journal article Open Access Sep 23, 2018

A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions

Entropy Vol. 20 No. 10 pp. 730 · MDPI AG
View at Publisher Save 10.3390/e20100730
Abstract
With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions.
Topics

No keywords indexed for this article. Browse by subject →

References
85
[1]
Internet of Things for Smart Cities

Andrea Zanella, Nicola Bui, Angelo Castellani et al.

IEEE Internet of Things Journal 2014 10.1109/jiot.2014.2306328
[2]
An Information Framework for Creating a Smart City Through Internet of Things

Jiong Jin, Jayavardhana Gubbi, Slaven Marusic et al.

IEEE Internet of Things Journal 2014 10.1109/jiot.2013.2296516
[3]
Gupta "A survey of 5G network: Architecture and emerging technologies" IEEE Access (2015) 10.1109/access.2015.2461602
[4]
Zhang "Energy-efficient beamforming for 3.5 GHz 5G cellular networks based on 3D spatial channel characteristics" Comput. Commun. (2018) 10.1016/j.comcom.2018.02.019
[5]
Zhang "Connecting a city by wireless backhaul: 3D spatial channel characterization and modeling perspectives" IEEE Commun. Mag. (2017) 10.1109/mcom.2017.1600234
[6]
Akpakwu "A survey on 5G networks for the internet of things: Communication technologies and challenges" IEEE Access (2018) 10.1109/access.2017.2779844
[7]
Zou "A survey on wireless security: Technical challenges, recent advances, and future trends" Proc. IEEE (2016) 10.1109/jproc.2016.2558521
[8]
3GPP (2018, September 23). Cellular System Support for Ultra Low Complexity and Low Throughput Internet of Things. TR 45.820. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2719.
[9]
Sun "Physical layer security with its applications in 5G networks: A review" China Commun. (2017) 10.1109/cc.2017.8246328
[10]
Yang "Safeguarding 5G wireless communication networks using physical layer security" IEEE Commun. Mag. (2015) 10.1109/mcom.2015.7081071
[11]
Shannon "Communication theory of secrecy systems" Bell Syst. Tech. J. (1949) 10.1002/j.1538-7305.1949.tb00928.x
[12]
Wyner "Wire-tap channel" Bell Syst. Tech. J. (1975) 10.1002/j.1538-7305.1975.tb02040.x
[13]
Cheong "The Gaussian wiretap channel" IEEE Trans. Inf. Theory (1975) 10.1109/tit.1978.1055917
[14]
Broadcast channels with confidential messages

I. Csiszar, J. Korner

IEEE Transactions on Information Theory 1978 10.1109/tit.1978.1055892
[15]
Liang "Secure communication over fading channels" IEEE Trans. Inf. Theory (2008) 10.1109/tit.2008.921678
[16]
Khisti "Secure transmission with multiple antennas—Part I: The MISOME wiretap channels" IEEE Trans. Inf. Theory (2010) 10.1109/tit.2010.2048445
[17]
Khisti "Secure transmission with multiple antennas—Part II: The MIMOME wiretap channels" IEEE Trans. Inf. Theory (2010) 10.1109/tit.2010.2068852
[18]
Barros, J., and Rodrigues, M.R.D. (2006, January 9–14). Secrecy capacity of wireless channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seattle, WA, USA. 10.1109/isit.2006.261613
[19]
Gopala "On the secrecy capacity of fading channels" IEEE Trans. Inf. Theory (2008) 10.1109/tit.2008.928990
[20]
Kobayashi "Secure communication over frequency-selective fading channels: A practical vandermonde precoding" EURASIP J. Wirel. Commun. Netw. (2009) 10.1155/2009/386547
[21]
Gündüz, D., Brown, D.R., and Poor, H.V. (2008, January 7–10). Secret communication with feedback. Proceedings of the IEEE International Symposium on Information Theory and Its Applications (ISITA), Auckland, New Zealand. 10.1109/isita.2008.4895417
[22]
Ardestanizadeh "Wiretap channel with secure rate-limited feedback" IEEE Trans. Inf. Theory (2009) 10.1109/tit.2009.2032814
[23]
Tekin "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming" IEEE Trans. Inf. Theory (2008) 10.1109/tit.2008.921680
[24]
Lai "The relay-eavesdropper channel: Cooperation for secrecy" IEEE Trans. Inf. Theory (2008) 10.1109/tit.2008.928272
[25]
Liang "Capacity of cognitive interference channels with and without secrecy" IEEE Trans. Inf. Theory (2009) 10.1109/tit.2008.2009584
[26]
Mukherjee "Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints" Proc. IEEE (2015) 10.1109/jproc.2015.2466548
[27]
Guaranteeing Secrecy using Artificial Noise

