2020
DOI: 10.1109/access.2020.3012006
|View full text |Cite
|
Sign up to set email alerts
|

A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless Channels

Abstract: The Internet of Things (IoT) is a transformative technology, which is revolutionizing our everyday life by connecting everyone and everything together. The massive number of devices are preferably connected wirelessly because of the easy installment and flexible deployment. However, the broadcast nature of the wireless medium makes the information accessible to everyone including malicious users, which should hence be protected by encryption. Unfortunately, the secure and efficient provision of cryptographic k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 107 publications
(89 citation statements)
references
References 260 publications
0
60
0
Order By: Relevance
“…Exploiting the wireless capabilities to control the industrial control system application remotely [5], [157], [165], [212] Disturbing the industrial control system operation Physical threats Spoofing a temperature sensor in a specific environment [53], [39], [45], [63], [164] Sending deceptive, false measurements to the control center…”
Section: Criminal Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…Exploiting the wireless capabilities to control the industrial control system application remotely [5], [157], [165], [212] Disturbing the industrial control system operation Physical threats Spoofing a temperature sensor in a specific environment [53], [39], [45], [63], [164] Sending deceptive, false measurements to the control center…”
Section: Criminal Threatsmentioning
confidence: 99%
“…This structure is significantly safe from the cyber-space aspect as the attackers cannot access the physical layer. Furthermore, beamforming is widely employed as suitable physical layer security [157]. Though, the decentralized control strategies undergo an operational perspective in matching the commercial, regulatory standards [158].…”
Section: B Vulnerability Analysis Of Cyber-attacks On the Control Ofmentioning
confidence: 99%
“…In the literature, several key generation methods have been proposed. They rely on the true randomness of wireless nature [19], with characteristics such as the random received signal strength (RSS) [60], the random channel coefficients [27], the diversity of MIMO [28], the MIMO channel fluctuations [29], and distributed antennas [61]. Most of these methods are highly reliable.…”
Section: Generation Of a Real-valued Secret Key From The True Randomness Of Wireless Naturementioning
confidence: 99%
“…Key-based encryption techniques that rely on computational security may be cracked by future supercomputers [8,17,18]. In order to overcome this limitation, physical layer security (PLS) methods that frequently update private keys have been conceived [19], which rely on the true randomness of wireless channels. The information-theoretic foundation of secret-key agreement in public channels was first established by Maurer and Wolf [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…Devices are conventionally authenticated by cryptographic schemes, which rely on a commonly preshared key and software address. However, key management and distribution become challenging for IoT devices, as many of them will be low-cost and distributed in remote areas [2]. Software address, such as MAC/IP address, is not encrypted and can be spoofed easily.…”
mentioning
confidence: 99%