Soft Computing Techniques for Physical Layer Security of IoT Devices
Internet of Things (IoT) is an archetype of the Internet where the devices are connecting each other utilizing the Internet. Due to the enormous attention from industries and academia IoT is considering one of the technologies that revolutionize the future. IoT is considering as one of the potential...
        Saved in:
      
    
          | Published in | Advanced Soft Computing Techniques in Data Science, IoT and Cloud Computing Vol. 89; pp. 27 - 51 | 
|---|---|
| Main Authors | , | 
| Format | Book Chapter | 
| Language | English | 
| Published | 
        Switzerland
          Springer International Publishing AG
    
        2021
     Springer International Publishing  | 
| Series | Studies in Big Data | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 9783030756567 3030756564  | 
| ISSN | 2197-6503 2197-6511  | 
| DOI | 10.1007/978-3-030-75657-4_2 | 
Cover
| Abstract | Internet of Things (IoT) is an archetype of the Internet where the devices are connecting each other utilizing the Internet. Due to the enormous attention from industries and academia IoT is considering one of the technologies that revolutionize the future. IoT is considering as one of the potential enabler technologies for beyond fifth-generation wireless technologies. The physical layer aspects of IoT is one of the rapidly developing areas in IoT research. The developments in the arena of soft computing techniques such as fuzzy logic, genetic algorithms, machine learning, and deep learning algorithms have an unequivocal role in this buildout. Data-driven techniques revolutionized various aspects of physical layer techniques such as the generation of adaptive waveforms, energy harvesting, the energy efficiency of the network, spectrum sensing, multiple access techniques, cooperative communication, power allocation, and carrier allocation, etc. Physical Layer Security (PLS), where communication security is achieved by the techniques used in the physical layer is a major application area of soft computing techniques. Several PLS techniques for IoT based on soft computing techniques are proposed by various researchers. Soft computing techniques transformed many of this hardware define techniques to software-defined. In the literature, many researchers are recently reporting many advancements in this domain. One of the major advantages of this type of data-driven ad knowledge-driven technique is its inherent ability to adapt and cognitive capacity to behave differently with the time-varying characteristics of the physical medium. Another advantage of soft computing technique in the physical layer is its propensity to solve nonlinear problems which are difficult to solve with mathematical algorithmic models and its ability to approximate complex dynamic systems according to the renowned universal approximation theorem. Also, for some solvable multivariate optimization problems soft computing techniques give low complexity solutions by training the same algorithm generated data. Thus, creating a low complexity representation of nonlinear models. In this regard, this chapter presents a comprehensive overview of the state-of-the-art approaches towards the application of soft computing algorithms to physical layer security techniques for IoT network. Qualitative and quantitative insight into soft computing techniques for the IoT physical layer security is included in this chapter. | 
    
|---|---|
| AbstractList | Internet of Things (IoT) is an archetype of the Internet where the devices are connecting each other utilizing the Internet. Due to the enormous attention from industries and academia IoT is considering one of the technologies that revolutionize the future. IoT is considering as one of the potential enabler technologies for beyond fifth-generation wireless technologies. The physical layer aspects of IoT is one of the rapidly developing areas in IoT research. The developments in the arena of soft computing techniques such as fuzzy logic, genetic algorithms, machine learning, and deep learning algorithms have an unequivocal role in this buildout. Data-driven techniques revolutionized various aspects of physical layer techniques such as the generation of adaptive waveforms, energy harvesting, the energy efficiency of the network, spectrum sensing, multiple access techniques, cooperative communication, power allocation, and carrier allocation, etc. Physical Layer Security (PLS), where communication security is achieved by the techniques used in the physical layer is a major application area of soft computing techniques. Several PLS techniques for IoT based on soft computing techniques are proposed by various researchers. Soft computing techniques transformed many of this hardware define techniques to software-defined. In the literature, many researchers are recently reporting many advancements in this domain. One of the major advantages of this type of data-driven ad knowledge-driven technique is its inherent ability to adapt and cognitive capacity to behave differently with the time-varying characteristics of the physical medium. Another advantage of soft computing technique in the physical layer is its propensity to solve nonlinear problems which are difficult to solve with mathematical algorithmic models and its ability to approximate complex dynamic systems according to the renowned universal approximation theorem. Also, for some solvable multivariate optimization problems soft computing techniques give low complexity solutions by training the same algorithm generated data. Thus, creating a low complexity representation of nonlinear models. In this regard, this chapter presents a comprehensive overview of the state-of-the-art approaches towards the application of soft computing algorithms to physical layer security techniques for IoT network. Qualitative and quantitative insight into soft computing techniques for the IoT physical layer security is included in this chapter. | 
    
