Fundamentals for IoT networks: Secure and low-latency communications

H. Vincent Poor, Mario Goldenbaum, Wei Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

The emerging Internet of Things (IoT) has several salient characteristics that differentiate it from existing wireless networking architectures. These include the deployment of very large numbers of (possibly) low-complexity terminals; the need for low-latency, short-packet communications (e.g., to support automation); light or no infrastructure; and primary applications of data gathering, inference and control. These characteristics have motivated the development of new fundamentals that can provide insights into the limits of communication in this regime. This paper discusses two issues in this context, namely security and low-latency, through the respective lenses of physical layer security and finite-blocklength information theory.

Original languageEnglish (US)
Title of host publicationICDCN 2019 - Proceedings of the 2019 International Conference on Distributed Computing and Networking
PublisherAssociation for Computing Machinery
Pages362-364
Number of pages3
ISBN (Electronic)9781450360944
DOIs
StatePublished - Jan 4 2019
Event20th International Conference on Distributed Computing and Networking, ICDCN 2019 - Bangalore, India
Duration: Jan 4 2019Jan 7 2019

Publication series

NameACM International Conference Proceeding Series

Other

Other20th International Conference on Distributed Computing and Networking, ICDCN 2019
Country/TerritoryIndia
CityBangalore
Period1/4/191/7/19

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Keywords

  • Finite-Blocklength Information Theory
  • Internet-of-Things
  • Physical-layer Security
  • Short-packet Communications

Fingerprint

Dive into the research topics of 'Fundamentals for IoT networks: Secure and low-latency communications'. Together they form a unique fingerprint.

Cite this