4.8 Article

Phase-Assisted Dynamic Tag-Embedding Message Authentication for IoT Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Physical layer security for Internet of Things via reconfigurable intelligent surface

Dinh-Thuan Do et al.

Summary: This paper investigates the security problem of unauthorized access in IoT systems, proposes a RIS-assisted IoT system to enhance system secrecy and communication performance, and discusses key factors that affect the security performance of the system.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Information Systems

Intelligent Reflecting Surface Empowered Physical-Layer Security: Signal Cancellation or Jamming?

Sai Xu et al.

Summary: This article introduces a novel strategy for secure transmission using intelligent reflecting surfaces (IRS) as backscatter devices. By modulating and reflecting jamming signals, this strategy can deteriorate the reception of illegitimate users without affecting the communication of legitimate users, thus ensuring the security of the transmission.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

SecurePilot: Improving Wireless Security of Single-Antenna IoT Devices

Huangxun Chen et al.

Summary: With the advance of the Internet of Things era, there is a growing concern about the vulnerability of IoT devices to attacks. Existing literature suggests the use of physical-layer solutions instead of complex cryptographic methods to detect attacks on IoT devices. However, there is still a lack of satisfactory solutions for IoT devices with a single antenna and sparse traffic. To address this gap, the researchers propose SecurePilot, an unsupervised and plug-and-play solution that leverages the physical-layer information in pilot signals for effective attack detection. The experimental results show that SecurePilot can successfully detect 99.6% of attacks with a false alarm rate of 3.1% in a typical office environment.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Physical Layer Security for Military IoT Links Using MIMO-Beamforming at 60 GHz

Ahmed Iyanda Sulyman et al.

Summary: This paper discusses the concept and practicality of using MIMO and beamforming techniques at the physical layer of the wireless system to enhance the security of IoT links, and lists several possible options.

INFORMATION (2022)

Article Telecommunications

Physical Layer Security of Non Orthogonal Multiple Access Using Reconfigurable Intelligent Surfaces

Faisal Alanazi

Summary: In this paper, we propose to enhance the physical layer security of NOMA using RIS, where reflections with the same phase can reduce transmitter power to prevent eavesdroppers from detecting the signal. We derive the secrecy outage probability and SPSC for NOMA systems with RIS in Rayleigh fading channels.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Proceedings Paper Computer Science, Information Systems

Performance Analysis of Tag Embedded Based Message Authentication Scheme

Malak Qaisi et al.

Summary: The study focuses on the mathematical analysis of the performance of tag-embedded message authentication scheme, deriving authentication fail probability as an evaluation metric and validating it through simulation results with exact matching.

2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Secure Key Distribution for IoT Networks Based on Physical Layer Security

Tasneem Alshamaseen et al.

Summary: IoT technology has been widely adopted in various fields, but it also poses security risks. Traditional key distribution schemes may not be efficient in IoT networks, thus there is a need for a more efficient and secure approach. By utilizing a physical-layer key distribution mechanism to enhance the security of IoT networks, the proposed scheme successfully achieves key distribution.

2021 IEEE 26TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD) (2021)

Proceedings Paper Telecommunications

Power Allocation for Fingerprint-Based PHY-Layer Authentication with mmWave UAV Networks

Sung Joon Maeng et al.

Summary: This paper explores the use of fingerprint embedding for authentication to defend SG cellular networks from eavesdroppers and intruders, particularly focusing on how to optimize power allocation in a multi-user mmWave cellular network to achieve both secrecy and achievable rate. The results show that optimal achievable rate can be obtained while ensuring expected secrecy using this approach.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021) (2021)

Article Computer Science, Hardware & Architecture

Physical Layer based Message Authentication with Secure Channel Codes

Dajiang Chen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities

Pinchang Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

IoTShare: A Blockchain-Enabled IoT Resource Sharing On-Demand Protocol for Smart City Situation-Awareness Applications

Bechir Hamdaoui et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Opportunistic Relaying Against Eavesdropping for Internet-of-Things: A Security-Reliability Tradeoff Perspective

Xiaojin Ding et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Evaluating Critical Security Issues of the IoT World: Present and Future Challenges

Mario Frustaci et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications

Victor Sucasas et al.

COMPUTERS & SECURITY (2018)

Article Engineering, Electrical & Electronic

Secure Massive MIMO With the Artificial Noise-Aided Downlink Training

Nam-Phong Nguyen et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security

Dajiang Chen et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Physical-layer entity authentication scheme for mobile MIMO systems

Saud Althunibat et al.

IET COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation

Saud Althunibat et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Review Computer Science, Information Systems

Authentication Protocols for Internet of Things: A Comprehensive Survey

Mohamed Amine Ferrag et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Article Computer Science, Information Systems

Evaluating Secrecy Outage of Physical Layer Security in Large-Scale MIMO Wireless Communications for Cyber-Physical Systems

Danda B. Rawat et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Telecommunications

Physical-Layer Authentication for Multi-Carrier Transmission

Xiaofu Wu et al.

IEEE COMMUNICATIONS LETTERS (2015)

Article Engineering, Electrical & Electronic

Wireless Physical Layer Authentication via Fingerprint Embedding

Paul L. Yu et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Safeguarding 5G Wireless Communication Networks Using Physical Layer Security

Nan Yang et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Computer Science, Information Systems

Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios

Gunjan Verma et al.

IEEE ACCESS (2015)

Article Computer Science, Information Systems

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels

Qian Wang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2012)

Article Computer Science, Theory & Methods

MIMO Authentication via Deliberate Fingerprinting at the Physical Layer

Paul L. Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Theory & Methods

Physical-layer authentication

Paul L. Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)

Article Computer Science, Information Systems

Authentication theory and hypothesis testing

UM Maurer

IEEE TRANSACTIONS ON INFORMATION THEORY (2000)