Recognition: unknown
A Protocol-Agnostic Backscatter-Based Security Layer for Ultra-Low-Power SWIPT IoT Networks
Pith reviewed 2026-05-10 08:22 UTC · model grok-4.3
The pith
A rectifier-driven backscatter scheme adds protocol-independent device authentication to ultra-low-power SWIPT IoT nodes with negligible effect on energy autonomy.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The proposed approach achieves secure identification, reliable energy harvesting, and data transmission with negligible impact on node autonomy while operating independently of communication protocols.
Load-bearing premise
That a rectifier-driven backscattering scheme can be embedded with only minimal hardware modification and will continue to provide reliable authentication and energy harvesting when deployed in real, interference-prone environments without post-hoc tuning.
Figures
read the original abstract
This paper presents a lightweight, protocol-agnostic security enhancement for Simultaneous Wireless Information and Power Transfer (SWIPT) in Internet of Things (IoT) applications. Building on a backscatter-based identification mechanism, the proposed approach introduces a secure, energy-efficient layer that operates independently of communication protocols and with minimal hardware modification. A rectifier-driven backscattering scheme embedded in battery-free sensing nodes enables authentication without activating conventional RF transceivers, thereby reducing power consumption while ensuring secure device identification. To assess robustness, replay attacks are emulated on standard LoRaWAN Activation By Personalization (ABP) encryption, highlighting vulnerabilities and demonstrating the relevance of the proposed solution. The approach is experimentally validated in a real Wireless Sensor Network (WSN) using LoRaWAN-compatible, battery-free sensing nodes equipped with compact, low-profile antennas, confirming both practicality and scalability for space-constrained IoT deployments. Results show that the method achieves secure identification, reliable energy harvesting, and data transmission with negligible impact on node autonomy. The proposed approach offers a practical, energy-efficient, and scalable security framework for SWIPT-enabled IoT systems, strengthening device authentication without altering existing communication protocols or compromising power autonomy.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper presents a lightweight, protocol-agnostic security enhancement for SWIPT in IoT applications. It proposes a rectifier-driven backscattering scheme embedded in battery-free sensing nodes to enable secure authentication without activating conventional RF transceivers, thereby reducing power consumption. The approach is experimentally validated on LoRaWAN ABP nodes in a real WSN using compact antennas, with replay attacks emulated to highlight vulnerabilities; results are claimed to show secure identification, reliable energy harvesting, data transmission, and negligible impact on node autonomy while operating independently of communication protocols.
Significance. If the experimental claims hold with supporting quantitative evidence, the work could provide a practical, energy-efficient security layer for ultra-low-power SWIPT IoT systems that preserves protocol compatibility and node autonomy. The integration of backscatter for both identification and harvesting in space-constrained, battery-free deployments addresses a relevant challenge in IoT security and energy management.
major comments (2)
- [Abstract] Abstract: The claim that 'Results show that the method achieves secure identification, reliable energy harvesting, and data transmission with negligible impact on node autonomy' is unsupported by any quantitative data, error bars, statistical tests, power measurements, success rates, or hardware schematics. This is load-bearing for the central assertions of practicality, scalability, and negligible autonomy impact.
- [Experimental Validation] Robustness and Experimental Validation sections: No details are provided on test conditions (e.g., interference levels, multipath, node density) or performance under perturbation, nor explicit checks that the scheme requires no post-deployment tuning. This directly affects the protocol-agnostic and reliable-operation claims in real WSN environments.
minor comments (2)
- The description of the rectifier-driven backscattering mechanism would benefit from a clearer block diagram or circuit-level explanation of the minimal hardware modifications.
- Consider including a table comparing power consumption, authentication latency, and security properties against baseline LoRaWAN and other SWIPT security approaches.
