A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions

With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically...

Full description

Bibliographic Details
Main Authors: Li Sun, Qinghe Du
Format: Article
Language:English
Published: MDPI AG 2018-09-01
Series:Entropy
Subjects:
Online Access:http://www.mdpi.com/1099-4300/20/10/730
_version_ 1828348134299795456
author Li Sun
Qinghe Du
author_facet Li Sun
Qinghe Du
author_sort Li Sun
collection DOAJ
description With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions.
first_indexed 2024-04-14T00:50:04Z
format Article
id doaj.art-caae2ab00de34f1a8b67e36e8a89e4ac
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-04-14T00:50:04Z
publishDate 2018-09-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-caae2ab00de34f1a8b67e36e8a89e4ac2022-12-22T02:21:49ZengMDPI AGEntropy1099-43002018-09-01201073010.3390/e20100730e20100730A Review of Physical Layer Security Techniques for Internet of Things: Challenges and SolutionsLi Sun0Qinghe Du1School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, ChinaSchool of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, ChinaWith the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions.http://www.mdpi.com/1099-4300/20/10/730Internet of Thingsphysical layer securityanti-eavesdroppingnoise aggregationconstellation rotationfountain code
spellingShingle Li Sun
Qinghe Du
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
Entropy
Internet of Things
physical layer security
anti-eavesdropping
noise aggregation
constellation rotation
fountain code
title A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
title_full A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
title_fullStr A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
title_full_unstemmed A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
title_short A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
title_sort review of physical layer security techniques for internet of things challenges and solutions
topic Internet of Things
physical layer security
anti-eavesdropping
noise aggregation
constellation rotation
fountain code
url http://www.mdpi.com/1099-4300/20/10/730
work_keys_str_mv AT lisun areviewofphysicallayersecuritytechniquesforinternetofthingschallengesandsolutions
AT qinghedu areviewofphysicallayersecuritytechniquesforinternetofthingschallengesandsolutions
AT lisun reviewofphysicallayersecuritytechniquesforinternetofthingschallengesandsolutions
AT qinghedu reviewofphysicallayersecuritytechniquesforinternetofthingschallengesandsolutions