Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
Abstract
:1. Introduction
2. Wireless Technologies for IoT and Their Security Countermeasures
3. Physical Layer Key Generation
- Channel reciprocity means the channel responses of the forward and backward links are the same, which is the basis for key generation. When two users measure the same channel parameters at the same frequency in a time-division duplex (TDD) mode, the measurements at Alice and Bob are impacted by the non-simultaneous sampling and noise. However, a high correlation between channel measurements of Alice and Bob can still be maintained and eligible for key generation in a slow fading channel, as demonstrated in many practical experiments [36,37,38,39].
- Temporal variation indicates that there is randomness residing in the dynamic channel, which ensures the extracted keys are random. A random key will make the cryptographic applications robust against attacks such as brute force. In the urban area, the interference may be chaotic, because of the densely deployed access points [40]. The interference will impact the channel measurements accuracy but will not affect randomness nature of the wireless link between users. In addition, the statistical features of the channel may be deterministic [41,42], but key generation is exploiting the instantaneous channel variation, which is random in nature.
- Spatial decorrelation implies that when located a half-wavelength away from the legitimate users, the eavesdropper experiences an uncorrelated channel compared to that between Alice or Bob, guaranteeing the security of the key generation. When the system works at 2.4 GHz, a half-wavelength is about 6 cm, which is quite short.
3.1. Procedure
Algorithm 1 Mean and Standard Deviation-Based Quantization |
INPUT: % Channel measurement, RSS or CSI OUTPUT: % Key 1: % is the positive threshold. 2: % is the negative threshold. 3: for do 4: if then 5: 6: else if then 7: 8: else 9: dropped 10: end if 11: end for |
Algorithm 2 CDF-Based Quantization |
INPUT: % Channel measurement, RSS or CSI INPUT: QL % Quantization level OUTPUT: % Key 1: % CDF calculation 2: % Threshold 3: for do 4: % Threshold 5: end for 6: 7: Construct Gray code and assign them to different intervals 8: for do 9: if then 10: 11: end if 12: end for |
Algorithm 3 Secure Sketch |
INPUT: , % Quantized keys of Alice and Bob INPUT: C % ECC set shared by Alice and Bob OUTPUT: , % Reconciled key 1: Alice randomly selects c from an ECC set C 2: Alice calculates 3: Alice transmits s to Bob through a public channel 4: Bob receives s 5: Bob calculates 6: Bob decodes to get c 7: Bob calculates % Alice and Bob agree on the same key |
3.2. Application
4. Physical Layer Encryption
4.1. Procedure
4.2. Algorithm Prototype
4.3. Practical Implementation
5. Future Work Suggestions
5.1. Physical Layer Key Generation
5.2. Physical Layer Encryption
6. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
Abbreviations
ASIC | Application-specific integrated circuit |
BLE | Bluetooth low power |
CDF | Cumulative distribution functions |
CIR | Channel impulse response |
CMOS | Complementary metal-oxide-semiconductor |
CSI | Channel state information |
DSSS | Direct sequence spread spectrum |
ECC | Error correction code |
FPGA | Field-programmable gate array |
IEEE | The Institute of Electrical and Electronics Engineers |
IFFT | Inverse fast Fourier transform |
IoT | Internet of Things |
ISM | Industrial, scientific and medical |
FHSS | Frequency hopping spread spectrum |
MAC | Media access control |
NFC | Near field communication |
NIC | Network interface card |
OFDM | Orthogonal frequency-division multiplexing |
PKC | Public key cryptography |
PKI | Public key infrastructure |
PLE | Physical layer encryption |
PLS | Physical layer security |
RFID | Radio-frequency identification |
RSS | Received signal strength |
SCI | Side-channel information |
TDD | Time-division duplex |
TLS | Transport layer security |
Wi-Fi | Wireless fidelity |
WLAN | Wireless local area network |
WPA | Wi-Fi protected access |
WSN | Wireless sensor network |
References
- Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surveys Tuts. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Stankovic, J.A. Research directions for the internet of things. IEEE Internet Things J. 2014, 1, 3–9. [Google Scholar] [CrossRef]
- Walport, M. The Internet of Things: Making the most of the Second Digital Revolution, A report by the UK Government Chief Scientific Adviser. Technical Report; 2014. Available online: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/409774/14-1230-internet-of-things-review.pdf (accessed on 22 June 2017).
- The Internet of Things: Five critical questions. 2015. Available online: http://www.mckinsey.com/industries/high-tech/our-insights/the-internet-of-things-five-critical-questions (accessed on 22 June 2017).
- A Partnership to Secure and Protect the Emerging Internet of Things. 2015. Available online: http://nsf.gov/news/news_summ.jsp?cntn_id=136104&org=NSF (accessed on 22 June 2017).
- IERC—European Research Cluster on the Internet of Things. Available online: http://www.internet-of-things-research.eu/ (accessed on 22 June 2017).
- New Internet of Things Research Hub Announced. 2016. Available online: https://www.epsrc.ac.uk/newsevents/news/iotresearchhub/ (accessed on 22 June 2017).
- Nordrum, A. The Internet of Fewer Things. 2016. Available online: http://spectrum.ieee.org/telecom/internet/the-internet-of-fewer-things (accessed on 22 June 2017).
- Evans, D. Internet Of Things Research Study. Technical Report, Cisco. 2011. Available online: http://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf (accessed on 22 June 2017).
- Grau, A. How to Build a Safer Internet of Things. 2015. Available online: http://spectrum.ieee.org/telecom/security/how-to-build-a-safer-internet-of-things (accessed on 22 June 2017).
- Internet of things research study. Technical report, HP. 2015. Available online: https://www.hpe.com/h20195/v2/GetPDF.aspx/4AA5-4759ENN.pdf (accessed on 22 June 2017).
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
- Granjal, J.; Monteiro, E.; Sa Silva, J. Security for the Internet of Things: A survey of existing protocols and open research issues. IEEE Commun. Surveys Tuts. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
- Dieks, T.; Rescorla, E. The Transport Layer Security (TLS) Protocol. Available online: https://tools.ietf.org/html/rfc5246 (accessed on 17 August 2017).
- Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 6: Medium Access Control (MAC) Security Enhancements; Technical Report 802.11i; IEEE: Piscataway, NJ, USA, 2004.
- Trappe, W.; Howard, R.; Moore, R.S. Low-Energy Security: Limits and Opportunities in the Internet of Things. IEEE Secur. Priv. 2015, 13, 14–21. [Google Scholar] [CrossRef]
- Cheng, C.; Lu, R.; Petzoldt, A.; Takagi, T. Securing the Internet of Things in a Quantum World. IEEE Commun. Mag. 2017, 55, 116–120. [Google Scholar] [CrossRef]
- Rahbari, H.; Krunz, M. Secrecy beyond encryption: Obfuscating transmission signatures in wireless communications. IEEE Commun. Mag. 2015, 53, 54–60. [Google Scholar] [CrossRef]
- Zhou, X.; Song, L.; Zhang, Y. Physical Layer Security in Wireless Communications; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
- He, B.; Zhou, X.; Abhayapala, T.D. Wireless physical layer security with imperfect channel state information: A survey. ZTE Commun. 2013, 11, 11–19. [Google Scholar]
- Mukherjee, A.; Fakoorian, S.; Huang, J.; Swindlehurst, A. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surveys Tuts. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
- Liu, Y.; Chen, H.H.; Wang, L. Physical layer security for next generation wireless networks: Theories, Technologies, and Challenges. IEEE Commun. Surveys Tuts. 2017, 19, 347–376. [Google Scholar] [CrossRef]
- Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
- Ma, S.; Hempel, M.; Yang, Y.L.; Sharif, H. An approach to secure wireless communications using randomized eigenvector-based jamming signals. In Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, Caen, France, 28 June–2 July 2010; pp. 1172–1176. [Google Scholar]
- Mukherjee, A.; Swindlehurst, A.L. Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Trans. Signal Process. 2011, 59, 351–361. [Google Scholar] [CrossRef]
- Zhang, J.; Duong, T.Q.; Marshall, A.; Woods, R. Key Generation from Wireless Channels: A Review. IEEE Access 2016, 4, 614–626. [Google Scholar] [CrossRef]
- Mukherjee, A. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. Proc. IEEE 2015, 103, 1747–1761. [Google Scholar] [CrossRef]
- Zeng, K. Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Commun. Mag. 2015, 53, 33–39. [Google Scholar] [CrossRef]
- Janiak, S. Three Ways Bluetooth® Smart Technology Enables Innovation for the Internet of Things. 2015. Available online: http://blog.bluetooth.com/three-ways-bluetooth-smart-technology-enables-innovation-for-the-internet-of-things/ (accessed on 22 June 2017).
