Realizing Efficient Security and Privacy in IoT Networks

In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact t...

Full description

Bibliographic Details
Main Authors: Joseph Henry Anajemba, Yue Tang, Celestine Iwendi, Akpesiri Ohwoekevwo, Gautam Srivastava, Ohyun Jo
Format: Article
Language:English
Published: MDPI AG 2020-05-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/9/2609
_version_ 1797568935222050816
author Joseph Henry Anajemba
Yue Tang
Celestine Iwendi
Akpesiri Ohwoekevwo
Gautam Srivastava
Ohyun Jo
author_facet Joseph Henry Anajemba
Yue Tang
Celestine Iwendi
Akpesiri Ohwoekevwo
Gautam Srivastava
Ohyun Jo
author_sort Joseph Henry Anajemba
collection DOAJ
description In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies.
first_indexed 2024-03-10T20:04:00Z
format Article
id doaj.art-eade581961f848d498738b397abb10f0
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T20:04:00Z
publishDate 2020-05-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-eade581961f848d498738b397abb10f02023-11-19T23:25:29ZengMDPI AGSensors1424-82202020-05-01209260910.3390/s20092609Realizing Efficient Security and Privacy in IoT NetworksJoseph Henry Anajemba0Yue Tang1Celestine Iwendi2Akpesiri Ohwoekevwo3Gautam Srivastava4Ohyun Jo5Department of Communication Engineering, College of Internet of Things, Hohai University, Nanjing 210098, ChinaDepartment of Communication Engineering, College of Internet of Things, Hohai University, Nanjing 210098, ChinaDepartment of Electronics BCC of Central South University of Forestry and Technology, Changsha 410004, ChinaComputer Science and Technology, Xidian University, Xi’an 710126, ChinaResearch Centre of Interneural Computing, China Medical University, Taichung 404472, TaiwanDepartment of Computer Science, College of Electrical and Computer Engineering, Chungbuk National University, Cheongju-si 28644, KoreaIn recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies.https://www.mdpi.com/1424-8220/20/9/2609privacy capacityIoT5Gphysical layer securityMIMOMEjamming
spellingShingle Joseph Henry Anajemba
Yue Tang
Celestine Iwendi
Akpesiri Ohwoekevwo
Gautam Srivastava
Ohyun Jo
Realizing Efficient Security and Privacy in IoT Networks
Sensors
privacy capacity
IoT
5G
physical layer security
MIMOME
jamming
title Realizing Efficient Security and Privacy in IoT Networks
title_full Realizing Efficient Security and Privacy in IoT Networks
title_fullStr Realizing Efficient Security and Privacy in IoT Networks
title_full_unstemmed Realizing Efficient Security and Privacy in IoT Networks
title_short Realizing Efficient Security and Privacy in IoT Networks
title_sort realizing efficient security and privacy in iot networks
topic privacy capacity
IoT
5G
physical layer security
MIMOME
jamming
url https://www.mdpi.com/1424-8220/20/9/2609
work_keys_str_mv AT josephhenryanajemba realizingefficientsecurityandprivacyiniotnetworks
AT yuetang realizingefficientsecurityandprivacyiniotnetworks
AT celestineiwendi realizingefficientsecurityandprivacyiniotnetworks
AT akpesiriohwoekevwo realizingefficientsecurityandprivacyiniotnetworks
AT gautamsrivastava realizingefficientsecurityandprivacyiniotnetworks
AT ohyunjo realizingefficientsecurityandprivacyiniotnetworks