Cross-Layer Authentication and Physical Layer Authentication in Internet-of-Things: A Systematic Literature Review

被引:1
作者
Mohaghegh, Mahsa [1 ]
Ngo, Vicky [1 ]
机构
[1] Auckland Univ Technol Auckland, Sch Engn Comp & Math Sci, Auckland, New Zealand
来源
38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024 | 2024年
关键词
authentication; cross-layer; physical layer; Internet-of-Things;
D O I
10.1109/ICOIN59985.2024.10572097
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research presents a comprehensive analysis of physical layer and cross-layer authentication schemes in the context of the Internet of Things (IoT) through a systematic literature review. The study evaluates the methods, as well as strengths and weaknesses of existing techniques in defending against prominent security threats, including eavesdropping, impersonation, and brute-force attacks. The findings underscore the challenges faced by physical layer authentication due to variations in features, rendering it unreliable despite its ability to offer enhanced security with minimal computational resources. In contrast, the integration of physical layer techniques into cross-layer authentication methods demonstrates promising results in mitigating these challenges. Despite such integration being one of the most common approaches to cross-layer authentication, we also evaluate other approaches that does not involve physical-layer authentication. There is also an emphasis on the fact that although hypothesis testing yields optimistic outcomes, assessing the impact on communication network latency, delay, and overhead in actual testbeds is essential.
引用
收藏
页码:473 / 477
页数:5
相关论文
共 50 条
  • [41] FAN: Framework for Authentication of Nodes in Mobile Adhoc Environment of Internet-of-Things
    Anil, G. N.
    SOFTWARE ENGINEERING AND ALGORITHMS IN INTELLIGENT SYSTEMS, 2019, 763 : 56 - 65
  • [42] An Enhanced Cross-Layer Authentication Mechanism for Wireless Communications Based on PER and RSSI
    Hao, Peng
    Wang, Xianbin
    Refaey, Ahmed
    2013 13TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2013, : 44 - 48
  • [43] A cross-layer authentication design for secure video transportation in wireless sensor network
    Wang J.
    Smith G.L.
    International Journal of Security and Networks, 2010, 5 (01) : 63 - 76
  • [44] A cross-layer approach to message authentication based on sparse representation for wireless body area networks
    Wang, Ning
    Li, Weiwei
    Jiang, Ting
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (03):
  • [45] Physical Layer Security of Cognitive Ambient Backscatter Communications for Green Internet-of-Things
    Li, Xingwang
    Zheng, Yike
    Khan, Wali Ullah
    Zeng, Ming
    Li, Dong
    Ragesh, G. K.
    Li, Lihua
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (03): : 1066 - 1076
  • [46] Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
    Kamarudin, Nazhatul Hafizah
    Suhaimi, Nur Hanis Sabrina
    Nor Rashid, Fadilla Atyka
    Khalid, Mohd Nor Akmal
    Mohd Ali, Fazlina
    SYMMETRY-BASEL, 2024, 16 (02):
  • [47] Physical Layer Authentication Scheme in Beamspace MIMO Systems
    Afeef, Liza
    Furqan, Haji M.
    Arslan, Huseyin
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (07) : 1484 - 1488
  • [48] EsaNet: Environment Semantics Enabled Physical Layer Authentication
    Gao, Ning
    Huang, Qiying
    Li, Cen
    Jin, Shi
    Matthaiou, Michail
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2024, 13 (01) : 178 - 182
  • [49] A review and implementation of physical layer channel key generation in the Internet of Things
    Zhao, Hong
    Guo, Enting
    Lian, Zhuotao
    Zhao, Yong
    Huang, Xinyi
    Su, Chunhua
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [50] A Lightweight Signcryption Method for Perception Layer in Internet-of-Things
    Kumar, Ashish
    Saha, Rahul
    Alazab, Mamoun
    Kumar, Gulshan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55 (55)