| Literature DB >> 33265819 |
Abstract
With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions.Entities:
Keywords: Internet of Things; anti-eavesdropping; constellation rotation; fountain code; noise aggregation; physical layer security
Year: 2018 PMID: 33265819 PMCID: PMC7512293 DOI: 10.3390/e20100730
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1Illustration of the noise aggregation method.
Figure 2Two-way untrusted relaying system and the constellation rotation based secure transmission method.
Figure 3Fountain coding based secure transmission system.
Comparison of the Physical Layer Security Techniques.
| PLS Technique | Advantages | Disadvantages | Implementation Complexity | Energy Consumption | Potential Application Scenarios |
|---|---|---|---|---|---|
| AN injection | AN generation can be easily realized | Additional energy consumption | Moderate | High | Telemedicine |
| Compressive sensing | No need for additional power | Measurement matrix has to be shared | High | Low | Wireless body area networks |
| Bit flipping | Signal processing operation at the transmitter is simple | Extra bandwidth and energy is needed | Low | High | Sensor networks |
| Cooperative secrecy | Highly flexible and better security performance | Significant signaling overhead | High | Moderate | Unmanned aerial vehicle communications (UAV) |
| Physical layer encryption | Easily incorporated with existing security protocols | Channel probing and secret key agreement is needed | High | Low | Remote coaching |
| Noise aggregation | Easy to be implemented | Channel feedback is needed | Low | Low | Immersive systems, video surveillance |
| Constellation rotation | Degree-of-freedom of the channels can be fully exploited | CSIT is needed | Moderate | Moderate | Device-to-device communications (D2D) |
| Fountain coding | Comprehensive QoS guarantee | Channel feedback is needed | Low | Low | Industrial Internet of Things |