TY - JOUR
T1 - Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection
T2 - A Paradigm Shift in Securing IoT Networks
AU - Illi, Elmehdi
AU - Qaraqe, Marwa
AU - Althunibat, Saud
AU - Alhasanat, Abdullah
AU - Alsafasfeh, Moath
AU - De Ree, Marcus
AU - Mantas, Georgios
AU - Rodriguez, Jonathan
AU - Aman, Waqas
AU - Al-Kuwari, Saif
N1 - Publisher Copyright:
© 1998-2012 IEEE.
PY - 2024/10/25
Y1 - 2024/10/25
N2 - The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to reach significant levels with the upcoming sixth generation of mobile networks (6G). Throughout the past years, wireless standardization units worldwide have been prominently active in the deployment and performance optimization of such IoT networks and fusing them with current and futuristic cellular networks. Nonetheless, the openness of wireless transmissions and the forecasted overwhelm in connected devices will provoke unprecedented security leakages and vulnerabilities. In addition to the key targets of the 6G and IoT, it has been of paramount importance to cater to decent and lightweight security mechanisms in ultra-massively connected heterogeneous networks. Recently, significant efforts have been made to pave the way for the integration of physical layer security (PLS) in contemporary and futuristic networks. The primary motivation behind its deployment resides in its low complexity and ability to provide information-theoretic secure transmissions, which alleviates the complexity burden caused by implementing complex cryptographic schemes. This survey overviews the recent advancement in PLS techniques with a particular interest in its application to the Internet of Things (IoT). We review essentially recent PLS techniques aiming at ensuring message confidentiality along with node/message authentication and malicious nodes' detection, where their corresponding application scenarios and underlying pros and cons are discussed. On top of that, we explore recent findings in the incorporation of cutting-edge technologies at the physical layer, such as non-orthogonal multiple-access, reconfigurable intelligent surfaces, joint communication and sensing, and optical wireless/Terahertz communications in boosting confidentiality and authentication at the physical layer. Lastly, promising extensions and future directions are discussed based on the quantified pros and cons of each PLS category, opening up ways for timely research directions within the topic and current/future challenges faced by PLS.
AB - The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to reach significant levels with the upcoming sixth generation of mobile networks (6G). Throughout the past years, wireless standardization units worldwide have been prominently active in the deployment and performance optimization of such IoT networks and fusing them with current and futuristic cellular networks. Nonetheless, the openness of wireless transmissions and the forecasted overwhelm in connected devices will provoke unprecedented security leakages and vulnerabilities. In addition to the key targets of the 6G and IoT, it has been of paramount importance to cater to decent and lightweight security mechanisms in ultra-massively connected heterogeneous networks. Recently, significant efforts have been made to pave the way for the integration of physical layer security (PLS) in contemporary and futuristic networks. The primary motivation behind its deployment resides in its low complexity and ability to provide information-theoretic secure transmissions, which alleviates the complexity burden caused by implementing complex cryptographic schemes. This survey overviews the recent advancement in PLS techniques with a particular interest in its application to the Internet of Things (IoT). We review essentially recent PLS techniques aiming at ensuring message confidentiality along with node/message authentication and malicious nodes' detection, where their corresponding application scenarios and underlying pros and cons are discussed. On top of that, we explore recent findings in the incorporation of cutting-edge technologies at the physical layer, such as non-orthogonal multiple-access, reconfigurable intelligent surfaces, joint communication and sensing, and optical wireless/Terahertz communications in boosting confidentiality and authentication at the physical layer. Lastly, promising extensions and future directions are discussed based on the quantified pros and cons of each PLS category, opening up ways for timely research directions within the topic and current/future challenges faced by PLS.
KW - Eavesdropping
KW - Internet of Things
KW - intrusion
KW - malicious nodes detection
KW - physical layer authentication
KW - physical layer key establishment
KW - physical layer security
KW - radio-frequency fingerprinting
UR - http://www.scopus.com/inward/record.url?scp=85176354619&partnerID=8YFLogxK
U2 - 10.1109/COMST.2023.3327327
DO - 10.1109/COMST.2023.3327327
M3 - Article
AN - SCOPUS:85176354619
SN - 1553-877X
VL - 26
SP - 347
EP - 388
JO - IEEE Communications Surveys and Tutorials
JF - IEEE Communications Surveys and Tutorials
IS - 1
ER -