能源受限集成系统的物理层安全性:挑战与设计视角

Alperen Yasar;Rabia Tugce Yazicigil
{"title":"能源受限集成系统的物理层安全性:挑战与设计视角","authors":"Alperen Yasar;Rabia Tugce Yazicigil","doi":"10.1109/OJSSCS.2023.3327326","DOIUrl":null,"url":null,"abstract":"The expanding scale and growing connectivity of Internet of Things (IoT) devices coincide with the emergence of next-generation communication technologies. These devices serve various purposes, including communication, manufacturing, biomedical, and environmental monitoring. However, the increasing number of connected devices raises concerns about data security and integrity. Previous research has highlighted the severe consequences of security inadequacies, shown by incidents involving biomedical devices \n<xref>[1]</xref>\n, \n<xref>[2]</xref>\n, \n<xref>[3]</xref>\n as an example. Nevertheless, due to resource constraints like power, hardware complexity, and latency, digital cryptography is not universally suitable for these devices \n<xref>[4]</xref>\n, \n<xref>[5]</xref>\n, \n<xref>[6]</xref>\n. An alternative is embedding physical-layer security (PLS) measures. Diverse countermeasures within the physical layer have been explored, including wireless network security \n<xref>[4]</xref>\n, \n<xref>[5]</xref>\n, \n<xref>[6]</xref>\n, \n<xref>[7]</xref>\n, \n<xref>[8]</xref>\n, \n<xref>[9]</xref>\n and resistance against side-channel attacks (SCAs) \n<xref>[10]</xref>\n, \n<xref>[11]</xref>\n, \n<xref>[12]</xref>\n. This study reviews threat modeling for PLS, underlining its significance and emphasizing its similarities and distinctions from conventional security threat models. We then investigate two commonly employed adversarial techniques: 1) eavesdropping and 2) SCAs. This exploration involves an investigation of distinct security approaches, alongside an evaluation of their associated threat models and tradeoffs. While PLS techniques address the aforementioned resource and latency constraints, they do not universally apply to all devices. Ultralow-power or ultralow-latency devices might necessitate balancing security with performance. However, the absence of a standardized framework in the realm of PLS poses challenges for designers in comparing and selecting the most fitting approach. To conclude, this work provides suggestions for addressing current gaps and enhancing the field of PLS.","PeriodicalId":100633,"journal":{"name":"IEEE Open Journal of the Solid-State Circuits Society","volume":"3 ","pages":"262-273"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10296525","citationCount":"0","resultStr":"{\"title\":\"Physical-Layer Security for Energy-Constrained Integrated Systems: Challenges and Design Perspectives\",\"authors\":\"Alperen Yasar;Rabia Tugce Yazicigil\",\"doi\":\"10.1109/OJSSCS.2023.3327326\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The expanding scale and growing connectivity of Internet of Things (IoT) devices coincide with the emergence of next-generation communication technologies. These devices serve various purposes, including communication, manufacturing, biomedical, and environmental monitoring. However, the increasing number of connected devices raises concerns about data security and integrity. Previous research has highlighted the severe consequences of security inadequacies, shown by incidents involving biomedical devices \\n<xref>[1]</xref>\\n, \\n<xref>[2]</xref>\\n, \\n<xref>[3]</xref>\\n as an example. Nevertheless, due to resource constraints like power, hardware complexity, and latency, digital cryptography is not universally suitable for these devices \\n<xref>[4]</xref>\\n, \\n<xref>[5]</xref>\\n, \\n<xref>[6]</xref>\\n. An alternative is embedding physical-layer security (PLS) measures. Diverse countermeasures within the physical layer have been explored, including wireless network security \\n<xref>[4]</xref>\\n, \\n<xref>[5]</xref>\\n, \\n<xref>[6]</xref>\\n, \\n<xref>[7]</xref>\\n, \\n<xref>[8]</xref>\\n, \\n<xref>[9]</xref>\\n and resistance against side-channel attacks (SCAs) \\n<xref>[10]</xref>\\n, \\n<xref>[11]</xref>\\n, \\n<xref>[12]</xref>\\n. This