scholarly journals A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions

Entropy ◽  
2018 ◽  
Vol 20 (10) ◽  
pp. 730 ◽  
Author(s):  
Li Sun ◽  
Qinghe Du

With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions.

2021 ◽  
Author(s):  
Grishma Khadka ◽  
Biplob Ray ◽  
Jinho Choi ◽  
Nemai Karmakar

<div>This paper has proposed detection and physical layer security provision for printed sensory tag systems for internet of things (IoT) applications. The printed sensory tags can be a very cost-effective way to speed up the proliferation of the intelligent world of IoT. The printed Radio Frequency Identification (RFID) of a sensory tag is chipless with the fully printable feature, non-line-of-sight reading, low cost, and robustness to the environment. The detection and adoption of security features for such tags in a robust environment are still challenging. This paper initially presents a robust technology for detecting tags using both the amplitude and phase information of the frequency signature. After successfully identifying tag IDs, the paper presents novel physical layer security using a deep learning model to prevent the cloning of tags. Our experiment shows that the proposed system can detect and identify the unique physical attributes of the tag and isolate the clone tag from the genuine tag. It is believed that such real-time and precise detection and security features bring this technology closer to commercialisation for IoT applications.</div>


2021 ◽  
Author(s):  
Grishma Khadka ◽  
Biplob Ray ◽  
Jinho Choi ◽  
Nemai Karmakar

<div>This paper has proposed detection and physical layer security provision for printed sensory tag systems for internet of things (IoT) applications. The printed sensory tags can be a very cost-effective way to speed up the proliferation of the intelligent world of IoT. The printed Radio Frequency Identification (RFID) of a sensory tag is chipless with the fully printable feature, non-line-of-sight reading, low cost, and robustness to the environment. The detection and adoption of security features for such tags in a robust environment are still challenging. This paper initially presents a robust technology for detecting tags using both the amplitude and phase information of the frequency signature. After successfully identifying tag IDs, the paper presents novel physical layer security using a deep learning model to prevent the cloning of tags. Our experiment shows that the proposed system can detect and identify the unique physical attributes of the tag and isolate the clone tag from the genuine tag. It is believed that such real-time and precise detection and security features bring this technology closer to commercialisation for IoT applications.</div>


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


2020 ◽  
Vol 12 (4) ◽  
pp. 66-78
Author(s):  
Rabia Tugce Yazicigil ◽  
Phillip M. Nadeau ◽  
Daniel D. Richman ◽  
Chiraag Juvekar ◽  
Saurav Maji ◽  
...  

Author(s):  
Yulia G. TYURINA ◽  
Kristina A. BANNOVA

Nowadays, direct taxation of personal income is used in almost all countries of the world, and to this day there are various changes that shift the share of revenue from these taxes towards increasing the state budget. The significance of the personal income tax in economic policy is also due to the fact that it affects the interests of almost the entire population of the country. A variety of disputes constantly arise around the personal income tax, which can be explained by a wide range of taxpayers in various social strata. The ongoing transformations in the tax area predetermine the construction of the individuals taxation fair system as the fulfillment of one of the conditions for improving the living standards of the population. The relevance of the study lies in the need to reform the tax system in Russia, namely, the taxation of personal income, in order to implement the principle of social justice, as well as to satisfy the fiscal component of this tax, respectively, to fulfill the interests of participants in tax relations. The purpose of the article is a theoretical understanding of the conceptual directions of the taxation theories development through the prism of realizing the interests of the state and taxpayers in the taxation system of personal income. The subject of this research is the set of economic relations between the state and individuals, formed in the process of taxation of personal income in Russia. The methodological basis was the conceptual provisions of the theories of taxation, scientific methods and methods of analysis. The scientific novelty of the work lies in the fact that the results of the methodological analysis of the taxation theories development through the prism of realizing the state interests and taxpayers will make it possible to solve from a theoretical point of view the issue of interests balance achieving of all parties, which will contribute to the development of practical measures to achieve a decent standard of living for the population.


2020 ◽  
Vol 14 (4) ◽  
pp. 113-133
Author(s):  
Mary Shamala L. ◽  
Zayaraz G. ◽  
Vivekanandan K. ◽  
Vijayalakshmi V.

Internet of things (IoT) is a global network of uniquely addressable interconnected things, based on standard communication protocols. As the number of devices connected to the IoT escalates, they are becoming a likely target for hackers. Also, the limited resources of IoT devices makes the security on top of the actual functionality of the device. Therefore, the cryptographic algorithm for such devices has to be devised as small as possible. To tackle the resource constrained nature of IoT devices, this article presents a lightweight cryptography algorithm based on a single permutation and iterated Even-Mansour construction. The proposed algorithm is implemented in low cost microcontrollers, thus making it suitable for a wide range of IoT nodes.


2020 ◽  
Vol 7 (1) ◽  
pp. 99-115 ◽  
Author(s):  
Bin Dai ◽  
Zheng Ma ◽  
Yuan Luo ◽  
Xuxun Liu ◽  
Zhuojun Zhuang ◽  
...  

2020 ◽  
Vol 16 (6) ◽  
pp. 155014772093346
Author(s):  
Xin Fan ◽  
Yan Huo

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.


Sign in / Sign up

Export Citation Format

Share Document