Simulated Author's Rebuttal
We thank the referee for the detailed and constructive review. We address the major comments point by point below and indicate where revisions will be made to strengthen the manuscript.
read point-by-point responses
-
Referee: [Abstract] Abstract: The claim that 'Results show that the method achieves secure identification, reliable energy harvesting, and data transmission with negligible impact on node autonomy' is unsupported by any quantitative data, error bars, statistical tests, power measurements, success rates, or hardware schematics. This is load-bearing for the central assertions of practicality, scalability, and negligible autonomy impact.
Authors: We agree that the abstract would be strengthened by explicit quantitative support. The Experimental Validation section of the manuscript contains the supporting measurements (power consumption, identification success rates, and energy harvesting efficiency), but these are not summarized numerically in the abstract. In the revised version we will update the abstract to include concise quantitative statements drawn directly from the experimental results (e.g., measured power overhead, success rate, and autonomy impact) together with references to the relevant figures and tables. revision: yes
-
Referee: [Experimental Validation] Robustness and Experimental Validation sections: No details are provided on test conditions (e.g., interference levels, multipath, node density) or performance under perturbation, nor explicit checks that the scheme requires no post-deployment tuning. This directly affects the protocol-agnostic and reliable-operation claims in real WSN environments.
Authors: We acknowledge that additional environmental and operational details would improve transparency. The current manuscript describes the LoRaWAN ABP deployment in a real WSN but does not quantify interference, multipath, or node density. In the revision we will expand the Experimental Validation section with these specifics, report any observed performance under the tested conditions, and add an explicit statement (supported by the rectifier-level design) that no post-deployment tuning is required because the backscattering mechanism is protocol-independent. revision: yes
Circularity Check
No significant circularity; experimental system result with no derivation chain
full rationale
The paper presents a hardware-based security layer using rectifier-driven backscattering for SWIPT IoT nodes, validated experimentally on LoRaWAN ABP devices. No mathematical derivations, equations, fitted parameters, or predictions appear in the provided abstract or described approach. Claims of protocol-agnostic operation, secure identification, and negligible autonomy impact rest directly on implementation details and test outcomes rather than reducing to self-referential inputs, self-citations, or ansatzes by construction. This is a standard non-circular experimental systems paper whose central assertions are externally falsifiable via replication of the described hardware setup.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption A rectifier-driven backscatter circuit can modulate and reflect an incoming signal to encode device identity without activating the main RF transceiver.
- domain assumption The added backscatter hardware introduces negligible additional power draw relative to the harvested energy budget.
Reference graph
Works this paper leans on
-
[1]
A Comprehensive Study of Security of Internet-of-Things,
A. Mosenia and N. K. Jha, “A Comprehensive Study of Security of Internet-of-Things,” IEEE Trans. Emerg. Topics Comput., vol. 5, no. 4, pp. 586–602, Oct. 2017, doi: 10.1109/TETC.2016.2606384
-
[2]
Evaluating Security Principals and Technologies to Overcome Security Threats in IoT World,
J. Singh, G. Singh, and S. Negi, “Evaluating Security Principals and Technologies to Overcome Security Threats in IoT World,” in 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India: I EEE, May 2023, pp. 1405 –
2023
-
[3]
doi: 10.1109/ICAAIC56838.2023.10141083
-
[4]
Radiative Wireless Power Transfer: Where We Are and Where We Want to Go,
V. Palazzi et al., “Radiative Wireless Power Transfer: Where We Are and Where We Want to Go,” IEEE Microwave, vol. 24, no. 2, pp. 57 – 79, Feb. 2023, doi: 10.1109/MMM.2022.3210145
-
[5]
Wirelessly Powered Battery-Free Sensing Nodes for Internet of Things Applications,
G. Loubet et al., “Wirelessly Powered Battery-Free Sensing Nodes for Internet of Things Applications,” IEEE Microwave, vol. 26, no. 7, pp. 26–46, Jul. 2025, doi: 10.1109/MMM.2024.3488593
-
[6]
Investigation on Security Risk of LoRaWAN: Compatibility Scenarios,
S. Loukil, L. C. Fourati, A. Nayyar, and C. So -In, “Investigation on Security Risk of LoRaWAN: Compatibility Scenarios,” IEEE Access, vol. 10, pp. 101825 –101843, 2022, doi: 10.1109/ACCESS.2022.3208171. 10
-
[7]
G. Loubet, E. Alata, A. Takacs, and D. Dragomirescu, “A Survey on the Security Challenges of Low -Power Wireless C ommunication Protocols for Communicating Concrete in Civil Engineerings,” Sensors, vol. 23, no. 4, p. 1849, Feb. 2023, doi: 10.3390/s23041849
-
[8]
Lightweight Cryptography: A Solution to Secure IoT,
S. S. Dhanda, B. Singh, and P. Jindal, “Lightweight Cryptography: A Solution to Secure IoT,” Wireless Pers Co mmun, vol. 112, no. 3, pp. 1947–1980, Jun. 2020, doi: 10.1007/s11277-020-07134-3
-
[9]
V. A. Thakor, M. A. Razzaque, and M. R. A. Khandaker, “Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportu nities,” IEEE Access, vol. 9, pp. 28177 –28193, 2021, doi: 10.1109/ACCESS.2021.3052867
-
[10]
Security on IoT devices with secure elements,
T. Schläpfer and A. Rüst, “Security on IoT devices with secure elements,” 2019, doi: 10.21256/ZHAW-3350
-
[11]
Intrusio n detection systems for IoT-based smart environments: a survey,
M. F. Elrawy, A. I. Awad, and H. F. A. Hamed, “Intrusio n detection systems for IoT-based smart environments: a survey,” J Cloud Comp, vol. 7, no. 1, p. 21, Dec. 2018, doi: 10.1186/s13677-018-0123-6
-
[12]
A. Khraisat and A. Alazab, “A critical review of intrusion detection systems in the internet of things: tec hniques, deployment strategy, validation strategy, attacks, public datasets and challenges,” Cybersecur, vol. 4, no. 1, p. 18, Mar. 2021, doi: 10.1186/s42400 -021- 00077-7
-
[13]
A Survey on IoT Profiling, Fingerprinting, and Identification,
M. Safi, S. Dadkhah, F. Shoeleh, H. Mahdikhani, H. Molyneaux, and A. A. Ghorbani , “A Survey on IoT Profiling, Fingerprinting, and Identification,” ACM Trans. Internet Things, vol. 3, no. 4, pp. 1 –39, Nov. 2022, doi: 10.1145/3539736
-
[14]
Autonomous Industrial IoT for Ci vil Engineering Structural Health Monitoring,
G. Loubet, A. Sidibe, P. Herail, A. Takacs, and D. Dragomirescu, “Autonomous Industrial IoT for Ci vil Engineering Structural Health Monitoring,” IEEE Internet Things J., vol. 11, no. 5, pp. 8921 –8944, Mar. 2024, doi: 10.1109/JIOT.2023.3321958
-
[15]
