Security Comparison of Powerline Communication and Wi-Fi Technologies for Internet of Things

Authors

DOI:

https://doi.org/10.34190/eccws.24.1.3615

Keywords:

Internet of Things, Powerline Communications, WiFi, Physical Layer Security

Abstract

With the rise of system automation, more devices require intelligence and communication capabilities with a network, which is commonly provided via Internet of Things (IoT) devices. Providing communication stack security for these networks becomes increasingly challenging as the expectations of the systems increase. This paper reviews the current status of physical security network technology and explores innovations made in the past five years to identify and solve cyber vulnerabilities in a variety of contexts and then relates them back to IoT applications. These networked devices are often produced as simply and cheaply as technically feasible, which results in them lacking computational capacity, robust networking hardware and inherent security measures. The review focuses on two main technologies, WiFi and Powerline communications (PLC), to compare research on guided and un-guided media. These technologies can both be considered shared, as it is typical for multiple users to be expected to utilize a shared channel.  This means both mediums are vulnerable to wireless jamming, but the effectiveness of this varies greatly based on factors such as the environment, cable shielding and transceiver distance. Similarly, the propagation of signals from the two technologies jeopardizes the potential privacy of communications by leaving them vulnerable to various means of eavesdropping. This can be addressed by using methods such as encryption, which is usually implemented at higher layers of the communication stack to provide confidentiality but can also be applied at the physical layer. Encryption also has the challenge of ensuring key exchange occurs securely which requires unique solutions when the limits of IoT devices are considered. Eavesdropping can also be defeated by controlling the signal-to-noise ratio that is presented to unintended receivers. Additionally, methods of device fingerprinting are being developed to create more robust authentication regimes between devices. Several research opportunities have been proposed where new concepts in one medium are applied to the other.

Author Biographies

Jacob Dimmitt, Air Force Institute of Technology

Jacob Dimmitt received his B.S. in Computer Science from the United States Air Force Academy in 2020. He is currently a student at the Air Force Institute of Technology pursuing an M.S. in Cyber Operations. His research interests include powerline communications, data security and statistical modeling.

Mark Reith, Air Force Institute of Technology

Mark Reith received his Ph.D. in Computer Science from the University of Texas at San Antonio in 2009. He is currently an assistant professor of computer science at the Air Force Institute of Technology. His research interests include cyber warfare theory, Agile software engineering & modeling, and game-based learning.

Derek Neal, Air Force Institute of Technology

Derek Neal received his DPhil at the University of Oxford, UK in Engineering Science in 2024. He is currently an assistant professor of electrical engineering at the Air Force Institute of Technology. His research interests include power systems, microgrids, and powerline communications for smart grids.

Downloads

Published

2025-06-25