| Author | Tamilselvan, S. Ismayil Siyad, C.  | 
    
| Author_xml | – sequence: 1 givenname: C. surname: Ismayil Siyad fullname: Ismayil Siyad, C. email: ismayilsiyad@pec.edu – sequence: 2 givenname: S. surname: Tamilselvan fullname: Tamilselvan, S.  | 
    
| BookMark | eNpVkF9OAjEQh6uiEZAT-LIXqPZ_t48GRUlINAGfm91uK6u4XdvFhNtwFk5mAWPi02R-k28y8w1Ar_GNBeAaoxuMkLxVMocUIoqg5IJLyDQ5AaOU0pQdInYK-gQrCQXH-OzfTMje3wzRCzDAJOdIKKrkJRjF-I4QIhLnguE-mMy967Kx_2zXXd28ZQtrlk39tbYxcz7sti_LTaxNscpmxcaGbG7NOtTdJvNut536RXZvv2tj4xU4d8Uq2tFvHYLXycNi_ARnz4_T8d0MtphzAm3JKXaiyBki1plCVIYRZpDLZZlXlcSlM84ZWpqcV0wRJakweUVN6hJF6RDg497YhnSuDbr0_iNqjPRenE4aNNVJhD5Y0klcYsiRaYPfP9Zpu4eMbbpQrMyyaDsbohZSKUaVJlgnbT8oYm7u | 
    
| ContentType | Book Chapter | 
    
| Copyright | The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 | 
    
| Copyright_xml | – notice: The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 | 
    
| DBID | FFUUA | 
    
| DEWEY | 006.3 | 
    
| DOI | 10.1007/978-3-030-75657-4_2 | 
    
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science | 
    
| EISBN | 9783030756574 3030756572  | 
    
| EISSN | 2197-6511 | 
    
| Editor | Pani, Subhendu Kumar Liang, Yulan Dash, Sujata Abraham, Ajith  | 
    
| Editor_xml | – sequence: 1 fullname: Pani, Subhendu Kumar – sequence: 2 fullname: Liang, Yulan – sequence: 3 fullname: Dash, Sujata – sequence: 4 fullname: Abraham, Ajith  | 
    
| EndPage | 51 | 
    
| ExternalDocumentID | EBC6799439_21_50 | 
    
| GroupedDBID | 38. AABBV AABLV AALIM ABNDO ACBPT ACWLQ AEJLV AEKFX AELOD AIYYB ALMA_UNASSIGNED_HOLDINGS BAHJK BBABE CZZ DBWEY FFUUA I4C IEZ OCUHQ ORHYB SBO TPJZQ WZT Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z82 Z83 Z84 Z85 Z87 Z88  | 
    
| ID | FETCH-LOGICAL-p1552-eb531f6a8402efca6dc424c0f87b8dd71bfcffc3bc85d4929736c8d3c5d46a833 | 
    
| ISBN | 9783030756567 3030756564  | 
    
| ISSN | 2197-6503 | 
    
| IngestDate | Tue Jul 29 20:28:38 EDT 2025 Mon Apr 21 02:12:23 EDT 2025  | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | true | 
    
| LCCallNum | Q342 | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-p1552-eb531f6a8402efca6dc424c0f87b8dd71bfcffc3bc85d4929736c8d3c5d46a833 | 
    
| OCLC | 1285069397 | 
    
| PQID | EBC6799439_21_50 | 
    
| PageCount | 25 | 
    
| ParticipantIDs | springer_books_10_1007_978_3_030_75657_4_2 proquest_ebookcentralchapters_6799439_21_50  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2021 | 
    