- LoRa Alliance. Available online: https://www.lora-alliance.org/ (accessed on 22 June 2017).
- Zenger, C.T.; Chur, M.J.; Posielek, J.F.; Paar, C.; Wunder, G. A Novel Key Generating Architecture for Wireless Low-Resource Devices. In Proceedings of the 2014 International Workshop on Secure Internet of Things (SIoT), Wroclaw, Poland, 10 September 2014; pp. 26–34. [Google Scholar]
- Ahlswede, R.; Csiszar, I. Common randomness in information theory and cryptography—Part I: Secret sharing. IEEE Trans. Inf. Theory 1993, 39, 1121–1132. [Google Scholar] [CrossRef]
- Maurer, U.M. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 1993, 39, 733–742. [Google Scholar] [CrossRef]
- Zenger, C.T.; Pietersz, M.; Zimmer, J.; Posielek, J.F.; Lenze, T.; Paar, C. Authenticated key establishment for low-resource devices exploiting correlated random channels. Comput. Netw. 2016, 109, 105–123. [Google Scholar] [CrossRef]
- Mathur, S.; Trappe, W.; Mandayam, N.; Ye, C.; Reznik, A. Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MobiCom), San Francisco, CA, USA, 14–19 September 2008; pp. 128–139. [Google Scholar]
- Jana, S.; Premnath, S.N.; Clark, M.; Kasera, S.K.; Patwari, N.; Krishnamurthy, S.V. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MobiCom), Beijing, China, 20–25 September 2009; pp. 321–332. [Google Scholar]
- Zhang, J.; Woods, R.; Duong, T.Q.; Marshall, A.; Ding, Y. Experimental Study on Channel Reciprocity in Wireless Key Generation. In Proceedings of the 17th IEEE International Workshop Signal Processing Advances in Wireless Communications (SPAWC), Edinburgh, UK, 3–6 July 2016; pp. 1–5. [Google Scholar]
- Zhang, J.; Woods, R.; Duong, T.Q.; Marshall, A.; Ding, Y.; Huang, Y.; Xu, Q. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications. IEEE Access 2016, 4, 4464–4477. [Google Scholar] [CrossRef]
- Kajita, S.; Amano, T.; Yamaguchi, H.; Higashino, T.; Takai, M. Wi-Fi Channel Selection Based on Urban Interference Measurement. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Hiroshima, Japan, 28 November–1 December 2016; pp. 143–150. [Google Scholar]
- Chin, E.; Chieng, D.; Teh, V.; Natkaniec, M.; Loziak, K.; Gozdecki, J. Wireless link prediction and triggering using modified Ornstein–Uhlenbeck jump diffusion process. Wirel. Netw. 2014, 20, 379–396. [Google Scholar] [CrossRef]
- Santana, J.A.; Macías, E.; Suárez, Á.; Marrero, D.; Mena, V. Adaptive estimation of WiFi RSSI and its impact over advanced wireless services. In Mobile Networks and Applications; Springer Science+Business Media: New York, NY, USA, 2016; pp. 1–13. [Google Scholar]
- Zhang, J.; Marshall, A.; Woods, R.; Duong, T.Q. Efficient Key Generation by Exploiting Randomness from Channel Responses of Individual OFDM Subcarriers. IEEE Trans. Commun. 2016, 64, 2578–2588. [Google Scholar] [CrossRef]
- Zhang, J.; He, B.; Duong, T.Q.; Woods, R. On the Key Generation from Correlated Wireless Channels. IEEE Commun. Lett. 2017, 21, 961–964. [Google Scholar] [CrossRef]
- Liu, H.; Wang, Y.; Yang, J.; Chen, Y. Fast and practical secret key extraction by exploiting channel response. In Proceedings of the 32nd IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 3048–3056. [Google Scholar]
