Cargando…
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7512293/ https://www.ncbi.nlm.nih.gov/pubmed/33265819 http://dx.doi.org/10.3390/e20100730 |
_version_ | 1783586124631900160 |
---|---|
author | Sun, Li Du, Qinghe |
author_facet | Sun, Li Du, Qinghe |
author_sort | Sun, Li |
collection | PubMed |
description | With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions. |
format | Online Article Text |
id | pubmed-7512293 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75122932020-11-09 A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions Sun, Li Du, Qinghe Entropy (Basel) Review With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions. MDPI 2018-09-23 /pmc/articles/PMC7512293/ /pubmed/33265819 http://dx.doi.org/10.3390/e20100730 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Sun, Li Du, Qinghe A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions |
title | A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions |
title_full | A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions |
title_fullStr | A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions |
title_full_unstemmed | A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions |
title_short | A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions |
title_sort | review of physical layer security techniques for internet of things: challenges and solutions |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7512293/ https://www.ncbi.nlm.nih.gov/pubmed/33265819 http://dx.doi.org/10.3390/e20100730 |
work_keys_str_mv | AT sunli areviewofphysicallayersecuritytechniquesforinternetofthingschallengesandsolutions AT duqinghe areviewofphysicallayersecuritytechniquesforinternetofthingschallengesandsolutions AT sunli reviewofphysicallayersecuritytechniquesforinternetofthingschallengesandsolutions AT duqinghe reviewofphysicallayersecuritytechniquesforinternetofthingschallengesandsolutions |