| PublicationDateYYYYMMDD | 2021-01-01 | 
    
| PublicationDate_xml | – year: 2021 text: 2021  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | Switzerland | 
    
| PublicationPlace_xml | – name: Switzerland – name: Cham  | 
    
| PublicationSeriesTitle | Studies in Big Data | 
    
| PublicationSeriesTitleAlternate | Studies in Big Data | 
    
| PublicationTitle | Advanced Soft Computing Techniques in Data Science, IoT and Cloud Computing | 
    
| PublicationYear | 2021 | 
    
| Publisher | Springer International Publishing AG Springer International Publishing  | 
    
| Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing  | 
    
| RelatedPersons | Kacprzyk, Janusz | 
    
| RelatedPersons_xml | – sequence: 1 givenname: Janusz surname: Kacprzyk fullname: Kacprzyk, Janusz  | 
    
| SSID | ssj0002718641 ssib016745702  | 
    
| Score | 1.9911939 | 
    
| Snippet | Internet of Things (IoT) is an archetype of the Internet where the devices are connecting each other utilizing the Internet. Due to the enormous attention from... | 
    
| SourceID | springer proquest  | 
    
| SourceType | Publisher | 
    
| StartPage | 27 | 
    
| SubjectTerms | Deep learning Fuzzy logic Genetic algorithm IoT Machine learning PHY Physical layer security Soft computing  | 
    
| Title | Soft Computing Techniques for Physical Layer Security of IoT Devices | 
    
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6799439&ppg=50 http://link.springer.com/10.1007/978-3-030-75657-4_2  | 
    
| Volume | 89 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZKuSAOy1Ps8pAPnKhS5eE4yYEDtItWqxVCahftzYodG3XVbRFtD8uJn86MH00a4LBcotRKanu-yefxeDwm5C2vOStMxSKVMBUxrU1UY2bELIPPozCMx9JG-X7mZ5fs_Cq_Ggx-daKWdls5Vj__uq_kf1CFMsAVd8neAdn9n0IB3AO-cAWE4dozfg_drC68OKzez4BJR-50Bpz3z0NWVhvpOq23dfiALR-s53a9YLJc75r2rVZDburbxXI0W9w67Cfjdm5_s4BxdOlXjmbjrrb9uw0YxvglKMNFDRa-9_G7UBBsz1RbunIEh4mXN-99eCP24OPim-1F1z-RJj3_RPBP9jycrZPtYEKbIeegjVm0PIhKE4Eh6XhQd8s8T3vuLTqjuMti-8f40A0JgaoirKuImIBB_B7UPiT3P5yeX3wNjIRbNPLCJ0i7tsu0Scntcaj7VuGGodBql2my04t9niuXyrhX6cGsprcQb-2b-SPyEPe8UNyMAuJ7TAZ69YQchRM_qNefp2SKONM9zrTFmQLONOBMLc404EzXhgLO1OP8jFx-Op1PziJ_Dkf0HRP0RVoCURtelyxOtVE1bxRLmYpNWciyaYpEGmWMyqQq84ZVeBoaV2WTKfgFb2XZczJcrVf6BaFlohXPM94wGTOgCXhUYwKmXKV1qWR1TEZBIsJGC_gQZeX6vxG8qCqwoUWaiDw-Ju-C0AQ-vBEhCTcIW2QChC2ssAUI--QuD78kD1pdfkWG2x87_Rqsz61841XkN5lSfAU | 
    
| linkProvider | Library Specific Holdings | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Advanced+Soft+Computing+Techniques+in+Data+Science%2C+IoT+and+Cloud+Computing&rft.au=Ismayil+Siyad%2C+C.&rft.au=Tamilselvan%2C+S.&rft.atitle=Soft+Computing+Techniques+for+Physical+Layer+Security+of+IoT+Devices&rft.series=Studies+in+Big+Data&rft.date=2021-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783030756567&rft.issn=2197-6503&rft.eissn=2197-6511&rft.spage=27&rft.epage=51&rft_id=info:doi/10.1007%2F978-3-030-75657-4_2 | 
    
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6799439-l.jpg |