Realizing Efficient Security and Privacy in IoT Networks
In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact t...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-05-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/9/2609 |
_version_ | 1797568935222050816 |
---|---|
author | Joseph Henry Anajemba Yue Tang Celestine Iwendi Akpesiri Ohwoekevwo Gautam Srivastava Ohyun Jo |
author_facet | Joseph Henry Anajemba Yue Tang Celestine Iwendi Akpesiri Ohwoekevwo Gautam Srivastava Ohyun Jo |
author_sort | Joseph Henry Anajemba |
collection | DOAJ |
description | In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies. |
first_indexed | 2024-03-10T20:04:00Z |
format | Article |
id | doaj.art-eade581961f848d498738b397abb10f0 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T20:04:00Z |
publishDate | 2020-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-eade581961f848d498738b397abb10f02023-11-19T23:25:29ZengMDPI AGSensors1424-82202020-05-01209260910.3390/s20092609Realizing Efficient Security and Privacy in IoT NetworksJoseph Henry Anajemba0Yue Tang1Celestine Iwendi2Akpesiri Ohwoekevwo3Gautam Srivastava4Ohyun Jo5Department of Communication Engineering, College of Internet of Things, Hohai University, Nanjing 210098, ChinaDepartment of Communication Engineering, College of Internet of Things, Hohai University, Nanjing 210098, ChinaDepartment of Electronics BCC of Central South University of Forestry and Technology, Changsha 410004, ChinaComputer Science and Technology, Xidian University, Xi’an 710126, ChinaResearch Centre of Interneural Computing, China Medical University, Taichung 404472, TaiwanDepartment of Computer Science, College of Electrical and Computer Engineering, Chungbuk National University, Cheongju-si 28644, KoreaIn recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies.https://www.mdpi.com/1424-8220/20/9/2609privacy capacityIoT5Gphysical layer securityMIMOMEjamming |
spellingShingle | Joseph Henry Anajemba Yue Tang Celestine Iwendi Akpesiri Ohwoekevwo Gautam Srivastava Ohyun Jo Realizing Efficient Security and Privacy in IoT Networks Sensors privacy capacity IoT 5G physical layer security MIMOME jamming |
title | Realizing Efficient Security and Privacy in IoT Networks |
title_full | Realizing Efficient Security and Privacy in IoT Networks |
title_fullStr | Realizing Efficient Security and Privacy in IoT Networks |
title_full_unstemmed | Realizing Efficient Security and Privacy in IoT Networks |
title_short | Realizing Efficient Security and Privacy in IoT Networks |
title_sort | realizing efficient security and privacy in iot networks |
topic | privacy capacity IoT 5G physical layer security MIMOME jamming |
url | https://www.mdpi.com/1424-8220/20/9/2609 |
work_keys_str_mv | AT josephhenryanajemba realizingefficientsecurityandprivacyiniotnetworks AT yuetang realizingefficientsecurityandprivacyiniotnetworks AT celestineiwendi realizingefficientsecurityandprivacyiniotnetworks AT akpesiriohwoekevwo realizingefficientsecurityandprivacyiniotnetworks AT gautamsrivastava realizingefficientsecurityandprivacyiniotnetworks AT ohyunjo realizingefficientsecurityandprivacyiniotnetworks |