{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T09:11:27Z","timestamp":1773825087799,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T00:00:00Z","timestamp":1735257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Establishing robust cybersecurity for Internet of Things (IoT) ecosystems poses significant challenges for system operators due to IoT resource constraints, trade-offs between security and performance, diversity of applications, and their security requirements, usability, and scalability. This article introduces a physical-layer security (PLS) approach that enables IoT devices to maintain specified levels of information confidentiality against wireless channel eavesdropping threats. This work proposes applying PLS active defense mechanisms utilizing spectrum-sharing schemes combined with fair scheduling and power management algorithms to mitigate the risk of eavesdropping attacks on resource-constrained IoT environments. Specifically, an IoT device communicating over an insecure wireless channel will utilize intentional noise signals transmitted alongside the actual IoT information signal. The intentional noise signal will appear to an eavesdropper (EVE) as additional noise, reducing the EVE\u2019s signal-to-interference-plus-noise ratio (SINR) and increasing the EVE\u2019s outage probability, thereby restricting their capacity to decode the transmitted IoT information, resulting in better protection for the confidentiality of the IoT device\u2019s transmission. The proposed communication strategy serves as a complementary solution to existing security methods. Analytical and numerical analyses presented in this article validate the effectiveness of the proposed strategy, demonstrating that IoT devices can achieve the desired levels of confidentiality.<\/jats:p>","DOI":"10.3390\/computers14010006","type":"journal-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T09:23:36Z","timestamp":1735291416000},"page":"6","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0068-6773","authenticated-orcid":false,"given":"Abdallah","family":"Farraj","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Texas A&M\u2014RELLIS, Bryan, TX 77807, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6069-1550","authenticated-orcid":false,"given":"Eman","family":"Hammad","sequence":"additional","affiliation":[{"name":"Engineering Technology and Industrial Distribution Department, Texas A&M University, College Station, TX 77843, USA"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Alam, T. (2023). Blockchain-Based Internet of Things: Review, Current Trends, Applications, and Future Challenges. Computers, 12.","DOI":"10.3390\/computers12010006"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"100798","DOI":"10.1016\/j.prime.2024.100798","article-title":"Securing the IoT Landscape: A Comprehensive Review of Secure Systems in the Digital Era","volume":"10","author":"Siraparapu","year":"2024","journal-title":"e-Prime Adv. Electr. Eng. Electron. Energy"},{"key":"ref_3","unstructured":"Larrivaud, L. (2019). State of Enterprise IoT Security in North America: Unmanaged and Unsecured, Armis Inc.. A Forrester Consulting Thought Leadership Paper."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","article-title":"A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures","volume":"7","author":"Hassija","year":"2019","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.matpr.2021.05.067","article-title":"A review paper on wireless sensor network techniques in Internet of Things (IoT)","volume":"51","author":"Gulati","year":"2021","journal-title":"Mater. Today Proc."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2662","DOI":"10.1109\/TIFS.2019.2905759","article-title":"Physical layer security in wireless sensor networks using distributed co-phasing","volume":"14","author":"Chopra","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","article-title":"A survey on emerging SDN and NFV security mechanisms for IoT systems","volume":"21","author":"Farris","year":"2018","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Varga, P., Peto, J., Franko, A., Balla, D., Haja, D., Janky, F., Soos, G., Ficzere, D., Maliosz, M., and Toka, L. (2020). 5G support for Industrial IoT Applications\u2014Challenges, Solutions, and Research gaps. Sensors, 20.","DOI":"10.3390\/s20030828"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/JIOT.2019.2943900","article-title":"Physical-layer security in space information networks: A survey","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2016.2598968","article-title":"Physical layer security for next generation wireless networks: Theories, technologies, and challenges","volume":"19","author":"Liu","year":"2016","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"8169","DOI":"10.1109\/JIOT.2019.2927379","article-title":"Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities","volume":"6","author":"Wang","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Soni, A., Upadhyay, R., and Jain, A. (2017). Internet of Things and wireless physical layer security: A survey. Computer Communication, Networking and Internet Security, Springer.","DOI":"10.1007\/978-981-10-3226-4_11"},{"key":"ref_13","unstructured":"Rojas, P., Alahmadi, S., and Bayoumi, M. (July, January 14). Physical layer security for IoT communications - A survey. Proceedings of the 7th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1007\/s11277-012-0722-3","article-title":"Scheduling in a Spectrum-Sharing Cognitive Environment under Outage Probability Constraint","volume":"70","author":"Farraj","year":"2013","journal-title":"Wirel. Pers. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/s11277-011-0469-2","article-title":"Performance of Primary Users in Spectrum Sharing Cognitive Radio Environment","volume":"68","author":"Farraj","year":"2013","journal-title":"Wirel. Pers. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"122679","DOI":"10.1109\/ACCESS.2022.3223370","article-title":"Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review","volume":"10","author":"Laghari","year":"2022","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., and Shieh, S. (2014, January 14\u201317). IoT Security: Ongoing Challenges and Research Opportunities. Proceedings of the IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan.","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ju, Y., Tian, S., Yang, M., Zheng, T.X., Pei, Q., Chen, Z., and Yuan, J. (2024). Physical Layer Security in Terahertz Indoor Communication Networks. IEEE Trans. Wirel. Commun.","DOI":"10.1109\/TWC.2024.3502435"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Iqbal, U., Cho, S., Jung, H., and Guizani, M. (2024). Performance Analysis of Physical Layer Security for Over-the-Air Computation Using Distributed Null-Steering Beamforming. IEEE Commun. Lett.","DOI":"10.1109\/LCOMM.2024.3515038"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1109\/TCCN.2024.3382973","article-title":"Artificial Intelligence for Wireless Physical-Layer Technologies (AI4PHY): A Comprehensive Survey","volume":"10","author":"Ye","year":"2024","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Pecorella, T., Brilli, L., and Mucchi, L. (2016). The Role of Physical Layer Security in IoT: A Novel Perspective. Information, 7.","DOI":"10.3390\/info7030049"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Sun, L., and Du, Q. (2018). A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy, 20.","DOI":"10.3390\/e20100730"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1073\/pnas.1618130114","article-title":"Wireless physical layer security","volume":"114","author":"Poor","year":"2017","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1747","DOI":"10.1109\/JPROC.2015.2466548","article-title":"Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints","volume":"103","author":"Mukherjee","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MCOM.001.1900716","article-title":"Energy-and cost-efficient physical layer security in the era of IoT: The role of interference","volume":"58","author":"Wei","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_26","unstructured":"Zhou, X., Song, L., and Zhang, Y. (2013). Physical Layer Security in Wireless Communications, CRC Press."},{"key":"ref_27","unstructured":"Cover, T.M., and Thomas, J.A. (1991). Elements of Information Theory, John Wiley & Sons, Inc.. [1st ed.]."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Farraj, A., and Hammad, E. (2024). A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments. Sensors, 24.","DOI":"10.3390\/s24165171"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Anselmi, G., Mandalari, A.M., Lazzaro, S., and De Angelis, V. (2023, January 2\u20136). COPSEC: Compliance-Oriented IoT Security and Privacy Evaluation Framework. Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, Madrid, Spain.","DOI":"10.1145\/3570361.3615747"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/1\/6\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T17:01:26Z","timestamp":1760115686000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/1\/6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,27]]},"references-count":29,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["computers14010006"],"URL":"https:\/\/doi.org\/10.3390\/computers14010006","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,27]]}}}