Cross-Layer Authentication and Physical Layer Authentication in Internet-of-Things: A Systematic Literature Review

被引:1
作者
Mohaghegh, Mahsa [1 ]
Ngo, Vicky [1 ]
机构
[1] Auckland Univ Technol Auckland, Sch Engn Comp & Math Sci, Auckland, New Zealand
来源
38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024 | 2024年
关键词
authentication; cross-layer; physical layer; Internet-of-Things;
D O I
10.1109/ICOIN59985.2024.10572097
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research presents a comprehensive analysis of physical layer and cross-layer authentication schemes in the context of the Internet of Things (IoT) through a systematic literature review. The study evaluates the methods, as well as strengths and weaknesses of existing techniques in defending against prominent security threats, including eavesdropping, impersonation, and brute-force attacks. The findings underscore the challenges faced by physical layer authentication due to variations in features, rendering it unreliable despite its ability to offer enhanced security with minimal computational resources. In contrast, the integration of physical layer techniques into cross-layer authentication methods demonstrates promising results in mitigating these challenges. Despite such integration being one of the most common approaches to cross-layer authentication, we also evaluate other approaches that does not involve physical-layer authentication. There is also an emphasis on the fact that although hypothesis testing yields optimistic outcomes, assessing the impact on communication network latency, delay, and overhead in actual testbeds is essential.
引用
收藏
页码:473 / 477
页数:5
相关论文
共 50 条
  • [31] Cross-layer cooperative multichannel medium access for internet of things
    Ye Liu
    Chenglin Fan
    Hao Liu
    Qing Yang
    Shaoen Wu
    Peer-to-Peer Networking and Applications, 2018, 11 : 504 - 517
  • [32] Cross-layer cooperative multichannel medium access for internet of things
    Liu, Ye
    Fan, Chenglin
    Liu, Hao
    Yang, Qing
    Wu, Shaoen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 504 - 517
  • [33] Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective
    Liang, Yunji
    Samtani, Sagar
    Guo, Bin
    Yu, Zhiwen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 9128 - 9143
  • [34] Distributed Physical Layer Authentication: Overview and Opportunities
    Zhang, Tianhui
    Huo, Yan
    Ma, Liran
    Guo, Ela
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (01) : 134 - 140
  • [35] Improving the Covertness in the Physical-Layer Authentication
    Xie, Ning
    Hu, TianXing
    CHINA COMMUNICATIONS, 2021, 18 (03) : 122 - 131
  • [36] BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things
    Beckwith, Erin
    Thamilarasu, Geethapriya
    2020 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2020,
  • [37] Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems
    Ferdowsi, Aidin
    Saad, Walid
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (02) : 1371 - 1387
  • [38] A Reliable Physical Layer Authentication Algorithm for Massive IoT Systems
    Wang, Yupeng
    Jin, Jianfeng
    Li, Yufeng
    Choi, Chang
    IEEE ACCESS, 2020, 8 : 80684 - 80690
  • [39] Hybrid Physical-Layer Authentication
    Xie, Ning
    Zhang, Jiaheng
    Zhang, Qihong
    Tan, Haijun
    Liu, Alex X.
    Niyato, Dusit
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1295 - 1311
  • [40] Physical Layer Authentication in Spatial Modulation
    Xu, Yuntao
    Zhang, Jiaheng
    Zhang, Qihong
    Zhang, Peichang
    Huang, Lei
    Xie, Ning
    Lu, Jian
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (05) : 2947 - 2962