The University of Southampton
University of Southampton Institutional Repository

Physical layer security for the Internet of Things: authentication and key generation

Physical layer security for the Internet of Things: authentication and key generation
Physical layer security for the Internet of Things: authentication and key generation
A low-complexity, yet secure framework is proposed for protecting the Internet of Things (IoT) and for achieving both authentication and secure communication. In particular, the slight random difference among transceivers is extracted for creating a unique radio frequency fingerprint and for ascertaining the unique user identity. The wireless channel between any two users is a perfect source of randomness and can be exploited as cryptographic keys. This can be applied to the physical layer of the communications protocol stack. This article reviews these protocols and shows how they can be integrated to provide a complete IoT security framework. We conclude by outlining the future challenges in applying these compelling physical layer security techniques to the IoT.
1536-1284
92-98
Zhang, Junqing
ce554db5-7b95-4395-a0af-669c47eb5777
Rajendran, Sekhar
ef7d22ad-2a99-4eb0-ba38-a784c28361ce
Sun, Zhi
65ced0d2-316c-417e-811a-162d8eb4978d
Woods, Roger
0fd301de-e2a7-47a1-a3c1-93b9ab7eeeca
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Zhang, Junqing
ce554db5-7b95-4395-a0af-669c47eb5777
Rajendran, Sekhar
ef7d22ad-2a99-4eb0-ba38-a784c28361ce
Sun, Zhi
65ced0d2-316c-417e-811a-162d8eb4978d
Woods, Roger
0fd301de-e2a7-47a1-a3c1-93b9ab7eeeca
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1

Zhang, Junqing, Rajendran, Sekhar, Sun, Zhi, Woods, Roger and Hanzo, Lajos (2019) Physical layer security for the Internet of Things: authentication and key generation. IEEE Wireless Communications, 26 (5), 92-98. (doi:10.1109/MWC.2019.1800455).

Record type: Article

Abstract

A low-complexity, yet secure framework is proposed for protecting the Internet of Things (IoT) and for achieving both authentication and secure communication. In particular, the slight random difference among transceivers is extracted for creating a unique radio frequency fingerprint and for ascertaining the unique user identity. The wireless channel between any two users is a perfect source of randomness and can be exploited as cryptographic keys. This can be applied to the physical layer of the communications protocol stack. This article reviews these protocols and shows how they can be integrated to provide a complete IoT security framework. We conclude by outlining the future challenges in applying these compelling physical layer security techniques to the IoT.

Text
WCM PLS IoT - Accepted Manuscript
Download (2MB)

More information

Accepted/In Press date: 2 April 2019
e-pub ahead of print date: 15 May 2019
Published date: October 2019

Identifiers

Local EPrints ID: 429834
URI: http://eprints.soton.ac.uk/id/eprint/429834
ISSN: 1536-1284
PURE UUID: 9436d27d-882b-4864-8596-67cbcb990302
ORCID for Lajos Hanzo: ORCID iD orcid.org/0000-0002-2636-5214

Catalogue record

Date deposited: 08 Apr 2019 16:30
Last modified: 18 Mar 2024 02:36

Export record

Altmetrics

Contributors

Author: Junqing Zhang
Author: Sekhar Rajendran
Author: Zhi Sun
Author: Roger Woods
Author: Lajos Hanzo ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×