Synopsis of Research Problem Wireless Physical Layer Security for Internet of Things (IoT) Applications

ثبت نشده
چکیده

Wireless communication is one of the key technologies that actualize the Internet of Things (IoT) concept into the real world [1]. The foundation of the security management of IoT is laid by understanding the security performance of wireless communication. The term IoT is synonymous with the cyber–physical system, or a ‘‘network of networks’’ [2], where a variety of things (like sensors, mobile phones, gadgets, people) can interact with one another from any place in the world through an infrastructure like internet with unique addressing schemes, serves a crucial architecture for a wide range of promising applications such as e-health, intelligent transportation systems, and environmental monitoring [3,4]. As one of emerging technologies of IoT, wireless communication (e.g., wireless sensor network) plays an important role in collecting the data perceived by edge points (e.g., sensing nodes) from the surroundings so as to link the real time systems with the digital systems. Due to the open nature of the wireless medium, data collection through wireless communication may suffer from eavesdropping attacks by unauthorized things , posing a significant threat to the IoT security. Thus, extensive research efforts need to be devoted to the security performance study of wireless communications in the data collection process, which serves as a foundation for the security management of IoT.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices

Wireless networks, Internet of Things (IoT), Internet of Everything (IoE), and smart homes have become extremely important terms in our present-day life. Most of the buildings, companies, institutions, and even homes depend onthese technologies for interaction, communication, automation, and everything surrounding humans. To understand the advanced topics in wireless networks and IoT devi...

متن کامل

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016