文献7

共引文献1

同被引文献23

引证文献2

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部