2021
DOI: 10.1109/iotm.001.2100115
|View full text |Cite
|
Sign up to set email alerts
|

A Tutorial on Next Generation Heterogeneous IoT Networks and Node Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…However, neither QKD nor CRKG provides a means to authenticate the transmission source. Therefore, source authentication in CR-QKD should be further studied by using asymmetric cryptography techniques or emerging physicallayer techniques, such as radio frequency fingerprinting identification and physical unclonable function [1]. • Untrusted QAPs: The proposed CR-QKD scheme relies on the trust of the intermediate QAPs.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, neither QKD nor CRKG provides a means to authenticate the transmission source. Therefore, source authentication in CR-QKD should be further studied by using asymmetric cryptography techniques or emerging physicallayer techniques, such as radio frequency fingerprinting identification and physical unclonable function [1]. • Untrusted QAPs: The proposed CR-QKD scheme relies on the trust of the intermediate QAPs.…”
Section: Discussionmentioning
confidence: 99%
“…The CR-QKD protocol comprises three main phases, i.e, QKD 1 , CRKG and edge forwarding, which will be elaborated below.…”
Section: A Mechanism Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…To address this issue, the authors have proposed a novel approach by leveraging the first layer (physical layer) in the authentication process and incorporating ML algorithms to assist with authentication. This innovative solution offers advantages such as reduced synchronization and acknowledgement requirements, leading to node energy savings [128]. However, one of the unresolved concerns is the privacy condition.…”
Section: Privacy Concernsmentioning
confidence: 99%
“…Solutions in using 5G and other networks (e.g., Wi-Fi). Bhuyan et al, 2021;Ksentini and Frangoudis, 2020;Gonzalez et al, 2020;Liyanage et al, 2018;Wang and Yan, 2015;Tahir et al, 2020;Azzaoui et al, 2020;Nieto et al, 2017Nieto et al, , 2018Zhang and Lin, 2017;Compagno et al, 2017;Dik and Berger, 2021;Benzaid and Taleb, 2020;Zhao et al, 2021a;Bitsikas and Pöpper, 2021;Chaudhary et al, 2020;Gao et al, 2021;Sood et al, 2021;Cao et al, 2020;Ding et al, 2022b;Wu et al, 2018;Shi and Sagduyu, 2021;Sullivan et al, 2021;Mei et al, 2018;Gebremariam et al, 2021;Ginzboorg and Niemi, 2016;Rotinsulu and Fitri Sari, 2018;Vassilakis et al, 2017;Ar-joune and Faruque, 2020]. An adversary can maliciously (1) use legitimate orchestrator access to manipulate the configuration and run a compromised network function, (2) take advantage of malicious insiders attacks, (3) perform unauthorized access (e.g., to confidential data [Isaksson and Norrman, 2020] and to RFID tags [Rahimi et al, 2018]), (4) tampering, (5) perform resource exhaustion, (6) turn services unavailable, ( 7) analyze or modify traffic, (8) perform data leakage (e.g., capturing valuable personal information [Bordel et al, 2021;Annessi et al, 2018;Vreman and Maggio, 2019]), (…”
Section: Item Description Item Descriptionmentioning
confidence: 99%