Advertisement

Internet of Things and Wireless Physical Layer Security: A Survey

Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 5)

Abstract

Internet of Things (IoT) has been a focus of research in the last decade with emphasis on the security aspects like wireless network security, communication security, sensor data security, integrity of physical signals and actuating devices. The existing security techniques are not suitable for IoT applications as the involved devices at the ground level have limited resources, low complexity, energy constraints etc. This survey analyzes various IoT concepts in terms of IoT elements, architecture and communication standards. We also analyze the existing wireless security techniques and security attacks at all the layers of the Open Systems Interconnection (OSI) model with special attention on applicability of wireless physical layer security (WPLS) techniques to achieve security for IoT devices.

Keywords

Internet of Things (IoT) Physical layer security (PLS) Wireless security techniques Communication standards Security attacks and challenges 

Notes

Acknowledgements

This work is being supported by Department of Electronics and Information Technology (DeitY), Ministry of Communications and IT, Government of India, under Visvesvaraya PhD Scheme for Electronics and IT, www.phd.medialabasia.in.

References

  1. 1.
    Shiu, Y., S., et. al.: Physical Layer Security in Wireless Networks: A Tutorial, pp. 66–74, IEEE Wireless Communications (2011)Google Scholar
  2. 2.
    Mukherjee, A.: Physical-Layer Security in the IoT: Sensing and Communication Confidentiality Under Resource Constraints, vol. 103, pp. 1747–1764, Proc. IEEE (2015)Google Scholar
  3. 3.
    Trappe, W.: The Challenges Facing Physical Layer Security, pp. 6–10, IEEE Communication Magazine (2015)Google Scholar
  4. 4.
    Al-Fuqaha, A. et al,: Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications, vol. 17, pp. 2347–2356, IEEE Comm. Surveys & Tutorials (2015)Google Scholar
  5. 5.
    Gantz, J., Reinsel, D.: The Digital Universe in 2020: Big Data, Bigger Digital Shadows, And Biggest Growth In The Far East, vol. 2007, pp. 1–16, IDC Anal. Future (2012)Google Scholar
  6. 6.
    Gigli, M., Koo, S.: Internet of Things: Services and Applications Categorization., vol. 1, pp. 27–31, Adv. Internet Things (2011)Google Scholar
  7. 7.
    Krco, S., Pokric, B., Carrez, F.: Designing IoT architecture(s): A European perspective. Proc, pp. 79–84, IEEE WF-IoT (2014)Google Scholar
  8. 8.
    Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future Internet: The IoT Architecture, Possible Applications And Key Challenges, pp. 257–260, in Proc. 10th Int. Conf. FIT (2012)Google Scholar
  9. 9.
    Yang, Z., et al.: Study and Application On The Architecture And Key Technologies for IoT.: In Proc., pp. 747–751, ICMT (2011)Google Scholar
  10. 10.
    Wu, M., Lu, T. J., Ling, F. Y., Sun, J., Du, H. Y.: Research on the Architecture of Internet of Things.: In pp. V5-484–V5-487 Proc. 3rd ICACTE (2010)Google Scholar
  11. 11.
    Granjal, J., Monteiro, E., Silva, J.: Security for the IoT: A Survey of Existing Protocols and Open Research Issues, vol. 17, pp. 1294–1312, IEEE Comm Surveys & Tut. (2015)Google Scholar
  12. 12.
    IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC Sublayer, IEEE Std. 802.15.4e-2012 (Amendment to IEEE Std. 802.15.4-2011), (2011)Google Scholar
  13. 13.
    Thubert, P. et al.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks.: RFC 6550 (2012)Google Scholar
  14. 14.
    Kolias, C., Kambourakis, G., Gritzalis, S.: Attacks and countermeasures on 802.16: Analysis and assessment, vol. 15, pp. 487–514, IEEE Comm. Surveys & Tutorials (2013)Google Scholar
  15. 15.
    Bellovin, S.: Security problems in the TCP/IP protocol suite, vol. 19, pp. 32–48, ACM SIGCOMM Computer communications Review, (1989)Google Scholar
  16. 16.
    Zargar, G., Kabiri, P.: Identification of effective network features to detect Smurf attacks.: Proc. of IEEE Student Conference on Research and Development, UPM Serdang (2009)Google Scholar
  17. 17.
    Shon, T., Choi, W.: An analysis of mobile WiMAX security: Vulnerabilities and solutions, vol. 4658, pp. 88–97, Lecture Notes in Computer Science (2007)Google Scholar
  18. 18.
    Zou, Y., Wang, X., Hanzo, L.: A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends, pp. 1–31, Proceedings of IEEE (2015)Google Scholar
  19. 19.
    Granjal, J., Monteiro, E., Silva, J.: Security in the Integration of Low-Power Wireless Sensor Networks with the Internet: A Survey, pp. 264–287, Ad Hoc Networks, Elsevier (2015)Google Scholar
  20. 20.
    Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey, vol. 54, pp. 2787–2805, Computer Networks, Elsevier (2010)Google Scholar
  21. 21.
    Pecorella, T., Brilli, L., Mucchi, L.: The Role of Physical Layer Security in IoT: A Novel Perspective, vol. 7(3), Information, MDPI (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Institute of Engineering & Technology, DAVVIndoreIndia
  2. 2.Shri Govindram Seksaria Institute of Technology and ScienceIndoreIndia

Personalised recommendations