TY - JOUR
T1 - A review of physical layer security techniques for Internet of Things
T2 - Challenges and solutions
AU - Sun, Li
AU - Du, Qinghe
N1 - Publisher Copyright:
© 2018 by the authors.
PY - 2018/10/1
Y1 - 2018/10/1
N2 - With the uninterrupted revolution of communications technologies and the great-leapforward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions.
AB - With the uninterrupted revolution of communications technologies and the great-leapforward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions.
KW - Anti-eavesdropping
KW - Constellation rotation
KW - Fountain code
KW - Internet of Things
KW - Noise aggregation
KW - Physical layer security
UR - https://www.scopus.com/pages/publications/85055723350
U2 - 10.3390/e20100798
DO - 10.3390/e20100798
M3 - 文献综述
AN - SCOPUS:85055723350
SN - 1099-4300
VL - 20
JO - Entropy
JF - Entropy
IS - 10
M1 - 730
ER -