Countering Eavesdroppers with Meta-learning-based Cooperative Ambient Backscatter Communications
This article introduces a novel lightweight framework using ambient backscattering communications to counter eavesdroppers. In particular, our framework divides an original message into two parts: (i) the active-transmit message transmitted by the transmitter using conventional RF signals and (ii) t...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This article introduces a novel lightweight framework using ambient
backscattering communications to counter eavesdroppers. In particular, our
framework divides an original message into two parts: (i) the active-transmit
message transmitted by the transmitter using conventional RF signals and (ii)
the backscatter message transmitted by an ambient backscatter tag that
backscatters upon the active signals emitted by the transmitter. Notably, the
backscatter tag does not generate its own signal, making it difficult for an
eavesdropper to detect the backscattered signals unless they have prior
knowledge of the system. Here, we assume that without decoding/knowing the
backscatter message, the eavesdropper is unable to decode the original message.
Even in scenarios where the eavesdropper can capture both messages,
reconstructing the original message is a complex task without understanding the
intricacies of the message-splitting mechanism. A challenge in our proposed
framework is to effectively decode the backscattered signals at the receiver,
often accomplished using the maximum likelihood (MLK) approach. However, such a
method may require a complex mathematical model together with perfect channel
state information (CSI). To address this issue, we develop a novel deep
meta-learning-based signal detector that can not only effectively decode the
weak backscattered signals without requiring perfect CSI but also quickly adapt
to a new wireless environment with very little knowledge. Simulation results
show that our proposed learning approach, without requiring perfect CSI and
complex mathematical model, can achieve a bit error ratio close to that of the
MLK-based approach. They also clearly show the efficiency of the proposed
approach in dealing with eavesdropping attacks and the lack of training data
for deep learning models in practical scenarios. |
---|---|
DOI: | 10.48550/arxiv.2308.02242 |