Soft Computing Techniques for Physical Layer Security of IoT Devices

Internet of Things (IoT) is an archetype of the Internet where the devices are connecting each other utilizing the Internet. Due to the enormous attention from industries and academia IoT is considering one of the technologies that revolutionize the future. IoT is considering as one of the potential...

Full description

Saved in:
Bibliographic Details
Published inAdvanced Soft Computing Techniques in Data Science, IoT and Cloud Computing Vol. 89; pp. 27 - 51
Main Authors Ismayil Siyad, C., Tamilselvan, S.
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2021
Springer International Publishing
SeriesStudies in Big Data
Subjects
Online AccessGet full text
ISBN9783030756567
3030756564
ISSN2197-6503
2197-6511
DOI10.1007/978-3-030-75657-4_2

Cover

Abstract Internet of Things (IoT) is an archetype of the Internet where the devices are connecting each other utilizing the Internet. Due to the enormous attention from industries and academia IoT is considering one of the technologies that revolutionize the future. IoT is considering as one of the potential enabler technologies for beyond fifth-generation wireless technologies. The physical layer aspects of IoT is one of the rapidly developing areas in IoT research. The developments in the arena of soft computing techniques such as fuzzy logic, genetic algorithms, machine learning, and deep learning algorithms have an unequivocal role in this buildout. Data-driven techniques revolutionized various aspects of physical layer techniques such as the generation of adaptive waveforms, energy harvesting, the energy efficiency of the network, spectrum sensing, multiple access techniques, cooperative communication, power allocation, and carrier allocation, etc. Physical Layer Security (PLS), where communication security is achieved by the techniques used in the physical layer is a major application area of soft computing techniques. Several PLS techniques for IoT based on soft computing techniques are proposed by various researchers. Soft computing techniques transformed many of this hardware define techniques to software-defined. In the literature, many researchers are recently reporting many advancements in this domain. One of the major advantages of this type of data-driven ad knowledge-driven technique is its inherent ability to adapt and cognitive capacity to behave differently with the time-varying characteristics of the physical medium. Another advantage of soft computing technique in the physical layer is its propensity to solve nonlinear problems which are difficult to solve with mathematical algorithmic models and its ability to approximate complex dynamic systems according to the renowned universal approximation theorem. Also, for some solvable multivariate optimization problems soft computing techniques give low complexity solutions by training the same algorithm generated data. Thus, creating a low complexity representation of nonlinear models. In this regard, this chapter presents a comprehensive overview of the state-of-the-art approaches towards the application of soft computing algorithms to physical layer security techniques for IoT network. Qualitative and quantitative insight into soft computing techniques for the IoT physical layer security is included in this chapter.
AbstractList Internet of Things (IoT) is an archetype of the Internet where the devices are connecting each other utilizing the Internet. Due to the enormous attention from industries and academia IoT is considering one of the technologies that revolutionize the future. IoT is considering as one of the potential enabler technologies for beyond fifth-generation wireless technologies. The physical layer aspects of IoT is one of the rapidly developing areas in IoT research. The developments in the arena of soft computing techniques such as fuzzy logic, genetic algorithms, machine learning, and deep learning algorithms have an unequivocal role in this buildout. Data-driven techniques revolutionized various aspects of physical layer techniques such as the generation of adaptive waveforms, energy harvesting, the energy efficiency of the network, spectrum sensing, multiple access techniques, cooperative communication, power allocation, and carrier allocation, etc. Physical Layer Security (PLS), where communication security is achieved by the techniques used in the physical layer is a major application area of soft computing techniques. Several PLS techniques for IoT based on soft computing techniques are proposed by various researchers. Soft computing techniques transformed many of this hardware define techniques to software-defined. In the literature, many researchers are recently reporting many advancements in this domain. One of the major advantages of this type of data-driven ad knowledge-driven technique is its inherent ability to adapt and cognitive capacity to behave differently with the time-varying characteristics of the physical medium. Another advantage of soft computing technique in the physical layer is its propensity to solve nonlinear problems which are difficult to solve with mathematical algorithmic models and its ability to approximate complex dynamic systems according to the renowned universal approximation theorem. Also, for some solvable multivariate optimization problems soft computing techniques give low complexity solutions by training the same algorithm generated data. Thus, creating a low complexity representation of nonlinear models. In this regard, this chapter presents a comprehensive overview of the state-of-the-art approaches towards the application of soft computing algorithms to physical layer security techniques for IoT network. Qualitative and quantitative insight into soft computing techniques for the IoT physical layer security is included in this chapter.