A. Sidibe, G. Loubet, A. Takacs, and D. Dragomirescu, “A Multifunctional Battery-Free Bluetooth Low Energ y Wireless Sensor Node Remotely Powered by Electromagnetic Wireless Power Transfer in Far -Field,” Sensors, vol. 22, no. 11, p. 4054, May 2022, doi: 10.3390/s22114054
-
[16]
Power Splitting -Based SWIPT Systems With Full-Duplex Jamming,
R. Ma, H. Wu, J. Ou, S. Yang, and Y. Gao, “Power Splitting -Based SWIPT Systems With Full-Duplex Jamming,” IEEE Transactions on Vehicular Technology, vol. 69, no. 9, pp. 9822 –9836, Sep. 2020, doi: 10.1109/TVT.2020.3002976
-
[17]
Secure mmWave UAV - Enabled SWIPT Networks Based on Random Frequency Diverse Arrays,
X. Sun, W. Yang, Y. Cai, and M. Wang, “Secure mmWave UAV - Enabled SWIPT Networks Based on Random Frequency Diverse Arrays,” IEEE Internet of Things Journal, vol. 8, no. 1, pp. 528 –540, Jan. 2021, doi: 10.1109/JIOT.2020.3005984
-
[18]
Y. Xu, H. Xie, C. Liang, and F. R. Yu, “Robust Secure Energy - Efficiency Optimization in SWIPT -Aided Heterogeneous Networks With a Nonlinear Energy-Harvesting Model,” IEEE Internet of Things Journal, vol. 8, no. 19, pp. 14908 –14919, Oct. 2021, doi: 10.1109/JIOT.2021.3072965
-
[19]
H. T. Thien, P. -V. Tuan, and I. Koo, “A Secure -Transmission Maximization Scheme for SWIPT Systems Assisted by an Intelligent Reflecting Surface and Deep Learning,” IEEE Access, vol. 10, pp. 31851–31867, 2022, doi: 10.1109/ACCESS.2022.3159679
-
[20]
Secrecy Rate Optimization in Nonlinear Energy Harvesting Model-Based mmWave IoT Systems With SWIPT,
Z. Zhu et al., “Secrecy Rate Optimization in Nonlinear Energy Harvesting Model-Based mmWave IoT Systems With SWIPT,” IEEE Systems Journal, vol. 16, no. 4, pp. 5939 –5949, Dec. 2022, doi: 10.1109/JSYST.2022.3147889
-
[21]
C. Hu, Q. Li, Q. Zhang, and J. Qin, “Security Optimization for an AF MIMO Two -Way Relay -Assisted Cognitive Radio Nonorthogonal Multiple Access Networks With S WIPT,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1481 –1496, 2022, doi: 10.1109/TIFS.2022.3163842
-
[22]
DS -SWIPT: Secure Communication with Wireless Power Transfer for Internet of Things,
P. Gong, T. M. Chen, P. Xu, and Q. Chen, “DS -SWIPT: Secure Communication with Wireless Power Transfer for Internet of Things,” Security and Communication Networks, vol. 2022, pp. 1 –11, Jun. 2022, doi: 10.1155/2022/2650474
-
[23]
Physical Layer Security in AF -Based Cooperative SWIPT Sensor Networks,
T. N. Nguyen et al., “Physical Layer Security in AF -Based Cooperative SWIPT Sensor Networks,” IEEE Sensors Journal, vol. 23, no. 1, pp. 689–705, Jan. 2023, doi: 10.1109/JSEN.2022.3224128
-
[24]
Physical Layer Security in Two - Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer,
M. Hayajneh and T. A. Gulliver, “Physical Layer Security in Two - Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer,” Entropy, vol. 25, no. 1, p. 122, Jan. 2023, doi: 10.3390/e25010122
-
[25]
Deep Learning Methods for Secure IoT SWIPT Networks,
V. Ganapath y, R. Ramachandran, and T. Ohtsuki, “Deep Learning Methods for Secure IoT SWIPT Networks,” IEEE Internet of Things Journal, vol. 11, no. 11, pp. 19657 –19677, Jun. 2024, doi: 10.1109/JIOT.2024.3368692
-
[26]
GRNN -based detection of eavesdropping attacks in SWIPT-enabled smart grid wireless sensor networks,
W. Jiang, J. Wang, K. -L. Hsiung, and H. -Y. Chen, “ GRNN-Based Detection of Eavesdropping Attacks in SWIPT -Enabled Smart Grid Wireless Sensor Networks,” IEEE Internet of Things Journal, vol. 11, no. 22, pp. 37381 –37393, Nov. 2024, doi: 10.1109/JIOT.2024.3443277
