Security Comparison of Powerline Communication and Wi-Fi Technologies for Internet of Things
-д хадгалсан:
| -д хэвлэсэн: | European Conference on Cyber Warfare and Security (Jun 2025), p. 105-110 |
|---|---|
| Үндсэн зохиолч: | |
| Бусад зохиолчид: | , |
| Хэвлэсэн: |
Academic Conferences International Limited
|
| Нөхцлүүд: | |
| Онлайн хандалт: | Citation/Abstract Full Text Full Text - PDF |
| Шошгууд: |
Шошго байхгүй, Энэхүү баримтыг шошголох эхний хүн болох!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3244089490 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 3244089490 | ||
| 045 | 2 | |b d20250601 |b d20250630 | |
| 084 | |a 142231 |2 nlm | ||
| 100 | 1 | |a Dimmitt, Jacob | |
| 245 | 1 | |a Security Comparison of Powerline Communication and Wi-Fi Technologies for Internet of Things | |
| 260 | |b Academic Conferences International Limited |c Jun 2025 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a With the rise of system automation, more devices require intelligence and communication capabilities with a network, which is commonly provided via Internet of Things (IoT) devices. Providing communication stack security for these networks becomes increasingly challenging as the expectations of the systems increase. This paper reviews the current status of physical security network technology and explores innovations made in the past five years to identify and solve cyber vulnerabilities in a variety of contexts and then relates them back to loT applications. These networked devices are often produced as simply and cheaply as technically feasible, which results in them lacking computational capacity, robust networking hardware and inherent security measures. The review focuses on two main technologies, WiFi and Powerline communications (PLC), to compare research on guided and un-guided media. These technologies can both be considered shared, as it is typical for multiple users to be expected to utilize a shared channel. This means both mediums are vulnerable to wireless jamming, but the effectiveness of this varies greatly based on factors such as the environment, cable shielding and transceiver distance. Similarly, the propagation of signals from the two technologies jeopardizes the potential privacy of communications by leaving them vulnerable to various means of eavesdropping. This can be addressed by using methods such as encryption, which is usually implemented at higher layers of the communication stack to provide confidentiality but can also be applied at the physical layer. Encryption also has the challenge of ensuring key exchange occurs securely which requires unique solutions when the limits of loT devices are considered. Eavesdropping can also be defeated by controlling the signal-to-noise ratio that is presented to unintended receivers. Additionally, methods of device fingerprinting are being developed to create more robust authentication regimes between devices. Several research opportunities have been proposed where new concepts in one medium are applied to the other. | |
| 653 | |a Receivers & amplifiers | ||
| 653 | |a Encryption | ||
| 653 | |a Eavesdropping | ||
| 653 | |a Internet of Things | ||
| 653 | |a Fingerprinting | ||
| 653 | |a Radio frequency | ||
| 653 | |a Communication | ||
| 653 | |a Confidentiality | ||
| 653 | |a Devices | ||
| 653 | |a Robustness (mathematics) | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Jamming | ||
| 653 | |a Wireless access points | ||
| 653 | |a Signal to noise ratio | ||
| 653 | |a Security | ||
| 653 | |a Internet | ||
| 653 | |a Automation | ||
| 653 | |a Technological change | ||
| 653 | |a Mass media | ||
| 653 | |a Telecommunications | ||
| 653 | |a Wireless internet | ||
| 653 | |a Vulnerability | ||
| 653 | |a Data encryption | ||
| 653 | |a Networks | ||
| 653 | |a Intelligence | ||
| 653 | |a Computer mediated communication | ||
| 653 | |a Innovations | ||
| 653 | |a Wireless communication systems | ||
| 653 | |a Cryptography | ||
| 653 | |a Privacy | ||
| 653 | |a Networking | ||
| 700 | 1 | |a Reith, Mark | |
| 700 | 1 | |a Neal, Derek | |
| 773 | 0 | |t European Conference on Cyber Warfare and Security |g (Jun 2025), p. 105-110 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3244089490/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3244089490/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3244089490/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |