Security Comparison of Powerline Communication and Wi-Fi Technologies for Internet of Things

-д хадгалсан:
Номзүйн дэлгэрэнгүй
-д хэвлэсэн:European Conference on Cyber Warfare and Security (Jun 2025), p. 105-110
Үндсэн зохиолч: Dimmitt, Jacob
Бусад зохиолчид: Reith, Mark, Neal, Derek
Хэвлэсэн:
Academic Conferences International Limited
Нөхцлүүд:
Онлайн хандалт:Citation/Abstract
Full Text
Full Text - PDF
Шошгууд: Шошго нэмэх
Шошго байхгүй, Энэхүү баримтыг шошголох эхний хүн болох!

MARC

LEADER 00000nab a2200000uu 4500
001 3244089490
003 UK-CbPIL
035 |a 3244089490 
045 2 |b d20250601  |b d20250630 
084 |a 142231  |2 nlm 
100 1 |a Dimmitt, Jacob 
245 1 |a Security Comparison of Powerline Communication and Wi-Fi Technologies for Internet of Things 
260 |b Academic Conferences International Limited  |c Jun 2025 
513 |a Conference Proceedings 
520 3 |a With the rise of system automation, more devices require intelligence and communication capabilities with a network, which is commonly provided via Internet of Things (IoT) devices. Providing communication stack security for these networks becomes increasingly challenging as the expectations of the systems increase. This paper reviews the current status of physical security network technology and explores innovations made in the past five years to identify and solve cyber vulnerabilities in a variety of contexts and then relates them back to loT applications. These networked devices are often produced as simply and cheaply as technically feasible, which results in them lacking computational capacity, robust networking hardware and inherent security measures. The review focuses on two main technologies, WiFi and Powerline communications (PLC), to compare research on guided and un-guided media. These technologies can both be considered shared, as it is typical for multiple users to be expected to utilize a shared channel. This means both mediums are vulnerable to wireless jamming, but the effectiveness of this varies greatly based on factors such as the environment, cable shielding and transceiver distance. Similarly, the propagation of signals from the two technologies jeopardizes the potential privacy of communications by leaving them vulnerable to various means of eavesdropping. This can be addressed by using methods such as encryption, which is usually implemented at higher layers of the communication stack to provide confidentiality but can also be applied at the physical layer. Encryption also has the challenge of ensuring key exchange occurs securely which requires unique solutions when the limits of loT devices are considered. Eavesdropping can also be defeated by controlling the signal-to-noise ratio that is presented to unintended receivers. Additionally, methods of device fingerprinting are being developed to create more robust authentication regimes between devices. Several research opportunities have been proposed where new concepts in one medium are applied to the other. 
653 |a Receivers & amplifiers 
653 |a Encryption 
653 |a Eavesdropping 
653 |a Internet of Things 
653 |a Fingerprinting 
653 |a Radio frequency 
653 |a Communication 
653 |a Confidentiality 
653 |a Devices 
653 |a Robustness (mathematics) 
653 |a Cybersecurity 
653 |a Jamming 
653 |a Wireless access points 
653 |a Signal to noise ratio 
653 |a Security 
653 |a Internet 
653 |a Automation 
653 |a Technological change 
653 |a Mass media 
653 |a Telecommunications 
653 |a Wireless internet 
653 |a Vulnerability 
653 |a Data encryption 
653 |a Networks 
653 |a Intelligence 
653 |a Computer mediated communication 
653 |a Innovations 
653 |a Wireless communication systems 
653 |a Cryptography 
653 |a Privacy 
653 |a Networking 
700 1 |a Reith, Mark 
700 1 |a Neal, Derek 
773 0 |t European Conference on Cyber Warfare and Security  |g (Jun 2025), p. 105-110 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3244089490/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3244089490/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3244089490/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch