{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T01:10:26Z","timestamp":1765847426611,"version":"3.48.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030643294"},{"type":"electronic","value":"9783030643300"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64330-0_14","type":"book-chapter","created":{"date-parts":[[2020,12,16]],"date-time":"2020-12-16T02:02:44Z","timestamp":1608084164000},"page":"224-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Extended Abstract: Towards Physical-Layer Authentication for Backscatter Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2586-8573","authenticated-orcid":false,"given":"Thiemo","family":"Voigt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1903-4679","authenticated-orcid":false,"given":"Carlos","family":"P\u00e9rez-Penichet","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1527-734X","authenticated-orcid":false,"given":"Christian","family":"Rohner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"key":"14_CR1","unstructured":"Danev, B., Heydt-Benjamin, T.S., Capkun, S.: Physical-layer identification of RFID devices. In: USENIX Security Symposium, pp. 199\u2013214 (2009)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Ensworth, J.F., Reynolds, M.S.: Every smart phone is a backscatter reader: modulated backscatter compatibility with bluetooth 4.0 low energy (BLE) devices. In: IEEE International Conference on RFID, pp. 78\u201385. IEEE (2015)","DOI":"10.1109\/RFID.2015.7113076"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Hazra, S., Duquennoy, S., P., Wang, S., Voigt, T., Lu, C., Cederholm, D.: Handling inherent delays in virtual IoT gateways. In: International Conference on Distributed Computing in Sensor Systems (2019)","DOI":"10.1109\/DCOSS.2019.00031"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Hessar, M., Najafi, A., Iyer, V., Gollakota, S.: TinySDR, a software-defined radio platform for internet of things. In: The 25th Annual International Conference on Mobile Computing and Networking, pp. 1\u20133 (2019)","DOI":"10.1145\/3300061.3343373"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"101658","DOI":"10.1016\/j.cose.2019.101658","volume":"89","author":"J H\u00f6glund","year":"2020","unstructured":"H\u00f6glund, J., Lindemer, S., Furuhed, M., Raza, S.: Pki4iot: towards public key infrastructure for the internet of things. Comput. Secur. 89, 101658 (2020)","journal-title":"Comput. Secur."},{"issue":"4","key":"14_CR6","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/LCOMM.2015.2398443","volume":"19","author":"M Jacobsson","year":"2015","unstructured":"Jacobsson, M., Rohner, C.: Estimating packet delivery ratio for arbitrary packet sizes over wireless links. IEEE Commun. Lett. 19(4), 609\u2013612 (2015)","journal-title":"IEEE Commun. Lett."},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"187","DOI":"10.5626\/JCSE.2013.7.3.187","volume":"7","author":"T Kang","year":"2013","unstructured":"Kang, T., Li, X., Chansu, Yu., Kim, J.: A survey of security mechanisms with direct sequence spread spectrum signals. J. Computi. Sci. Eng. 7(3), 187\u2013197 (2013)","journal-title":"J. Computi. Sci. Eng."},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Kellogg, B., Talla, V., Gollakota, S., Smith, J.R.: Passive wi-fi: Bringing low power to wi-fi transmissions. In: 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2016)","DOI":"10.1145\/3036699.3036711"},{"key":"14_CR9","unstructured":"Kho, T.: Steganography in the 802.15.4 physical layer. UC Berkeley (2007)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology\u2014CRYPTO 1994","author":"H Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129\u2013139. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_15"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Li, X., Yu, C., Hizlan, M., Kim, W.-T., Park, S.: Physical layer watermarking of direct sequence spread spectrum signals. In: IEEE Military Communications Conference. IEEE (2013)","DOI":"10.1109\/MILCOM.2013.88"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Mehta, A.M., Lanzisera, S., Pister, K.S.J.: Steganography in 802.15.4 wireless communication. In: 2008 2nd International Symposium on Advanced Networks and Telecommunication Systems, pp. 1\u20133. IEEE (2008)","DOI":"10.1109\/ANTS.2008.4937785"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Nain, A.K., Rajalakshmi, P.: A reliable covert channel over IEEE 802.15.4 using steganography. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 711\u2013716. IEEE (2016)","DOI":"10.1109\/WF-IoT.2016.7845486"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Peng, Y., et al.: PLoRa: a passive long-range data network from ambient LoRa transmissions. In: Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, pp. 147\u2013160 (2018)","DOI":"10.1145\/3230543.3230567"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Penichet, C., Hermans, F., Varshney, A., Voigt, T.: Augmenting IoT networks with backscatter-enabled passive sensor tags. In: Proceedings of the 3rd Workshop on Hot Topics in Wireless, pp. 23\u201327 (2016)","DOI":"10.1145\/2980115.2980132"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Penichet, C., Piumwardane, D., Rohner, C., Voigt, T.: TagAlong: efficient integration of battery-free sensor tags in standard wireless networks. In: 2020 19th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 169\u2013180. IEEE (2020)","DOI":"10.1109\/IPSN48710.2020.00022"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Sankhe, K., Belgiovine, M., Zhou, F., Riyaz, S., Ioannidis, S., Chowdhury, K.: Oracle: optimized radio classification through convolutional neural networks. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 370\u2013378. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Talla, V., Hessar, M., Kellogg, B., Najafi, A., Smith, J.R., Gollakota, S.: LoRa backscatter: enabling the vision of ubiquitous connectivity. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 1(3), 1\u201324 (2017)","DOI":"10.1145\/3130970"},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/CJECE.2007.364330","volume":"32","author":"O Ureten","year":"2007","unstructured":"Ureten, O., Serinken, N.: Wireless security through RF fingerprinting. Can. J. Electr. Comput. Eng. 32(1), 27\u201333 (2007)","journal-title":"Can. J. Electr. Comput. Eng."},{"issue":"4","key":"14_CR20","doi-asserted-by":"publisher","first-page":"2889","DOI":"10.1109\/COMST.2018.2841964","volume":"20","author":"N Van Huynh","year":"2018","unstructured":"Van Huynh, N., Hoang, D.T., Lu, X., Niyato, D., Wang, P., Kim, D.I.: Ambient backscatter communications: a contemporary survey. IEEE Commun. Surv. Tutor. 20(4), 2889\u20132922 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"14_CR21","first-page":"94","volume":"18","author":"X Qiang","year":"2015","unstructured":"Qiang, X., Zheng, R., Saad, W., Han, Z.: Device fingerprinting in wireless networks: challenges and opportunities. IEEE Commun. Surv. Tutor. 18(1), 94\u2013104 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Zanetti, D., Danev, B., Capkun, S.: Physical-layer identification of UHF RFID tags. In: Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking, pp. 353\u2013364 (2010)","DOI":"10.1145\/1859995.1860035"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, P., Bharadia, D., Joshi, K., Katti, S.: Hitchhike: practical backscatter using commodity wifi. In: Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, pp. 259\u2013271 (2016)","DOI":"10.1145\/2994551.2994565"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Zielinska, E., Szczypiorski, K.: Direct sequence spread spectrum steganographic scheme for IEEE 802.15.4. In: 2011 Third International Conference on Multimedia Information Networking and Security, pp. 586\u2013590. IEEE (2011)","DOI":"10.1109\/MINES.2011.23"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64330-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T01:02:15Z","timestamp":1765846935000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64330-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030643294","9783030643300"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64330-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Attacks and Defenses for Internet-of-Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.surrey.ac.uk\/esorics-2020\/workshops","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}