Multi-channel secure communication framework for wireless IoT (MCSC-WoT): enhancing security in Internet of Things
- URL: http://arxiv.org/abs/2509.10581v1
- Date: Thu, 11 Sep 2025 20:59:13 GMT
- Title: Multi-channel secure communication framework for wireless IoT (MCSC-WoT): enhancing security in Internet of Things
- Authors: Prokash Barman, Ratul Chowdhury, Banani Saha,
- Abstract summary: This work presents the Multi-Channel Secure Communication (MCSC) framework, which integrates advanced cryptographic protocols with dynamic channel-hopping strategies to enhance security with reduced synchronization overhead.<n>A comprehensive comparison of MCSC with well-established methods, including Frequency Hop Spread Spectrum, single channel Advanced Encryption Standard, and various Elliptic Curve Cryptography-based schemes, indicates that MCSC has lower error rates and is more resilient to a wider range of cyber attacks.
- Score: 4.503914517565443
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In modern smart systems, the convergence of the Internet of Things (IoT) and Wireless of Things (WoT) have been revolutionized by offering a broad level of wireless connectivity and communication among various devices. Hitherto, this greater interconnectivity poses important security problems, including the question of how to securely interconnect different networks, preserve secure communication channels, and maintain data integrity. However, the traditional cryptographic method and frequency hopping technique, although they provide some protection, are not sufficient to defend against Man-In-The-Middle, jamming, and replay attacks. In addition, synchronization issues in multi-channel communication systems result in increased latency and energy consumption, which make them unsuitable for resource-constrained IoT and WoT devices. This work presents the Multi-Channel Secure Communication (MCSC) framework, which integrates advanced cryptographic protocols with dynamic channel-hopping strategies to enhance security with reduced synchronization overhead. The MCSC framework maximizes the critical performance metrics, such as packet delivery ratio, latency, throughput, and energy efficiency, and fulfills the specific requirements of the IoT and WoT networks. A comprehensive comparison of MCSC with well-established methods, including Frequency Hop Spread Spectrum, single channel Advanced Encryption Standard, and various Elliptic Curve Cryptography-based schemes, indicates that MCSC has lower error rates and is more resilient to a wider range of cyber attacks. The efficiency of the proposed solution to secure IoT and WoT networks without compromising the operational performance is validated under various interference conditions.
Related papers
- Semantic Communication-Enhanced Split Federated Learning for Vehicular Networks: Architecture, Challenges, and Case Study [50.345531105285524]
Vehicular edge intelligence (VEI) is vital for future intelligent transportation systems.<n>Traditional centralized learning in dynamic vehicular networks faces significant communication overhead and privacy risks.<n>This paper presents a semantic communication-enhanced split federated learning (SC-USFL) framework.
arXiv Detail & Related papers (2026-03-05T08:36:49Z) - Doubly Adaptive Channel and Spatial Attention for Semantic Image Communication by IoT Devices [0.0]
Internet of Things (IoT) networks face significant challenges such as limited communication bandwidth, constrained computational and energy resources, and highly dynamic wireless channel conditions.<n>DJ SCC has been proposed to enable semantic communication of images.<n>DJ SCC has been proposed to train the DNNs once but feed the current SNR as part of the data to the channel-wise attention mechanism.<n>We improve upon ADJ SCC by a simultaneous utilization of doubly adaptive channel-wise and spatial attention modules at both transmitter and receiver.
arXiv Detail & Related papers (2026-02-26T09:29:42Z) - Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Designing a Layered Framework to Secure Data via Improved Multi Stage Lightweight Cryptography in IoT Cloud Systems [1.5803208833562954]
This paper presents a novel multi-layered hybrid security approach aimed at enhancing lightweight encryption for IoT-Cloud systems.<n>The proposed framework consists of three core layers: (1) the H.E.EZ Layer which integrates improved versions of Hyperledger Fabric, Enc-Block and a hybrid ECDSA-ZSS scheme to improve encryption speed, scalability and reduce computational cost; (2) the Credential Management Layer independently verifying data authenticity and authenticity; and (3) the Time and Auditing Layer designed to reduce traffic overhead and optimize performance across dynamic workloads.
arXiv Detail & Related papers (2025-09-01T18:53:20Z) - Backscattering-Based Security in Wireless Power Transfer Applied to Battery-Free BLE Sensors [44.99833362998488]
Integration of security and energy efficiency in Internet of Things systems remains a critical challenge.<n>This paper explores the scalability and protocol-agnostic nature of a backscattering-based security mechanism by integrating it into Bluetooth Low Energy battery-free Wireless Sensor Network.
