Physical layer security for the Internet of Things: authentication and key generation
Physical layer security for the Internet of Things: authentication and key generation
A low-complexity, yet secure framework is proposed for protecting the Internet of Things (IoT) and for achieving both authentication and secure communication. In particular, the slight random difference among transceivers is extracted for creating a unique radio frequency fingerprint and for ascertaining the unique user identity. The wireless channel between any two users is a perfect source of randomness and can be exploited as cryptographic keys. This can be applied to the physical layer of the communications protocol stack. This article reviews these protocols and shows how they can be integrated to provide a complete IoT security framework. We conclude by outlining the future challenges in applying these compelling physical layer security techniques to the IoT.
92-98
Zhang, Junqing
ce554db5-7b95-4395-a0af-669c47eb5777
Rajendran, Sekhar
ef7d22ad-2a99-4eb0-ba38-a784c28361ce
Sun, Zhi
65ced0d2-316c-417e-811a-162d8eb4978d
Woods, Roger
0fd301de-e2a7-47a1-a3c1-93b9ab7eeeca
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
October 2019
Zhang, Junqing
ce554db5-7b95-4395-a0af-669c47eb5777
Rajendran, Sekhar
ef7d22ad-2a99-4eb0-ba38-a784c28361ce
Sun, Zhi
65ced0d2-316c-417e-811a-162d8eb4978d
Woods, Roger
0fd301de-e2a7-47a1-a3c1-93b9ab7eeeca
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Zhang, Junqing, Rajendran, Sekhar, Sun, Zhi, Woods, Roger and Hanzo, Lajos
(2019)
Physical layer security for the Internet of Things: authentication and key generation.
IEEE Wireless Communications, 26 (5), .
(doi:10.1109/MWC.2019.1800455).
Abstract
A low-complexity, yet secure framework is proposed for protecting the Internet of Things (IoT) and for achieving both authentication and secure communication. In particular, the slight random difference among transceivers is extracted for creating a unique radio frequency fingerprint and for ascertaining the unique user identity. The wireless channel between any two users is a perfect source of randomness and can be exploited as cryptographic keys. This can be applied to the physical layer of the communications protocol stack. This article reviews these protocols and shows how they can be integrated to provide a complete IoT security framework. We conclude by outlining the future challenges in applying these compelling physical layer security techniques to the IoT.
Text
WCM PLS IoT
- Accepted Manuscript
More information
Accepted/In Press date: 2 April 2019
e-pub ahead of print date: 15 May 2019
Published date: October 2019
Identifiers
Local EPrints ID: 429834
URI: http://eprints.soton.ac.uk/id/eprint/429834
ISSN: 1536-1284
PURE UUID: 9436d27d-882b-4864-8596-67cbcb990302
Catalogue record
Date deposited: 08 Apr 2019 16:30
Last modified: 18 Mar 2024 02:36
Export record
Altmetrics
Contributors
Author:
Junqing Zhang
Author:
Sekhar Rajendran
Author:
Zhi Sun
Author:
Roger Woods
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics