The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1109/jproc.2015.2466548
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints

Abstract: | The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type communication (MTC) devices. The limited hardware, low-complexity, and severe energy constraints of MTC devices present unique communication and security challenges. As a result, robust physical-layer security methods that can supplement or even replace lightweight cryptographic protocols are appealing solutions. In this paper, we present an overview of low-complexity physical-layer s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
168
0
2

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 307 publications
(186 citation statements)
references
References 92 publications
0
168
0
2
Order By: Relevance
“…The source and the destination are Low-end sensors with single antenna while a High-end sensor with multiple antennas serves as a relay. In practice, artificial noise is not suitable for IoT applications since it requires high consumption of energy as well as causes interference to adjacent nodes [13]. Thus, in this work we only adopt beamforming as our transmit strategy without employing artificial noise.…”
Section: B Approach and Contributionsmentioning
confidence: 99%
“…The source and the destination are Low-end sensors with single antenna while a High-end sensor with multiple antennas serves as a relay. In practice, artificial noise is not suitable for IoT applications since it requires high consumption of energy as well as causes interference to adjacent nodes [13]. Thus, in this work we only adopt beamforming as our transmit strategy without employing artificial noise.…”
Section: B Approach and Contributionsmentioning
confidence: 99%
“…The objective of this layer is to provide services to the network and authentication of devices. The main devices [9] in physical layer includes Arduino, ZigBee, Barcodes, RFID and all other type of sensors. Each device in IoT system must have a unique tag which allows strong connection to the network and mostly Universally Unique identifiers (UUID) are used in the whole network by various devices.…”
Section: A Physical Layermentioning
confidence: 99%
“…Even more importantly, increasing computing power and especially the potential of quantum computing, threatens these schemes. As a result, the key generation phase in the PKE protocol can be a limiting factor in the performance of resource constrained systems such as sensor networks, and, physical layer security alternatives would be worth exploring [23].…”
Section: ) Privacy Amplificationmentioning
confidence: 99%