arXiv Detail & Related papers (2025-07-17T12:15:09Z) - Power Networks SCADA Communication Cybersecurity, A Qiskit Implementation [0.0]
The cyber-physical system of electricity power networks utilizes supervisory control and data acquisition systems (SCADA)<n>In the plausible quantum world (Q-world), conventional approaches will likely face new challenges.<n>This paper highlights the opportunities and challenges in securing SCADA communication in the plausible quantum computing and communication regime.
arXiv Detail & Related papers (2025-03-26T09:40:31Z) - Communication-Efficient Federated Learning by Quantized Variance Reduction for Heterogeneous Wireless Edge Networks [55.467288506826755]
Federated learning (FL) has been recognized as a viable solution for local-privacy-aware collaborative model training in wireless edge networks.<n>Most existing communication-efficient FL algorithms fail to reduce the significant inter-device variance.<n>We propose a novel communication-efficient FL algorithm, named FedQVR, which relies on a sophisticated variance-reduced scheme.
arXiv Detail & Related papers (2025-01-20T04:26:21Z) - AoI in Context-Aware Hybrid Radio-Optical IoT Networks [8.467370216900107]
We study hybrid IoT networks that employ Optical Communication (OC) as a reinforcement medium to Radio Frequency (RF)<n>We adopt a multi-objective optimization strategy to balance the collection of the throughput with the minimization of energy and the frequency of switching between technologies.<n> Simulation results show that the OC supplementary integration alongside enhances the network's overall performances and significantly reduces the Mean AoI and Peak AoI.
arXiv Detail & Related papers (2024-12-17T13:48:25Z) - ACRIC: Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
Recent security incidents in safety-critical industries exposed how the lack of proper message authentication enables attackers to inject malicious commands or alter system behavior.<n>These shortcomings have prompted new regulations that emphasize the pressing need to strengthen cybersecurity.<n>We introduce ACRIC, a message authentication solution to secure legacy industrial communications.
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Toward Mixture-of-Experts Enabled Trustworthy Semantic Communication for 6G Networks [82.3753728955968]
We introduce a novel Mixture-of-Experts (MoE)-based SemCom system.
This system comprises a gating network and multiple experts, each specializing in different security challenges.
The gating network adaptively selects suitable experts to counter heterogeneous attacks based on user-defined security requirements.
A case study in vehicular networks demonstrates the efficacy of the MoE-based SemCom system.
arXiv Detail & Related papers (2024-09-24T03:17:51Z) - Distributed Swarm Learning for Edge Internet of Things [28.125744688546842]
The rapid growth of the Internet of Things (IoT) has led to the widespread deployment of smart computation devices at wireless edge for machine learning tasks.
This article explores the risks of swarm security, non-constrained wireless communication and privacy issues.
It combines biological intelligence in a holistic manner to provide efficient solutions for large-scale IoT at the edge wireless networks.
arXiv Detail & Related papers (2024-03-29T14:05:40Z) - Semantic Entropy Can Simultaneously Benefit Transmission Efficiency and Channel Security of Wireless Semantic Communications [55.54210451136529]
We propose SemEntropy to explore semantics of data for both adaptive transmission and physical layer encryption.<n>We show that SemEntropy can keep the semantic accuracy remain 95% with 60% less transmission.
arXiv Detail & Related papers (2024-02-05T12:25:02Z) - Harnessing Wireless Channels for Scalable and Privacy-Preserving
Federated Learning [56.94644428312295]
Wireless connectivity is instrumental in enabling federated learning (FL)
Channel randomnessperturbs each worker inversions model update while multiple workers updates incur significant interference on bandwidth.
In A-FADMM, all workers upload their model updates to the parameter server using a single channel via analog transmissions.
This not only saves communication bandwidth, but also hides each worker's exact model update trajectory from any eavesdropper.
arXiv Detail & Related papers (2020-07-03T16:31:15Z) - Decentralized Learning for Channel Allocation in IoT Networks over
Unlicensed Bandwidth as a Contextual Multi-player Multi-armed Bandit Game [134.88020946767404]
We study a decentralized channel allocation problem in an ad-hoc Internet of Things network underlaying on the spectrum licensed to a primary cellular network.
Our study maps this problem into a contextual multi-player, multi-armed bandit game, and proposes a purely decentralized, three-stage policy learning algorithm through trial-and-error.
arXiv Detail & Related papers (2020-03-30T10:05:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.