{"title":"能源受限集成系统的物理层安全性:挑战与设计视角","authors":"Alperen Yasar;Rabia Tugce Yazicigil","doi":"10.1109/OJSSCS.2023.3327326","DOIUrl":null,"url":null,"abstract":"The expanding scale and growing connectivity of Internet of Things (IoT) devices coincide with the emergence of next-generation communication technologies. These devices serve various purposes, including communication, manufacturing, biomedical, and environmental monitoring. However, the increasing number of connected devices raises concerns about data security and integrity. Previous research has highlighted the severe consequences of security inadequacies, shown by incidents involving biomedical devices \n<xref>[1]</xref>\n, \n<xref>[2]</xref>\n, \n<xref>[3]</xref>\n as an example. Nevertheless, due to resource constraints like power, hardware complexity, and latency, digital cryptography is not universally suitable for these devices \n<xref>[4]</xref>\n, \n<xref>[5]</xref>\n, \n<xref>[6]</xref>\n. An alternative is embedding physical-layer security (PLS) measures. Diverse countermeasures within the physical layer have been explored, including wireless network security \n<xref>[4]</xref>\n, \n<xref>[5]</xref>\n, \n<xref>[6]</xref>\n, \n<xref>[7]</xref>\n, \n<xref>[8]</xref>\n, \n<xref>[9]</xref>\n and resistance against side-channel attacks (SCAs) \n<xref>[10]</xref>\n, \n<xref>[11]</xref>\n, \n<xref>[12]</xref>\n. This study reviews threat modeling for PLS, underlining its significance and emphasizing its similarities and distinctions from conventional security threat models. We then investigate two commonly employed adversarial techniques: 1) eavesdropping and 2) SCAs. This exploration involves an investigation of distinct security approaches, alongside an evaluation of their associated threat models and tradeoffs. While PLS techniques address the aforementioned resource and latency constraints, they do not universally apply to all devices. Ultralow-power or ultralow-latency devices might necessitate balancing security with performance. However, the absence of a standardized framework in the realm of PLS poses challenges for designers in comparing and selecting the most fitting approach. To conclude, this work provides suggestions for addressing current gaps and enhancing the field of PLS.","PeriodicalId":100633,"journal":{"name":"IEEE Open Journal of the Solid-State Circuits Society","volume":"3 ","pages":"262-273"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10296525","citationCount":"0","resultStr":"{\"title\":\"Physical-Layer Security for Energy-Constrained Integrated Systems: Challenges and Design Perspectives\",\"authors\":\"Alperen Yasar;Rabia Tugce Yazicigil\",\"doi\":\"10.1109/OJSSCS.2023.3327326\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The expanding scale and growing connectivity of Internet of Things (IoT) devices coincide with the emergence of next-generation communication technologies. These devices serve various purposes, including communication, manufacturing, biomedical, and environmental monitoring. However, the increasing number of connected devices raises concerns about data security and integrity. Previous research has highlighted the severe consequences of security inadequacies, shown by incidents involving biomedical devices \\n<xref>[1]</xref>\\n, \\n<xref>[2]</xref>\\n, \\n<xref>[3]</xref>\\n as an example. Nevertheless, due to resource constraints like power, hardware complexity, and latency, digital cryptography is not universally suitable for these devices \\n<xref>[4]</xref>\\n, \\n<xref>[5]</xref>\\n, \\n<xref>[6]</xref>\\n. An alternative is embedding physical-layer security (PLS) measures. Diverse countermeasures within the physical layer have been explored, including wireless network security \\n<xref>[4]</xref>\\n, \\n<xref>[5]</xref>\\n, \\n<xref>[6]</xref>\\n, \\n<xref>[7]</xref>\\n, \\n<xref>[8]</xref>\\n, \\n<xref>[9]</xref>\\n and resistance against side-channel attacks (SCAs) \\n<xref>[10]</xref>\\n, \\n<xref>[11]</xref>\\n, \\n<xref>[12]</xref>\\n. This study reviews threat modeling for PLS, underlining its significance and emphasizing its similarities and distinctions from conventional security threat models. We then investigate two commonly employed adversarial techniques: 1) eavesdropping and 2) SCAs. This exploration involves an investigation of distinct security approaches, alongside an evaluation of their associated threat models and tradeoffs. While PLS techniques address the aforementioned resource and latency constraints, they do not universally apply to all devices. Ultralow-power or ultralow-latency devices might necessitate balancing security with performance. However, the absence of a standardized framework in the realm of PLS poses challenges for designers in comparing and selecting the most fitting approach. To conclude, this work provides suggestions for addressing current gaps and enhancing the field of PLS.\",\"PeriodicalId\":100633,\"journal\":{\"name\":\"IEEE Open Journal of the Solid-State Circuits Society\",\"volume\":\"3 \",\"pages\":\"262-273\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10296525\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Open Journal of the Solid-State Circuits Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10296525/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Solid-State Circuits Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10296525/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Physical-Layer Security for Energy-Constrained Integrated Systems: Challenges and Design Perspectives
The expanding scale and growing connectivity of Internet of Things (IoT) devices coincide with the emergence of next-generation communication technologies. These devices serve various purposes, including communication, manufacturing, biomedical, and environmental monitoring. However, the increasing number of connected devices raises concerns about data security and integrity. Previous research has highlighted the severe consequences of security inadequacies, shown by incidents involving biomedical devices
[1]
,
[2]
,
[3]
as an example. Nevertheless, due to resource constraints like power, hardware complexity, and latency, digital cryptography is not universally suitable for these devices
[4]
,
[5]
,
[6]
. An alternative is embedding physical-layer security (PLS) measures. Diverse countermeasures within the physical layer have been explored, including wireless network security
[4]
,
[5]
,
[6]
,
[7]
,
[8]
,
[9]
and resistance against side-channel attacks (SCAs)
[10]
,
[11]
,
[12]
. This study reviews threat modeling for PLS, underlining its significance and emphasizing its similarities and distinctions from conventional security threat models. We then investigate two commonly employed adversarial techniques: 1) eavesdropping and 2) SCAs. This exploration involves an investigation of distinct security approaches, alongside an evaluation of their associated threat models and tradeoffs. While PLS techniques address the aforementioned resource and latency constraints, they do not universally apply to all devices. Ultralow-power or ultralow-latency devices might necessitate balancing security with performance. However, the absence of a standardized framework in the realm of PLS poses challenges for designers in comparing and selecting the most fitting approach. To conclude, this work provides suggestions for addressing current gaps and enhancing the field of PLS.