- Xi, W.; Li, X.; Qian, C.; Han, J.; Tang, S.; Zhao, J.; Zhao, K. KEEP: Fast secret key extraction protocol for D2D communication. In Proceedings of the 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), Hong Kong, China, 26–27 May 2014; pp. 350–359. [Google Scholar]
- Peng, Y.; Wang, P.; Xiang, W.; Li, Y. Secret Key Generation Based On Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels. IEEE Trans. Wirel. Commun. 2017, 16, 5176–5186. [Google Scholar] [CrossRef]
- Zeng, K.; Wu, D.; Chan, A.; Mohapatra, P. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In Proceedings of the 29th IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–9. [Google Scholar]
- Wallace, J.W.; Sharma, R.K. Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis. IEEE Trans. Inf. Forensics Secur. 2010, 5, 381–392. [Google Scholar]
- Chen, C.; Jensen, M.A. Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Trans. Mobile Comput. 2011, 10, 205–215. [Google Scholar] [CrossRef]
- Jorswieck, E.A.; Wolf, A.; Engelmann, S. Secret key generation from reciprocal spatially correlated MIMO channels. In Proceedings of the IEEE GLOBECOM Workshop Trusted Communications with Physical Layer Security (TCPLS), Atlanta, GA, USA, 9–13 December 2013; pp. 1245–1250. [Google Scholar]
- Patwari, N.; Croft, J.; Jana, S.; Kasera, S.K. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mobile Comput. 2010, 9, 17–30. [Google Scholar] [CrossRef]
- Zenger, C.T.; Zimmer, J.; Paar, C. Security Analysis of Quantization Schemes for Channel-based Key Extraction. In Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Coimbra, Portugal, 22–24 July 2015; pp. 267–272. [Google Scholar]
- Dodis, Y.; Ostrovsky, R.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 2008, 38, 97–139. [Google Scholar] [CrossRef]
- Huth, C.; Guillaume, R.; Strohm, T.; Duplys, P.; Samuel, I.A.; Güneysu, T. Information reconciliation schemes in physical-layer security: A survey. Comput. Netw. 2016, 109, 84–104. [Google Scholar] [CrossRef]
- Ali, S.; Sivaraman, V.; Ostry, D. Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices. IEEE Trans. Mobile Comput. 2014, 13, 2763–2776. [Google Scholar] [CrossRef]
- Premnath, S.N.; Gowda, P.L.; Kasera, S.K.; Patwari, N.; Ricci, R. Secret key extraction using Bluetooth wireless signal strength measurements. In Proceedings of the 11th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Singapore, 30 June–3 July 2014; pp. 293–301. [Google Scholar]
- Huo, F.; Gong, G. XOR encryption versus phase encryption, An in-depth analysis. IEEE Trans. Electromagn. Compat. 2015, 57, 903–911. [Google Scholar] [CrossRef]
- Reilly, D.; Kanter, G. Noise-enhanced encryption for physical layer security in an OFDM radio. In Proceedings of the IEEE Radio and Wireless Symposium (RWS), San Diego, CA, USA, 18–22 January 2009; pp. 344–347. [Google Scholar]
- Ma, R.; Dai, L.; Wang, Z.; Wang, J. Secure communication in TDS-OFDM system using constellation rotation and noise insertion. IEEE Trans. Consum. Electron. 2010, 56, 1328–1332. [Google Scholar] [CrossRef]