study reviews threat modeling for PLS, underlining its significance and emphasizing its similarities and distinctions from conventional security threat models. We then investigate two commonly employed adversarial techniques: 1) eavesdropping and 2) SCAs. This exploration involves an investigation of distinct security approaches, alongside an evaluation of their associated threat models and tradeoffs. While PLS techniques address the aforementioned resource and latency constraints, they do not universally apply to all devices. Ultralow-power or ultralow-latency devices might necessitate balancing security with performance. However, the absence of a standardized framework in the realm of PLS poses challenges for designers in comparing and selecting the most fitting approach. To conclude, this work provides suggestions for addressing current gaps and enhancing the field of PLS.\",\"PeriodicalId\":100633,\"journal\":{\"name\":\"IEEE Open Journal of the Solid-State Circuits Society\",\"volume\":\"3 \",\"pages\":\"262-273\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10296525\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Open Journal of the Solid-State Circuits Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10296525/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Solid-State Circuits Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10296525/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着下一代通信技术的出现,物联网(IoT)设备的规模不断扩大,连接性不断增强。这些设备具有各种用途,包括通信、制造、生物医学和环境监测。然而,越来越多的联网设备引发了人们对数据安全性和完整性的担忧。以往的研究已经强调了安全不足所带来的严重后果,生物医学设备事故[1]、[2]、[3]就是一个例子。然而,由于电力、硬件复杂性和延迟等资源限制,数字加密技术并不普遍适用于这些设备 [4]、[5]、[6]。一种替代方法是嵌入物理层安全(PLS)措施。人们探索了物理层内的各种对策,包括无线网络安全 [4]、[5]、[6]、[7]、[8]、[9] 和抵御侧信道攻击 (SCA) [10]、[11]、[12]。本研究回顾了 PLS 的威胁建模,强调了其重要性,并强调了其与传统安全威胁模型的相似之处和不同之处。然后,我们将研究两种常用的对抗技术:1) 窃听和 2) SCA。这一探讨涉及对不同安全方法的研究,以及对其相关威胁模型和权衡的评估。虽然 PLS 技术可以解决上述资源和延迟限制问题,但它们并非普遍适用于所有设备。超低功耗或超低延时设备可能需要兼顾安全性和性能。然而,由于 PLS 领域缺乏标准化框架,设计人员在比较和选择最合适的方法时面临挑战。总之,这项工作为解决目前的差距和加强 PLS 领域提供了建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Physical-Layer Security for Energy-Constrained Integrated Systems: Challenges and Design Perspectives
The expanding scale and growing connectivity of Internet of Things (IoT) devices coincide with the emergence of next-generation communication technologies. These devices serve various purposes, including communication, manufacturing, biomedical, and environmental monitoring. However, the increasing number of connected devices raises concerns about data security and integrity. Previous research has highlighted the severe consequences of security inadequacies, shown by incidents involving biomedical devices [1] , [2] , [3] as an example. Nevertheless, due to resource constraints like power, hardware complexity, and latency, digital cryptography is not universally suitable for these devices [4] , [5] , [6] . An alternative is embedding physical-layer security (PLS) measures. Diverse countermeasures within the physical layer have been explored, including wireless network security [4] , [5] , [6] , [7] , [8] , [9] and resistance against side-channel attacks (SCAs) [10] , [11] , [12] . This study reviews threat modeling for PLS, underlining its significance and emphasizing its similarities and distinctions from conventional security threat models. We then investigate two commonly employed adversarial techniques: 1) eavesdropping and 2) SCAs. This exploration involves an investigation of distinct security approaches, alongside an evaluation of their associated threat models and tradeoffs. While PLS techniques address the aforementioned resource and latency constraints, they do not universally apply to all devices. Ultralow-power or ultralow-latency devices might necessitate balancing security with performance. However, the absence of a standardized framework in the realm of PLS poses challenges for designers in comparing and selecting the most fitting approach. To conclude, this work provides suggestions for addressing current gaps and enhancing the field of PLS.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信