-
[27]
A New Security and Identification Concept for SWIPT Systems in IoT Applications,
T. E. Djidjekh, L. Sanogo, G. Loubet, A. Sidibé, D. Dragomirescu, and A. Takacs, “A New Security and Identification Concept for SWIPT Systems in IoT Applications,” in 2024 IEEE/MTT -S International Microwave Symposium - IMS 2024, Washington, DC, USA: IEEE, Jun. 2024, pp. 110 –113. doi: 10.1109/IMS40175.2024.10600312
-
[28]
T. E. Djidjekh et al., “Backscattering Rectifier for Security and Identification in the context of Simultaneous Wireless Information and Power Transfer,” in 2024 54th European Microwave Conference (EuMC), Paris, France: IEEE, Sep. 2024, pp. 300 –303. doi: 10.23919/EuMC61614.2024.10732847
-
[29]
Analysis of Lorawan Protocol and Attacks Against Lorawan -Based IoT Devices,
A. Tepecik and A. F. Ağrak, “Analysis of Lorawan Protocol and Attacks Against Lorawan -Based IoT Devices,” ijamec, p. 2, Jun. 2024, doi: 10.58190/ijamec.2024.95
-
[30]
Compact Antenna in 3D Configuration for Rectenna Wireless Power Transmission Applications,
A. Sidibe, A. Takacs, G. Loubet, and D. Dragomirescu, “Compact Antenna in 3D Configuration for Rectenna Wireless Power Transmission Applications,” Sensors, vol. 21, no. 9, p. 3193, May 2021, doi: 10.3390/s21093193
-
[31]
Backsca ttering-Based Security in Wireless Power Transfer Applied to Battery -Free BLE Sensors,
T. E. Djidjekh, G. Loubet, and A. Takacs, “Backsca ttering-Based Security in Wireless Power Transfer Applied to Battery -Free BLE Sensors,” in 2025 IEEE Wireless Power Technology Conference and Expo (WPTCE), Jun. 2025, pp. 1 –4. doi: 10.1109/WPTCE62521.2025.11062233
-
[32]
Singl e-Ended Reconfigurable Wireless Power Harvesting and Harmonic Backscattering,
X. Gu, R. Khazaka, and K. Wu, “Singl e-Ended Reconfigurable Wireless Power Harvesting and Harmonic Backscattering,” in 2023 IEEE Wireless Power Technology Conference and Expo (WPTCE), San Diego, CA, USA: IEEE, Jun. 2023, pp. 1 –4. doi: 10.1109/WPTCE56855.2023.10215912
-
[33]
V. Palazzi, L. Rose lli, M. M. Tentzeris, P. Mezzanotte, and F. Alimenti, “Energy-Efficient Harmonic Transponder Based on On -Off Keying Modulation for Both Identification and Sensing,” Sensors, vol. 22, no. 2, p. 620, Jan. 2022, doi: 10.3390/s22020620. Taki E. Djidjekh (Member, IEEE) was born in 1995 in Biskra, Algeria. He received the PhD degree in Elec...
-
[34]
degrees in microwave and optical communications from the National 11 Polytechnic Institute of Toulouse, France, in 2000 and 2004, respectively
He received the Engineer Diploma in electronic engineering from the Military Technical Academy, Bucharest, Romania, in 1999, and the master’s and Ph.D. degrees in microwave and optical communications from the National 11 Polytechnic Institute of Toulouse, France, in 2000 and 2004, respectively. From 2004 to 2007, he was a Lecturer with the Military Techni...
1999
-
[35]
student in the Internet of Things (IoT) physical layer security at the National Institute of Applied Sciences (INSA) of Toulouse, France, since February 2022
He is currently a Ph.D. student in the Internet of Things (IoT) physical layer security at the National Institute of Applied Sciences (INSA) of Toulouse, France, since February 2022. His research focuses on finding security solutions and countermeasures adapted to resource - constrained IoT devices . Currently, He is working mainly on a new message authen...
2022
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.