[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3288599.3288643acmconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Fundamentals for IoT networks: secure and low-latency communications

Published: 04 January 2019 Publication History

Abstract

The emerging Internet of Things (IoT) has several salient characteristics that differentiate it from existing wireless networking architectures. These include the deployment of very large numbers of (possibly) low-complexity terminals; the need for low-latency, short-packet communications (e.g., to support automation); light or no infrastructure; and primary applications of data gathering, inference and control. These characteristics have motivated the development of new fundamentals that can provide insights into the limits of communication in this regime. This paper discusses two issues in this context, namely security and low-latency, through the respective lenses of physical layer security and finite-blocklength information theory.

References

[1]
G. Fettweis and S. Alamouti "5G: Personal Mobile Internet Beyond What Cellular Did to Telephony," IEEE Communications Magazine, Vol. 52, No. 2, pp. 140 -- 145, February 2014.
[2]
K. Pretz, "Tech Topic: Smart Sensors - Making the Internet of Things Soar," The Institute, pp. 6 -- 7, March 2014.
[3]
A. D. Wyner, "The Wire-tap Channel," The Bell System Technical Journal, Vol. 54, No. 8, pp. 1355 --1387, October 1975.
[4]
M. Bloch and J. Barros, Physical-Layer Security - From Information Theory to Security Engineering, (Cambridge University Press, Cambridge, UK, 2011).
[5]
H. V. Poor and R. F. Schaefer, "Wireless Physical Layer Security," Proceedings of the National Academy of Sciences of the USA, Vol. 114, No.1, pp. 19 -- 26, January 3, 2017.
[6]
A. Mukherjee, "Physical-layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints," Proceedings of the IEEE, Vol. 103, No. 10, pp. 1747 --1761, October 2015.
[7]
Y. Polyanskiy, H. V. Poor and S. Verdú, "Channel Coding Rate in the Finite Blocklength Regime," IEEE Transactions on Information Theory, Vol. 56, No. 5, pp. 2307 -- 2359, May 2010.
[8]
W. Yang, R. F. Schaefer and H. V. Poor, "Finite-Blocklength Bounds for Wiretap Channels," Proceedings of the 2016 IEEE International Symposium on Information Theory, Barcelona, Spain, July 10 -- 15, 2016.
[9]
W. Yang, R. F. Schaefer and H. V. Poor, "Secrecy-Reliability Tradeoff for Semi-Deterministic Wiretap Channels at Finite Blocklength," Proceedings of the 2017 IEEE International Symposium on Information Theory, Aachen, Germany, June 25 -- 30, 2017.
[10]
J. Zhang, R. S. Blum and H. V. Poor, "Approaches to Secure Inference in the Internet of Things," IEEE Signal Processing Magazine, Vol. 35, No. 5, pp. 50 --63, September 2018.
[11]
M. Goldenbaum, H. Boche and H. V. Poor, "Secure Computation of Linear Functions Over Linear Discrete Multiple-Access Wiretap Channels," Proceedings of the 50th Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, November 6 -- 9, 2016.
[12]
Y. Y. Shkel, R. S. Blum and H. V. Poor, "Secure Lossless Compression," Proceedings of the 52nd Annual Conference on Information Systems and Sciences, Princeton, NJ, USA, March 21 -- 23, 2018.
[13]
V. Kostina and S. Verdú, "Lossy Joint Source-channel Coding in the Finite Blocklength Regime," IEEE Transactions on Information Theory, Vol. 59, No. 5, pp. 2545 -- 2575, May 2013.

Cited By

View all
  • (2024)An Optimization Strategy for Security and Reliability in a Diamond Untrusted Relay Network with Cooperative JammingNetwork10.3390/network40400204:4(405-425)Online publication date: 25-Sep-2024
  • (2024)A Study on a Code Assisted Based Blind Timing Synchronization Technique for Short Data Packets2024 13th International Conference on Communications, Circuits and Systems (ICCCAS)10.1109/ICCCAS62034.2024.10652746(397-401)Online publication date: 10-May-2024
  • (2023)Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective FadingIEEE Transactions on Vehicular Technology10.1109/TVT.2022.322272972:4(4598-4614)Online publication date: Apr-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and Networking
January 2019
535 pages
ISBN:9781450360944
DOI:10.1145/3288599
  • General Chairs:
  • R. C. Hansdah,
  • Dilip Krishnaswamy,
  • Nitin Vaidya
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 January 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. finite-blocklength information theory
  2. internet-of-things
  3. physical-layer security
  4. short-packet communications

Qualifiers

  • Research-article

Conference

ICDCN '19
Sponsor:
  • SIGOPS
  • Indian Institute of Science

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)An Optimization Strategy for Security and Reliability in a Diamond Untrusted Relay Network with Cooperative JammingNetwork10.3390/network40400204:4(405-425)Online publication date: 25-Sep-2024
  • (2024)A Study on a Code Assisted Based Blind Timing Synchronization Technique for Short Data Packets2024 13th International Conference on Communications, Circuits and Systems (ICCCAS)10.1109/ICCCAS62034.2024.10652746(397-401)Online publication date: 10-May-2024
  • (2023)Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective FadingIEEE Transactions on Vehicular Technology10.1109/TVT.2022.322272972:4(4598-4614)Online publication date: Apr-2023
  • (2023)On the Effect of Phase Error on Physical Layer Security of RIS-Aided NOMA Network2023 National Conference on Communications (NCC)10.1109/NCC56989.2023.10068041(1-6)Online publication date: 23-Feb-2023
  • (2023)Reliable and Secure Short-Packet Communications in Untrusted Diamond Relay NetworksIEEE Access10.1109/ACCESS.2023.325588111(24686-24695)Online publication date: 2023
  • (2022)Joint Semi-Blind Self-Interference Cancellation and Equalisation Processes in 5G QC-LDPC-Encoded Short-Packet Full-Duplex TransmissionsSensors10.3390/s2206220422:6(2204)Online publication date: 11-Mar-2022
  • (2022)Reliable and Secure Short-Packet CommunicationsIEEE Transactions on Wireless Communications10.1109/TWC.2021.310804221:3(1913-1926)Online publication date: Mar-2022
  • (2021)Secure Short-Packet Communications at the Physical Layer for 5G and BeyondIEEE Communications Standards Magazine10.1109/MCOMSTD.121.21000285:3(96-102)Online publication date: Sep-2021
  • (2021)On the Secure Spectral Efficiency of URLLC With Randomly Located Colluding EavesdroppersIEEE Internet of Things Journal10.1109/JIOT.2021.30715918:19(14672-14682)Online publication date: 1-Oct-2021
  • (2021)Lightweight Cryptographic Protocols for IoT-Constrained Devices: A SurveyIEEE Internet of Things Journal10.1109/JIOT.2020.30264938:6(4132-4156)Online publication date: 15-Mar-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media