Visible to the public Two Methods for Authentication Using Variable Transmission Power Patterns

TitleTwo Methods for Authentication Using Variable Transmission Power Patterns
Publication TypeConference Paper
Year of Publication2020
AuthorsAlamleh, Hosam, AlQahtani, Ali Abdullah S.
Conference Name2020 10th Annual Computing and Communication Workshop and Conference (CCWC)
KeywordsAccess Control, authentication, Communication system security, Hardware, Human Behavior, Mathematical model, pattern locks, power control, pubcrawl, Relays, Resiliency, Scalability, source authentication, variable power, wireless authentication, Wireless communication
AbstractIn the last decade, the adoption of wireless systems has increased. These systems allow multiple devices to send data wirelessly using radio waves. Moreover, in some applications, authentication is done wirelessly by exchanging authentication data over the air as in wireless locks and keyless entry systems. On the other hand, most of the wireless devices today can control the radio frequency transmission power to optimize the system's performance and minimize interference. In this paper, we explore the possibility of modulating the radio frequency transmission power in wireless systems for authentication purposes and using it for source authentication. Furthermore, we propose two system models that perform authentication using variable power transmission patterns. Then, we discuss possible applications. Finally, we implement and test a prototype system using IEEE 802.11 (Wi-Fi) devices.
DOI10.1109/CCWC47524.2020.9031210
Citation Keyalamleh_two_2020