Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

Cyber threats to industrial IoT: a survey on attacks and countermeasures

K Tsiknas, D Taketzis, K Demertzis, C Skianis - IoT, 2021 - mdpi.com
In today's Industrial Internet of Things (IIoT) environment, where different systems interact
with the physical world, the state proposed by the Industry 4.0 standards can lead to …

A comprehensive review of architecture, communication, and cybersecurity in networked microgrid systems

A Aghmadi, H Hussein, KH Polara, O Mohammed - Inventions, 2023 - mdpi.com
Networked microgrids (NMGs) are developing as a viable approach for integrating an
expanding number of distributed energy resources (DERs) while improving energy system …

A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions

TT Khoei, HO Slimane, N Kaabouch - arXiv preprint arXiv:2207.07738, 2022 - arxiv.org
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …

Index Modulation Based Key Exchange Scheme for Internet of Things Networks

T Alshamaseen, S Althunibat, M Qaraqe… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The pervasiveness of the Internet of Things (IoT) in our daily lives has been remarkably
increasing over the past years. Due to their massive connectivity and limited resources …

Mimicking DH Key Exchange Over a Full Duplex Wireless Channel via Bisparse Blind Deconvolution

G Wunder, A Flinth, D Becker… - 2023 6th International …, 2023 - ieeexplore.ieee.org
Secret key generation between authenticated devices is a pivotal task for secure
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …

Data confidentiality for IoT networks: cryptographic gaps and physical-layer opportunities

M de Ree, G Mantas, J Rodriguez… - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
The conventional solution for providing data confidentiality is by means of encryption (a
branch of cryptography). However, encryption schemes are generally designed to provide a …

Communication Channel Anonymity

S Raponi, G Oligeri - Encyclopedia of Cryptography, Security and Privacy, 2022 - Springer
Communication Channel Anonymity Page 1 C Communication Channel Anonymity Simone
Raponi and Gabriele Oligeri Division of Information and Computing Technology, College of …

AI-Driven Detection of Cybersecurity-Related Patterns

S Raponi - 2021 - search.proquest.com
The considerable increase in the number of attacks and online violations in recent years
highlighted how security is more often considered a feature than a necessity. Indeed, most of …