Securing the Physical Layer in the OFDM-Based Internet of Things (IoT) by Using Frequency Hopping Technique

Securing the Physical Layer in the OFDM-Based Internet of Things (IoT) by Using Frequency Hopping Technique

Ali Subhi Alsadi, Seshadri Mohan
DOI: 10.4018/IJITN.2021070105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The physical layer security in the context of the internet of things is still one of the challenges due to the resource constraints of the end terminals and the IoT network heterogeneity. Although it has been adopted by different wireless applications due to its high spectral efficiency, the OFDM physical layer remains a challenge. The frequency hopping technique is used to protect the nodes from jamming and eavesdropping attacks. The cyclic prefix manipulation has been simulated against different time-delayed paths and the simulated results compared to the theoretical ones. The comparison shows a close match and the guard width encryption mechanism worked as desired.
Article Preview
Top

Introduction

The inheritance of the wireless broadcasting property leaves it exposed to eavesdropper attacks. The classical method to protect a wireless network’s upper layer is by using cryptography, but this method has not been proven as a rigid technique against passive eavesdropper’s attacks. Thus, a physical layer of security may be utilized to add built-in protection to the orthogonal frequency division multiplexing (OFDM) at no cost. The physical layer of security would allow communicating parties to exchange confidential information over a wireless medium, leaving an intruder nothing to hearing but noise. One of the goals of the next generation of mobile communications is to support different multiple-access schemes (Kumar & Gupta, 2018). Undoubtedly, the orthogonal frequency division multiple access (OFDMA) would be one of these schemes due to its high spectral efficiency (Lightfoot et al, 2009). OFDM is a form of multicarrier modulation which divides a high data rate modulating stream into multi-carrier lower modulated data rate streams using a different kind of digital modulation method (Zhang, 2010). Since the nodes are small, have no complex computational ability, are low in cost, and have limited power, it is not practical to have the OFDM transceiver built inside the node. Thus, the authors propose a new design to apply the OFDM system in IoT networks.

Unfortunately, the OFDM does not provide any security in its internal structure, which means that it’s physical layer can be intercepted by adversaries, making the OFDM vulnerable to eavesdropping attacks. Therefore, comprehensive research has been conducted to investigate the secrecy in multicarrier communication and OFDM (Jeong & Kim, 2011; Renna et al, 2010); Renna et al, 2011; Vishwakarma & Chockalingam, 2014). However, only a few research efforts have investigated the OFDM secrecy in IoT (Choi, 2017; Olfat & Bengtsson, 2017). Recently, research has been done to combine the frequency hopping (FH) technique with OFDM to add anti-jamming and anti-perception capabilities to the new systems (Lightfoot et al, 2009; Sari et al, 1997).

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 1 Issue (2022)
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing