Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces

Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten
{"title":"Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces","authors":"Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten","doi":"10.1007/s43926-023-00046-1","DOIUrl":null,"url":null,"abstract":"Abstract What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, the (I)IoT itself is the source and recipient of various types of data. Within this, there are two main aspects that need to be considered: (i) the transmission of data with appropriate latency and reliability requirements, and (ii) the safeguarding of this data. Both requirements are taken into account during the development of the Sixth Generation (6G) Wireless Systems. This is conceived to deliver higher data rates, reduced cost deployment, and enhanced reliability while providing universal connectivity. Hence, to assist such a vast network domain, (new) 6G-enabling technologies are developed, which include Reconfigurable Intelligent Surfaces (RISs), that are capable of modifying and reconfiguring the wireless propagation channels. This work describes concepts on how security, in particular Physical Layer Security (PhySec) methods, can be supported by RISs. Furthermore, an effective impedance surface model is presented, allowing efficient simulation of beamsplitting and shaping properties of RISs. Finally, the applicability of the use cases is mentioned, with a particular focus on Visible Light Communication (VLC).","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Discover Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s43926-023-00046-1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, the (I)IoT itself is the source and recipient of various types of data. Within this, there are two main aspects that need to be considered: (i) the transmission of data with appropriate latency and reliability requirements, and (ii) the safeguarding of this data. Both requirements are taken into account during the development of the Sixth Generation (6G) Wireless Systems. This is conceived to deliver higher data rates, reduced cost deployment, and enhanced reliability while providing universal connectivity. Hence, to assist such a vast network domain, (new) 6G-enabling technologies are developed, which include Reconfigurable Intelligent Surfaces (RISs), that are capable of modifying and reconfiguring the wireless propagation channels. This work describes concepts on how security, in particular Physical Layer Security (PhySec) methods, can be supported by RISs. Furthermore, an effective impedance surface model is presented, allowing efficient simulation of beamsplitting and shaping properties of RISs. Finally, the applicability of the use cases is mentioned, with a particular focus on Visible Light Communication (VLC).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网时代的连接:关于可重构智能表面的安全性、特性和限制因素
(工业)物联网(IoT)的关键驱动力是什么?除了各种设备、传感器和执行器的互连外,最重要的是收集和传输的数据,(I)物联网本身是各种类型数据的来源和接受者。其中,有两个主要方面需要考虑:(i)具有适当延迟和可靠性要求的数据传输,以及(ii)数据的保护。在第六代(6G)无线系统的开发过程中,这两种要求都被考虑在内。这种设计旨在提供更高的数据速率、更低的部署成本和更高的可靠性,同时提供通用连接。因此,为了支持如此庞大的网络域,开发了(新的)支持6g的技术,其中包括能够修改和重新配置无线传播通道的可重构智能表面(RISs)。这项工作描述了RISs如何支持安全性,特别是物理层安全性(PhySec)方法的概念。此外,提出了一种有效的阻抗面模型,可以有效地模拟RISs的分束和整形特性。最后,提到了用例的适用性,特别关注可见光通信(VLC)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Discover Internet of Things
Discover Internet of Things Internet of Things (IoT)-
CiteScore
7.50
自引率
0.00%
发文量
6
审稿时长
28 days
期刊介绍: Discover Internet of Things is part of the Discover journal series committed to providing a streamlined submission process, rapid review and publication, and a high level of author service at every stage. It is an open access, community-focussed journal publishing research from across all fields relevant to the Internet of Things (IoT), providing cutting-edge and state-of-art research findings to researchers, academicians, students, and engineers. Discover Internet of Things is a broad, open access journal publishing research from across all fields relevant to IoT. Discover Internet of Things covers concepts at the component, hardware, and system level as well as programming, operating systems, software, applications and other technology-oriented research topics. The journal is uniquely interdisciplinary because its scope spans several research communities, ranging from computer systems to communication, optimisation, big data analytics, and application. It is also intended that articles published in Discover Internet of Things may help to support and accelerate Sustainable Development Goal 9: ‘Build resilient infrastructure, promote inclusive and sustainable industrialization and foster innovation’. Discover Internet of Things welcomes all observational, experimental, theoretical, analytical, mathematical modelling, data-driven, and applied approaches that advance the study of all aspects of IoT research.
期刊最新文献
Determining critical nodes in optimal cost attacks on networked infrastructures Comparative analysis of audio classification with MFCC and STFT features using machine learning techniques Innovative image interpolation based reversible data hiding for secure communication Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP Internet of things (IoT)-based on real-time and remote boiler fuel monitoring system: a case of Raha Beverages Company Limited, Arusha-Tanzania
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1