- Khan, M.A.; Asim, M.; Jeoti, V.; Manzoor, R.S. On secure OFDM system: Chaos based constellation scrambling. In Proceedings of the International Conference on Intelligent and Advanced Systems (ICIAS), Kuala Lumpur, Malaysia, 25–28 November 2007; pp. 484–488. [Google Scholar]
- Tseng, D.; Chiu, J. An OFDM speech scrambler without residual intelligibility. In Proceedings of the IEEE Region 10 Conference (TENCON), Taipei, Taiwan, 30 October–2 November 2007; pp. 1–4. [Google Scholar]
- Zhang, L.; Xin, X.; Liu, B.; Wang, Y. Secure OFDM-PON based on chaos scrambling. IEEE Photon. Technol. Lett. 2011, 23, 998–1000. [Google Scholar] [CrossRef]
- Li, H.; Wang, X.; Hou, W. Secure transmission in OFDM systems by using time domain scrambling. In Proceedings of the 77th IEEE Vehicular Technology Conference (VTC Spring), Dresden, Germany, 2–5 June 2013; pp. 1–5. [Google Scholar]
- Li, H.; Wang, X.; Zou, Y. Dynamic subcarrier coordinate interleaving for eavesdropping prevention in OFDM systems. IEEE Commun. Lett. 2014, 18, 1059–1062. [Google Scholar] [CrossRef]
- Li, H.; Wang, X.; Chouinard, J.Y. Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving. IEEE Trans. Wirel. Commun. 2015, 14, 1155–1165. [Google Scholar] [CrossRef]
- Zhang, J.; Marshall, A.; Woods, R.; Duong, T.Q. Design of an OFDM Physical Layer Encryption Scheme. IEEE Trans. Veh. Technol. 2017, 66, 2114–2127. [Google Scholar] [CrossRef]
- Nain, A.K.; Bandaru, J.; Zubair, M.A.; Pachamuthu, R. A Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design. IEEE Trans. Comput. 2017, 66, 1421–1427. [Google Scholar] [CrossRef]
- Wan, J.; Lopez, A.B.; Al Faruque, M.A. Exploiting wireless channel randomness to generate keys for automotive cyber-physical system security. In Proceedings of the 7th International Conference on Cyber-Physical Systems, Vienna, Austria, 11–14 April 2016; p. 13. [Google Scholar]
- Zhu, X.; Xu, F.; Novak, E.; Tan, C.C.; Li, Q.; Chen, G. Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios. IEEE Trans. Mobile Comput. 2017, 16, 2065–2078. [Google Scholar] [CrossRef]
- Li, X.; Liu, J.; Yao, Q.; Ma, J. Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks. IEEE Access 2017, 5, 5281–5291. [Google Scholar] [CrossRef]
- Abdelgader, A.M.; Wu, L. A secret key extraction technique applied in vehicular networks. In Proceedings of the IEEE International Conference on Computational Science and Engineering, Chengdu, China, 19–21 December 2014; pp. 1396–1403. [Google Scholar]
- Abdelgader, A.M.S.; Feng, S.; Wu, L. Exploiting the Randomness Inherent of the Channel for Secret Key Sharing in Vehicular Communications. Int. J. Intell. Transp. Syst. Res. 2017. [Google Scholar] [CrossRef]
- Vogt, H.; Ramm, K.; Sezgin, A. Practical Secret-Key Generation by Full-Duplex Nodes with Residual Self-Interference. In Proceedings of the 20th International ITG Workshop on Smart Antennas (WSA 2016), Munich, Germany, 9–11 March 2016; pp. 344–347. [Google Scholar]
- Wang, Q.; Su, H.; Ren, K.; Kim, K. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of the 30th IEEE (INFOCOM), Shanghai, China, 10–15 April 2011; pp. 1422–1430. [Google Scholar]
- Liu, H.; Yang, J.; Wang, Y.; Chen, Y.J.; Koksal, C.E. Group secret key generation via received signal strength: Protocols, achievable rates, and implementation. IEEE Trans. Mobile Comput. 2014, 13, 2820–2835. [Google Scholar] [CrossRef]
- Thai, C.D.T.; Lee, J.; Quek, T.Q. Secret group key generation in physical layer for mesh topology. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
- Zenger, C.; Vogt, H.; Zimmer, J.; Sezgin, A.; Paar, C. The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions. In Proceedings of the IEEE GLOBECOM Workshop Trusted Communications with Physical Layer Security (TCPLS), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
- Zafer, M.; Agrawal, D.; Srivatsa, M. Limitations of generating a secret key using wireless fading under active adversary. IEEE/ACM Trans. Netw. 2012, 20, 1440–1451. [Google Scholar] [CrossRef]
- Jin, R.; Zeng, K. Physical layer key agreement under signal injection attacks. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28–30 September 2015; pp. 254–262. [Google Scholar]
Technique | Frequency | Range | Data Rate | Security Countermeasure | Applications |
---|---|---|---|---|---|
IEEE 802.15.4 (Zigbee) | 2.4 GHz | 10 to 100 m | 250 kbps | AES in MAC layer | WSN, industrial, environment, and healthcare monitoring |
BLE | 2.4 GHz | 50 to 150 m | 1 Mbps | AES in link layer | Wearable devices, smartphones |
IEEE 802.11 n/ac | 2.4 or 5 GHz | 50 m | > 100 Mbps | WPA in MAC layer (with AES implemented) | Smart home, entertainment |
IEEE 802.11 ah | sub 1 GHz | 1 km | 150 kbps | Smart city, smart grid, smart home, healthcare, | |
LoRaWAN | sub 1 GHz | > 15 km | 0.3 kbps to 50 kbps | Encryption at network and application layer | Machine-to-machine, smart city, and industrial applications |
Protocol | Platform | Architecture | Resources | Energy | |||
---|---|---|---|---|---|---|---|
Code Size (kb) | Cycles | Computation (mJ) | Communication (mJ) | Total (mJ) | |||
Key generation | ARM Cortex-M3 | 32-bit | 1.033 | 302,297 | 2.246 | 0.187 | 2.433 |
Key generation | Intel MCS-51 | 8-bit | 1.137 | 1,345,205 | 5.206 | 0.187 | 5.393 |
ECDH | ARM Cortex-M3 | 32-bit | 5.918 | 38,774,000 | 100.96 | 0.064 | 101.024 |
ECDH | Intel MCS-51 | 8-bit | 8.749 | 1,734,400,000 | 528.45 | 0.064 | 528.514 |
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, J.; Duong, T.Q.; Woods, R.; Marshall, A. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview. Entropy 2017, 19, 420. https://doi.org/10.3390/e19080420
Zhang J, Duong TQ, Woods R, Marshall A. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview. Entropy. 2017; 19(8):420. https://doi.org/10.3390/e19080420
Chicago/Turabian StyleZhang, Junqing, Trung Q. Duong, Roger Woods, and Alan Marshall. 2017. "Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview" Entropy 19, no. 8: 420. https://doi.org/10.3390/e19080420
APA StyleZhang, J., Duong, T. Q., Woods, R., & Marshall, A. (2017). Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview. Entropy, 19(8), 420. https://doi.org/10.3390/e19080420