Satashu Goel, Rohit Negi

IEEE Transactions on Wireless Communications 2008 10.1109/twc.2008.060848
[28]
Zhang "Artificial-noise-aided secure multi-antenna transmission with limited feedback" IEEE Trans. Wirel. Commun. (2015) 10.1109/twc.2015.2391261
[29]
Wang "Secrecy energy efficiency optimization in AN-aided distributed antenna systems with energy harvesting" IEEE Access. (2018) 10.1109/access.2018.2846689
[30]
Hu "Cooperative jamming for physical layer security enhancement in internet of things" IEEE Internet Things J. (2018) 10.1109/jiot.2017.2778185
[31]
Zhang "Wireless powered cooperative jamming for secure OFDM system" IEEE Trans. Veh. Technol. (2018) 10.1109/tvt.2017.2756877
[32]
Liu "Power allocation for secure SWIPT systems with wireless-powered cooperative jamming" IEEE Commun. Lett. (2017) 10.1109/lcomm.2017.2672660
[33]
Cumanan "Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis" IEEE Trans. Veh. Technol. (2017) 10.1109/tvt.2017.2657629
[34]
Sun "Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks" IEEE Trans. Ind. Inform. (2016) 10.1109/tii.2015.2509442
[35]
Kailkhura "Collaborative compressive detection with physical layer secrecy constraints" IEEE Trans. Signal Process. (2017) 10.1109/tsp.2016.2630029
[36]
Dautov "Securing while sampling in wireless body area networks with application to electrocardiography" IEEE J. Biomed. Health Inform. (2016) 10.1109/jbhi.2014.2366125
[37]
Choi "Secure transmissions via compressive sensing in multicarrier systems" IEEE Signal Process. Lett. (2016) 10.1109/lsp.2016.2595524
[38]
Yu "Indistinguishability of compressed encryption with circulant matrices for wireless security" IEEE Signal Process. Lett. (2017) 10.1109/lsp.2017.2647953
[39]
Morell "Amplify-and-forward compressed sensing as an energy-efficient solution in wireless sensor networks" IEEE Sens. J. (2014) 10.1109/jsen.2014.2303080
[40]
Morell "Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks" IEEE Trans. Inf. Forensics Secur. (2014) 10.1109/tifs.2014.2309855
[41]
Lyu "Physical layer security in multi-hop AF relay network based on compressed sensing" IEEE Commun. Lett. (2018)
[42]
Jeon "Secure type-based multiple access" IEEE Trans. Inf. Forensics Secur. (2011) 10.1109/tifs.2011.2158312
[43]
Jeon "Channel aware encryption and decision fusion for wireless networks" IEEE Trans. Inf. Forensics Secur. (2013) 10.1109/tifs.2013.2243145
[44]
Dong "Improving wireless physical layer security via cooperative relays" IEEE Trans. Signal Process. (2010) 10.1109/tsp.2009.2038412
[45]
Krikidis "Relay selection for secure cooperative networks with jamming" IEEE Trans. Wirel. Commun. (2009) 10.1109/twc.2009.090323
[46]
Zou "Optimal relay selection for physical-layer security in cooperative wireless networks" IEEE J. Sel. Areas Commun. (2013) 10.1109/jsac.2013.131011
[47]
Fan "Secure multiple amplify-and-forward relaying with cochannel interference" IEEE J. Sel. Top. Signal Process. (2016) 10.1109/jstsp.2016.2607692
[48]
Fan "Secrecy cooperative networks with outdated relay selection over correlated fading channels" IEEE Trans. Veh. Technol. (2017) 10.1109/tvt.2017.2669240
[49]
He "Two-hop secure communication using an untrusted relay" EURASIP J. Wirel. Commun. Netw. (2009) 10.1155/2009/305146
[50]
He "Cooperation with an untrusted relay: A secrecy perspective" IEEE Trans. Inf. Theory (2010) 10.1109/tit.2010.2050958

Showing 50 of 85 references

Cited By
110
Physical-Layer Security in 6G Networks

Lorenzo Mucchi, Sara Jayousi · 2021

IEEE Open Journal of the Communicat...
Metrics
110
Citations
85
References
Details
Published
Sep 23, 2018
Vol/Issue
20(10)
Pages
730
License
View
Funding
The Key Research and Development Program of Shaanxi Province Award: 2018KW-019
the National Natural Science Foundation of China (NSFC) Award: 61671369; 61431011
the Open Research Fund of the State Key Laboratory of Integrated Services Networks, Xidian University Award: ISN18-02
Cite This Article
Li Sun, Qinghe Du (2018). A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy, 20(10), 730. https://doi.org/10.3390/e20100730
Related

You May Also Like

Explainable AI: A Review of Machine Learning Interpretability Methods

Pantelis Linardatos, Vasilis Papastefanopoulos · 2020

2,260 citations

Quantum Thermodynamics: A Dynamical Viewpoint

Ronnie Kosloff · 2013

678 citations

Approximate Entropy and Sample Entropy: A Comprehensive Tutorial

Alfonso Delgado-Bonal, Alexander Marshak · 2019

587 citations

The Quantum Harmonic Otto Cycle

Ronnie Kosloff, Yair Rezek · 2017

331 citations