ترغب بنشر مسار تعليمي؟ اضغط هنا

Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

109   0   0.0 ( 0 )
 نشر من قبل Junqing Zhang
 تاريخ النشر 2017
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

قيم البحث

اقرأ أيضاً

Over 20 billion Internet of Things devices are set to come online by 2020. Protecting such a large number of underpowered, UI-less, network-connected devices will require a new security paradigm. We argue that solutions dependent on vendor cooperatio n such as secure coding and platform changes are unlikely to provide adequate defenses for the majority of devices. Similarly, regulation approaches face a number implementation challenges which limit their effectiveness. As part of the new paradigm, we propose IDIoT, a network security policy enforcement framework for IoT devices. IDIoT prevents widespread network attacks by restricting IoT devices to only their necessary network behavior. IDIoT is simple and effective, building on decades of tried-and-true network security principles without requiring changes to the devices or cloud infrastructure.
Enabled by the advancement in radio frequency technologies, the convergence of radar and communication systems becomes increasingly promising and is envisioned as a key feature of future 6G networks. Recently, the frequency-hopping (FH) MIMO radar is introduced to underlay dual-function radar-communication (DFRC) systems. Superior to many previous radar-centric DFRC designs, the symbol rate of FH-MIMO radar-based DFRC (FH-MIMO DFRC) can exceed the radar pulse repetition frequency. However, many practical issues, particularly those regarding effective data communications, are unexplored/unsolved. To promote the awareness and general understanding of the novel DFRC, this article is devoted to providing a timely introduction of FH-MIMO DFRC. We comprehensively review many essential aspects of the novel DFRC: channel/signal models, signaling strategies, modulation/demodulation processing and channel estimation methods, to name a few. We also highlight major remaining issues in FH-MIMO DFRC and suggest potential solutions to shed light on future research works.
Key extraction via measuring a physical quantity is a class of information theoretic key exchange protocols that rely on the physical characteristics of the communication channel to enable the computation of a shared key by two (or more) parties that share no prior secret information. The key is supposed to be information theoretically hidden to an eavesdropper. Despite the recent surge of research activity in the area, concrete claims about the security of the protocols typically rely on channel abstractions that are not fully experimentally substantiated. In this work, we propose a novel methodology for the {em experimental} security analysis of these protocols. The crux of our methodology is a falsifiable channel abstraction that is accompanied by an efficient experimental approximation algorithm of the {em conditional min-entropy} available to the two parties given the view of the eavesdropper. We focus on the signal strength between two wirelessly communicating transceivers as the measured quantity and we use an experimental setup to compute the conditional min-entropy of the channel given the view of the attacker which we find to be linearly increasing. Armed with this understanding of the channel, we showcase the methodology by providing a general protocol for key extraction in this setting that is shown to be secure for a concrete parameter selection. In this way we provide a first comprehensively analyzed wireless key extraction protocol that is demonstrably secure against passive adversaries. Our methodology uses hidden Markov models as the channel model and a dynamic programming approach to approximate conditional min-entropy but other possible instantiations of the methodology can be motivated by our work.
The integration of unmanned aerial vehicles (UAVs) into the terrestrial cellular networks is envisioned as one key technology for next-generation wireless communications. In this work, we consider the physical layer security of the communications lin ks in the millimeter-wave (mmWave) spectrum which are maintained by UAVs functioning as base stations (BS). In particular, we propose a new precoding strategy which incorporates the channel state information (CSI) of the eavesdropper (Eve) compromising link security. We show that our proposed precoder strategy eliminates any need for artificial noise (AN) transmission in underloaded scenarios (fewer users than number of antennas). In addition, we demonstrate that our nonlinear precoding scheme provides promising secrecy-rate performance even for overloaded scenarios at the expense of transmitting low-power AN.
As a subfield of network coding, physical-layer network coding (PNC) can effectively enhance the throughput of wireless networks by mapping superimposed signals at receiver to other forms of user messages. Over the past twenty years, PNC has received significant research attention and has been widely studied in various communication scenarios, e.g., two-way relay communications (TWRC), nonorthogonal multiple access (NOMA) in 5G networks, random access networks, etc. To ensure network reliability, channel-coded PNC is proposed and related communication techniques are investigated, such as the design of channel code, low-complexity decoding, and cross-layer design. In this article, we briefly review the variants of channel-coded PNC wireless communications with the aim of inspiring future research activities in this area. We also put forth open research problems along with a few selected research directions under PNC-aided frameworks.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا