Preprint Article Version 1 This version is not peer-reviewed

Communication and Sensing: PHY Layer Threats to Security and Privacy for IoT Systems, and Possible Countermeasures

Version 1 : Received: 28 August 2024 / Approved: 29 August 2024 / Online: 29 August 2024 (09:22:17 CEST)

How to cite: Lo Cigno, R.; Gringoli, F.; Bartoletti, S.; Cominelli, M.; Ghiro, L.; Zanini, S. Communication and Sensing: PHY Layer Threats to Security and Privacy for IoT Systems, and Possible Countermeasures. Preprints 2024, 2024082131. https://doi.org/10.20944/preprints202408.2131.v1 Lo Cigno, R.; Gringoli, F.; Bartoletti, S.; Cominelli, M.; Ghiro, L.; Zanini, S. Communication and Sensing: PHY Layer Threats to Security and Privacy for IoT Systems, and Possible Countermeasures. Preprints 2024, 2024082131. https://doi.org/10.20944/preprints202408.2131.v1

Abstract

Recent advances in signal processing and AI-based inference enable the exploitation of communication signals to collect information on devices, people, actions and the environment in general, i.e., to perform Integrated Sensing And Communication (ISAC). This possibility opens new and exciting opportunities for IoT systems, but at the same time poses unprecedented threats to security and privacy of data, devices, and systems. In fact, ISAC operates at the PHY and Medium Access Control (MAC) layers, where it is impossible to protect the information with standard encryption techniques, or with any other purely digital methodologies. The work we present analyzes, within the framework of IoT and distributed, pervasive communication systems, the threats to security and privacy posed by ISAC and how they do intertwine at the PHY layer. Next, possible countermeasures are presented and discussed, with proper architectural choices and tradeoffs to implement them, as well as solutions and protocols to preserve the potential benefits of ISAC while ensuring data protection and users’ privacy.

Keywords

Integrated Communications and Sensing; PHY Layer Security; Pervasive Communications and Sensing; Privacy Protection; Analog Signals Manipulation

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.