2016
DOI: 10.3390/info7030049
|View full text |Cite
|
Sign up to set email alerts
|

The Role of Physical Layer Security in IoT: A Novel Perspective

Abstract: This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard). As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 55 publications
(25 citation statements)
references
References 28 publications
0
25
0
Order By: Relevance
“…The work on link security of IoT networks is still in early stages and only limited number of studies exist in the literature [307]. Pecorella et al in [308] proposed a physical layer based method to improve the link security/ reliability of data, without extra hardware or increased complexity. However, the proposed scheme is found to be more suitable for near-field transmission scenario.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…The work on link security of IoT networks is still in early stages and only limited number of studies exist in the literature [307]. Pecorella et al in [308] proposed a physical layer based method to improve the link security/ reliability of data, without extra hardware or increased complexity. However, the proposed scheme is found to be more suitable for near-field transmission scenario.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…Moreover, we assume that all the nodes share with the PAN coordinator a Secret key. The Secret key could be installed during the network setup by using a secure network parameters installation method (see for example [32]). Key derivation and management are standard procedure and hence are out of the scope of this paper.…”
Section: A Involved Technologiesmentioning
confidence: 99%
“…In 2016, Pecorella et al [8] analyze the security issues of IoT, they proposed security mechanism for the device initialization and they also depicted how the security issues of physical layer can effectively amplify the security of IoT systems. But, there is a drawback of the data broadcast rate and the range of communication between the devices is applicable for a short distance.…”
Section: Jayanta Kumar Pahari Arindam Roymentioning
confidence: 99%