Skip navigation

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

Illi, Elmehdi ORCID: 0000-0002-7169-3698 , Qaraqe, Marwa ORCID: 0000-0003-0767-2478 , Althunibat, Saud ORCID: 0000-0002-5017-5007 , Alhasanat, Abdullah ORCID: 0000-0001-6082-2215 , Alsafasfeh, Moath ORCID: 0000-0002-3370-2928 , de Ree, Marcus ORCID: 0000-0002-7453-4019 , Mantas, Georgios ORCID: 0000-0002-8074-0417 , Rodriguez, Jonathan ORCID: 0000-0001-9829-0955 , Aman, Waqas ORCID: 0000-0002-2443-1302 and Al-Kuwari, Saif ORCID: 0000-0002-4402-7710 (2023) Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks. IEEE Communications Surveys and Tutorials. p. 1. ISSN 2373-745X (Print), 1553-877X (Online) (doi:https://doi.org/10.1109/COMST.2023.3327327)

[img]
Preview
PDF (Abstract)
44952_MANTAS_Physical_layer_security_for_authentication,_confidentiality_and_malicious_node_detection.pdf - Other

Download (123kB) | Preview

Abstract

The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to reach significant levels with the upcoming sixth generation of mobile networks (6G). Throughout the past years, wireless standardization units worldwide have been prominently active in the deployment and performance optimization of such IoT networks and fusing them with current and futuristic cellular networks. Nonetheless, the openness of wireless transmissions and the forecasted overwhelm in connected devices will provoke unprecedented security leakages and vulnerabilities. In addition to the key targets of the 6G and IoT, it has been of paramount importance to cater to decent and lightweight security mechanisms in ultra-massively connected heterogeneous networks. Recently, significant efforts have been made to pave the way for the integration of physical layer security (PLS) in contemporary and futuristic networks. The primary motivation behind its deployment resides in its low complexity and ability to provide information-theoretic secure transmissions, which alleviates the complexity burden caused by implementing complex cryptographic schemes. This survey overviews the recent advancement in PLS techniques with a particular interest in its application to the Internet of Things (IoT). We review essentially recent PLS techniques aiming at ensuring message confidentiality along with node/message authentication and malicious nodes’ detection, where their corresponding application scenarios and underlying pros and cons are discussed. On top of that, we explore recent findings in the incorporation of cutting-edge technologies at the physical layer, such as non-orthogonal multiple-access, reconfigurable intelligent surfaces, joint communication and sensing, and optical wireless/Terahertz communications in boosting confidentiality and authentication at the physical layer. Lastly, promising extensions and future directions are discussed based on the quantified pros and cons of each PLS category, opening up ways for timely research directions within the topic and current/future challenges faced by PLS.

Item Type: Article
Uncontrolled Keywords: eavesdropping; Internet of Things; intrusion; malicious nodes detection; physical layer authentication; physical layer key establishment; physical layer security; radio-frequency fingerprinting
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > School of Engineering (ENG)
Last Modified: 23 Nov 2023 16:36
URI: http://gala.gre.ac.uk/id/eprint/44952

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics