Internet of Things and Wireless Physical Layer Security: A Survey

Internet of Things (IoT) has been a focus of research in the last decade with emphasis on the security aspects like wireless network security, communication security, sensor data security, integrity of physical signals and actuating devices. The existing security techniques are not suitable for IoT applications as the involved devices at the ground level have limited resources, low complexity, energy constraints etc. This survey analyzes various IoT concepts in terms of IoT elements, architecture and communication standards. We also analyze the existing wireless security techniques and security attacks at all the layers of the Open Systems Interconnection (OSI) model with special attention on applicability of wireless physical layer security (WPLS) techniques to achieve security for IoT devices.

[1]  François Carrez,et al.  Designing IoT architecture(s): A European perspective , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[2]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[3]  Pascal Thubert,et al.  Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL) , 2012, RFC.

[4]  Jorge Sá Silva,et al.  Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.

[5]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[6]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[7]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[8]  Lorenzo Mucchi,et al.  The Role of Physical Layer Security in IoT: A Novel Perspective , 2016, Inf..

[9]  Taeshik Shon,et al.  An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions , 2007, NBiS.

[10]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[11]  Georgios Kambourakis,et al.  Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.

[12]  Yu Yang,et al.  Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.

[13]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[14]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[15]  Peyman Kabiri,et al.  Identification of effective network features to detect Smurf attacks , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).

[16]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[17]  Simon G. M. Koo,et al.  Internet of Things: Services and Applications Categorization , 2011, Adv. Internet Things.