Cargando…

Realizing Efficient Security and Privacy in IoT Networks

In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact t...

Descripción completa

Detalles Bibliográficos
Autores principales: Anajemba, Joseph Henry, Tang, Yue, Iwendi, Celestine, Ohwoekevwo, Akpesiri, Srivastava, Gautam, Jo, Ohyun
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7249050/
https://www.ncbi.nlm.nih.gov/pubmed/32375240
http://dx.doi.org/10.3390/s20092609
_version_ 1783538513672667136
author Anajemba, Joseph Henry
Tang, Yue
Iwendi, Celestine
Ohwoekevwo, Akpesiri
Srivastava, Gautam
Jo, Ohyun
author_facet Anajemba, Joseph Henry
Tang, Yue
Iwendi, Celestine
Ohwoekevwo, Akpesiri
Srivastava, Gautam
Jo, Ohyun
author_sort Anajemba, Joseph Henry
collection PubMed
description In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies.
format Online
Article
Text
id pubmed-7249050
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-72490502020-06-10 Realizing Efficient Security and Privacy in IoT Networks Anajemba, Joseph Henry Tang, Yue Iwendi, Celestine Ohwoekevwo, Akpesiri Srivastava, Gautam Jo, Ohyun Sensors (Basel) Article In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies. MDPI 2020-05-03 /pmc/articles/PMC7249050/ /pubmed/32375240 http://dx.doi.org/10.3390/s20092609 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Anajemba, Joseph Henry
Tang, Yue
Iwendi, Celestine
Ohwoekevwo, Akpesiri
Srivastava, Gautam
Jo, Ohyun
Realizing Efficient Security and Privacy in IoT Networks
title Realizing Efficient Security and Privacy in IoT Networks
title_full Realizing Efficient Security and Privacy in IoT Networks
title_fullStr Realizing Efficient Security and Privacy in IoT Networks
title_full_unstemmed Realizing Efficient Security and Privacy in IoT Networks
title_short Realizing Efficient Security and Privacy in IoT Networks
title_sort realizing efficient security and privacy in iot networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7249050/
https://www.ncbi.nlm.nih.gov/pubmed/32375240
http://dx.doi.org/10.3390/s20092609
work_keys_str_mv AT anajembajosephhenry realizingefficientsecurityandprivacyiniotnetworks
AT tangyue realizingefficientsecurityandprivacyiniotnetworks
AT iwendicelestine realizingefficientsecurityandprivacyiniotnetworks
AT ohwoekevwoakpesiri realizingefficientsecurityandprivacyiniotnetworks
AT srivastavagautam realizingefficientsecurityandprivacyiniotnetworks
AT joohyun realizingefficientsecurityandprivacyiniotnetworks