Author Tamilselvan, S.
Ismayil Siyad, C.
Author_xml – sequence: 1
  givenname: C.
  surname: Ismayil Siyad
  fullname: Ismayil Siyad, C.
  email: ismayilsiyad@pec.edu
– sequence: 2
  givenname: S.
  surname: Tamilselvan
  fullname: Tamilselvan, S.
BookMark eNpVkF9OAjEQh6uiEZAT-LIXqPZ_t48GRUlINAGfm91uK6u4XdvFhNtwFk5mAWPi02R-k28y8w1Ar_GNBeAaoxuMkLxVMocUIoqg5IJLyDQ5AaOU0pQdInYK-gQrCQXH-OzfTMje3wzRCzDAJOdIKKrkJRjF-I4QIhLnguE-mMy967Kx_2zXXd28ZQtrlk39tbYxcz7sti_LTaxNscpmxcaGbG7NOtTdJvNut536RXZvv2tj4xU4d8Uq2tFvHYLXycNi_ARnz4_T8d0MtphzAm3JKXaiyBki1plCVIYRZpDLZZlXlcSlM84ZWpqcV0wRJakweUVN6hJF6RDg497YhnSuDbr0_iNqjPRenE4aNNVJhD5Y0klcYsiRaYPfP9Zpu4eMbbpQrMyyaDsbohZSKUaVJlgnbT8oYm7u
ContentType Book Chapter
Copyright The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
Copyright_xml – notice: The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
DBID FFUUA
DEWEY 006.3
DOI 10.1007/978-3-030-75657-4_2
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783030756574
3030756572
EISSN 2197-6511
Editor Pani, Subhendu Kumar
Liang, Yulan
Dash, Sujata
Abraham, Ajith
Editor_xml – sequence: 1
  fullname: Pani, Subhendu Kumar
– sequence: 2
  fullname: Liang, Yulan
– sequence: 3
  fullname: Dash, Sujata
– sequence: 4
  fullname: Abraham, Ajith
EndPage 51
ExternalDocumentID EBC6799439_21_50
GroupedDBID 38.
AABBV
AABLV
AALIM
ABNDO
ACBPT
ACWLQ
AEJLV
AEKFX
AELOD
AIYYB
ALMA_UNASSIGNED_HOLDINGS
BAHJK
BBABE
CZZ
DBWEY
FFUUA
I4C
IEZ
OCUHQ
ORHYB
SBO
TPJZQ
WZT
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z82
Z83
Z84
Z85
Z87
Z88
ID FETCH-LOGICAL-p1552-eb531f6a8402efca6dc424c0f87b8dd71bfcffc3bc85d4929736c8d3c5d46a833
ISBN 9783030756567
3030756564
ISSN 2197-6503
IngestDate Tue Jul 29 20:28:38 EDT 2025
Mon Apr 21 02:12:23 EDT 2025
IsPeerReviewed false
IsScholarly true
LCCallNum Q342
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p1552-eb531f6a8402efca6dc424c0f87b8dd71bfcffc3bc85d4929736c8d3c5d46a833
OCLC 1285069397
PQID EBC6799439_21_50
PageCount 25
ParticipantIDs springer_books_10_1007_978_3_030_75657_4_2
proquest_ebookcentralchapters_6799439_21_50
PublicationCentury 2000
PublicationDate 2021
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – year: 2021
  text: 2021
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesTitle Studies in Big Data
PublicationSeriesTitleAlternate Studies in Big Data
PublicationTitle Advanced Soft Computing Techniques in Data Science, IoT and Cloud Computing
PublicationYear 2021
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kacprzyk, Janusz
RelatedPersons_xml – sequence: 1
  givenname: Janusz
  surname: Kacprzyk
  fullname: Kacprzyk, Janusz
SSID ssj0002718641
ssib016745702
Score 1.9911939
Snippet Internet of Things (IoT) is an archetype of the Internet where the devices are connecting each other utilizing the Internet. Due to the enormous attention from...
SourceID springer
proquest
SourceType Publisher
StartPage 27
SubjectTerms Deep learning
Fuzzy logic
Genetic algorithm
IoT
Machine learning
PHY
Physical layer security
Soft computing
Title Soft Computing Techniques for Physical Layer Security of IoT Devices
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6799439&ppg=50
http://link.springer.com/10.1007/978-3-030-75657-4_2
Volume 89
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZKuSAOy1Ps8pAPnKhS5eE4yYEDtItWqxVCahftzYodG3XVbRFtD8uJn86MH00a4LBcotRKanu-yefxeDwm5C2vOStMxSKVMBUxrU1UY2bELIPPozCMx9JG-X7mZ5fs_Cq_Ggx-daKWdls5Vj__uq_kf1CFMsAVd8neAdn9n0IB3AO-cAWE4dozfg_drC68OKzez4BJR-50Bpz3z0NWVhvpOq23dfiALR-s53a9YLJc75r2rVZDburbxXI0W9w67Cfjdm5_s4BxdOlXjmbjrrb9uw0YxvglKMNFDRa-9_G7UBBsz1RbunIEh4mXN-99eCP24OPim-1F1z-RJj3_RPBP9jycrZPtYEKbIeegjVm0PIhKE4Eh6XhQd8s8T3vuLTqjuMti-8f40A0JgaoirKuImIBB_B7UPiT3P5yeX3wNjIRbNPLCJ0i7tsu0Scntcaj7VuGGodBql2my04t9niuXyrhX6cGsprcQb-2b-SPyEPe8UNyMAuJ7TAZ69YQchRM_qNefp2SKONM9zrTFmQLONOBMLc404EzXhgLO1OP8jFx-Op1PziJ_Dkf0HRP0RVoCURtelyxOtVE1bxRLmYpNWciyaYpEGmWMyqQq84ZVeBoaV2WTKfgFb2XZczJcrVf6BaFlohXPM94wGTOgCXhUYwKmXKV1qWR1TEZBIsJGC_gQZeX6vxG8qCqwoUWaiDw-Ju-C0AQ-vBEhCTcIW2QChC2ssAUI--QuD78kD1pdfkWG2x87_Rqsz61841XkN5lSfAU
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Advanced+Soft+Computing+Techniques+in+Data+Science%2C+IoT+and+Cloud+Computing&rft.au=Ismayil+Siyad%2C+C.&rft.au=Tamilselvan%2C+S.&rft.atitle=Soft+Computing+Techniques+for+Physical+Layer+Security+of+IoT+Devices&rft.series=Studies+in+Big+Data&rft.date=2021-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783030756567&rft.issn=2197-6503&rft.eissn=2197-6511&rft.spage=27&rft.epage=51&rft_id=info:doi/10.1007%2F978-3-030-75657-4_2
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6799439-l.jpg