{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T16:09:30Z","timestamp":1768234170140,"version":"3.49.0"},"reference-count":0,"publisher":"European Alliance for Innovation n.o.","issue":"6","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICST Transactions on Scalable Information Systems"],"abstract":"<jats:p>This paper studies the security performance of a multi-tag backscatter communication system, where a reader\u00a0exchanges its information with multiple distributed tags in the presence of an eavesdropper. The system\u00a0security performance is assessed using the secrecy outage probability (SOP), which quantifies the likelihood\u00a0that the system secrecy capacity drops below a specified threshold. The paper provides a mathematical\u00a0analysis on the communication links, considering Rayleigh fading, and investigates the effect of system\u00a0monostatic and bistatic RFID configurations on the overall security. An optimal tag selection scheme is\u00a0proposed to maximize the secrecy capacity by choosing the tag with the best link between the reader and\u00a0the eavesdropper. Moreover, an analytical expression is derived for the system SOP, which incorporates the\u00a0joint probability distributions of channel gains and the asymptotic SOP is provided as the signal-to-noise\u00a0ratio increases. Simulation results are presented to verify the theoretical analysis, where the simulation results\u00a0closely match the analytical predictions, confirming the accuracy of the proposed SOP analysis. Moreover, the\u00a0asymptotic analysis offers an upper bound on the outage probability, consistent with theoretical analysis.<\/jats:p>","DOI":"10.4108\/eetsis.9691","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T12:43:22Z","timestamp":1768221802000},"source":"Crossref","is-referenced-by-count":0,"title":["Ensuring Security in Multi-Tag Backscatter Communication Systems"],"prefix":"10.4108","volume":"12","author":[{"given":"Zilin","family":"You","sequence":"first","affiliation":[{"id":[{"id":"https:\/\/ror.org\/03hkh9419","id-type":"ROR","asserted-by":"publisher"}],"name":"China Southern Power Grid (China)"},{"name":"Guangdong Provincial Key Laboratory of Power System Network Security"}]},{"given":"Zhihong","family":"Liang","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/03hkh9419","id-type":"ROR","asserted-by":"publisher"}],"name":"China Southern Power Grid (China)"},{"name":"Guangdong Provincial Key Laboratory of Power System Network Security"}]},{"given":"Siliang","family":"Suo","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/03hkh9419","id-type":"ROR","asserted-by":"publisher"}],"name":"China Southern Power Grid (China)"},{"name":"Guangdong Provincial Key Laboratory of Power System Network Security"}]},{"given":"Lifeng","family":"Mai","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/03hkh9419","id-type":"ROR","asserted-by":"publisher"}],"name":"China Southern Power Grid (China)"},{"name":"Guangdong Provincial Key Laboratory of Power System Network Security"}]},{"given":"Qiaoling","family":"Lin","sequence":"additional","affiliation":[{"id":[{"id":"https:\/\/ror.org\/03hkh9419","id-type":"ROR","asserted-by":"publisher"}],"name":"China Southern Power Grid (China)"},{"name":"Guangdong Provincial Key Laboratory of Power System Network Security"}]}],"member":"2587","published-online":{"date-parts":[[2026,1,12]]},"container-title":["ICST Transactions on Scalable Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/publications.eai.eu\/index.php\/sis\/article\/download\/9691\/3838","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/publications.eai.eu\/index.php\/sis\/article\/download\/9691\/3838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T12:43:22Z","timestamp":1768221802000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.eai.eu\/index.php\/sis\/article\/view\/9691"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":0,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,12,2]]}},"URL":"https:\/\/doi.org\/10.4108\/eetsis.9691","relation":{},"ISSN":["2032-9407"],"issn-type":[{"value":"2032-9407","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]}}}