A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
Abstract
:1. Introduction
2. Literature Review of PLS Techniques for IoT
2.1. Information-Theoretical Fundamentals of Physical Layer Security
2.2. PLS Schemes for IoT: State of the Art
2.2.1. Artificial Noise Injection
2.2.2. Compressive Sensing
2.2.3. Bit Flipping
2.2.4. Cooperative Secrecy
2.2.5. Physical Layer Encryption
2.3. Pros-and-Cons Analysis of the Existing PLS Techniques
3. Challenges of the PLS Protocol Design for Internet of Things
4. Promising PLS Solutions for IoT
4.1. Noise Aggregation and Self-Encryption
- (a)
- Within the first slot, the legitimate channel is advantageous over the eavesdropping channel. Hence, there is no need to perform the one time pad encryption. Instead, transmission secrecy of the source message is guaranteed by using the wiretap coding developed by information theoreticians. Assume the codeword transmitted from Alice is . Then, the received codewords at Bob and Eve will be (the upper left part of Figure 1) and (the lower left part of Figure 1), respectively, where and are the corresponding channel noises, respectively.
- (b)
- By exploiting the channel feedback from Bob to Alice, Alice can construct the capacity-achieving code to ensure that can be successfully decoded by Bob. Note that the eavesdropping channel is degraded compared to the legitimate channel during the 1st slot. Therefore, the decoding of at Eve is in failure. This motivates us that we can utilize as the key to encrypt the transmitted signal in slot 2. Assume the source data to be transmitted within slot 2 is . Then, the encrypted data is . At the end of this slot, the received codewords at Bob and Eve are expressed by (the upper right part of Figure 1) and (the lower right part of Figure 1), respectively.
- (c)
- Upon the reception of the signal , Bob performs channel decoding to recover . Since the “secret key” has already been obtained during slot 1, Bob can XOR with to produce , which is the sufficient statics for the detection of . Then, the signal detection at Bob is only impaired by the noise in slot 2. In contrast, the signals received at Eve during slot 1 and slot 2 are and , respectively. After the XOR operation which cancels out the interference term , the derived sufficient statics to detect will be . Note that because and are independent variables that are both unknown to Eve, the observation is statistically independent from , which offers no information for the recovery of . Obviously, the noises within both slot 1 and slot 2 are aggregated at Eve, thus degrading the signal detection performance of the eavesdropper.
4.2. Anti-Eavesdropping Signal Design via Constellation Rotation
4.3. Fountain-Coding Based Secure Transmission
4.4. Summary of the IoT-Oriented PLS Solutions
5. Conclusions and Future Directions
- (1)
- The PLS scheme design to combat active attacks. Until now, the majority of PLS solutions focus on the anti-eavesdropping techniques. However, eavesdropping is just a simple and passive attack form. In future IoT, there will be various forms of active malicious attacks, e.g., message modification, information disclosure, pilot spoofing, jamming, masquerade attack, etc. It remains an open problem as to how to exploit the PLS techniques to deal with these attacks. Cross-layer design may be a promising method to address this issue.
- (2)
- The new metric for performance evaluation. In PLS research, the widely adopted performance metrics include the achievable secrecy rate and the secrecy outage probability. These metrics are proposed from an information-theoretical point of view. In future IoT, the heterogeneity of the devices and the services cause the diversity in user demands. This in turn calls for the proposal of new metric for evaluating the performance of PLS schemes. The new metric should take the multi-dimensional user requirements, e.g., secrecy, delay, throughput, packet loss rate, etc., into consideration, and give a comprehensive evaluation of the developed schemes.
- (3)
- The use of PLS techniques to new systems and scenarios. Current studies are mainly concerned about the wireless sensor networks as an application scenario. In future IoT, several new systems are emerging, and many new application scenarios will be considered, e.g., the backscatter systems. Thus, innovative research works are needed, including new models, new analytical tools, etc.
Author Contributions
Funding
Conflicts of Interest
References
- Zanella, A.; Bui, N.; Castellani, A.; Vangelista, L.; Zorzi, M. Internet of things for smart cities. IEEE Internet Things J. 2014, 1, 22–32. [Google Scholar] [CrossRef]
- Jin, J.; Gubbi, J.; Marusic, S.; Palaniswami, M. An information framework for creating a smart city through internet of things. IEEE Internet Things J. 2014, 1, 112–121. [Google Scholar] [CrossRef]
- Gupta, A.; Jha, R.K. A survey of 5G network: Architecture and emerging technologies. IEEE Access 2015, 3, 1206–1232. [Google Scholar] [CrossRef]
- Zhang, R.; Wang, J.; Zhong, Z.; Li, X.; Guizani, M. Energy-efficient beamforming for 3.5 GHz 5G cellular networks based on 3D spatial channel characteristics. Comput. Commun. 2018, 121, 59–70. [Google Scholar] [CrossRef]
- Zhang, R.; Jiang, X.; Taleb, T.; Li, B.; Qin, H.; Zhong, Z.; Zhan, X. Connecting a city by wireless backhaul: 3D spatial channel characterization and modeling perspectives. IEEE Commun. Mag. 2017, 55, 62–69. [Google Scholar] [CrossRef]
- Akpakwu, G.A.; Silva, B.J.; Hancke, G.P.; Abu-Mahfouz, A.M. A survey on 5G networks for the internet of things: Communication technologies and challenges. IEEE Access 2018, 6, 3619–3647. [Google Scholar] [CrossRef]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
- 3GPP. Cellular System Support for Ultra Low Complexity and Low Throughput Internet of Things. TR 45.820. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2719 (accessed on 23 September 2018).
- Sun, L.; Du, Q. Physical layer security with its applications in 5G networks: A review. China Commun. 2017, 14, 1–14. [Google Scholar] [CrossRef]
- Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Di Renzo, M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Wyner, A.D. Wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Cheong, S.K.; Hellman, M.E. The Gaussian wiretap channel. IEEE Trans. Inf. Theory 1975, 24, 451–456. [Google Scholar] [CrossRef]
- Csiszar, I.; Körner, J. Broadcast channels with confidential messgaes. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef]
- Liang, Y.; Poor, H.V.; Shamai, S. Secure communication over fading channels. IEEE Trans. Inf. Theory 2008, 54, 2470–2492. [Google Scholar] [CrossRef]
- Khisti, A.; Wornell, G. Secure transmission with multiple antennas—Part I: The MISOME wiretap channels. IEEE Trans. Inf. Theory 2010, 56, 3088–3104. [Google Scholar] [CrossRef]
- Khisti, A.; Wornell, G. Secure transmission with multiple antennas—Part II: The MIMOME wiretap channels. IEEE Trans. Inf. Theory 2010, 56, 5515–5532. [Google Scholar] [CrossRef]
- Barros, J.; Rodrigues, M.R.D. Secrecy capacity of wireless channels. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Seattle, WA, USA, 9–14 July 2006; pp. 356–360. [Google Scholar]
- Gopala, P.K.; Lai, L.; El Gamal, H. On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 2008, 54, 4687–4698. [Google Scholar] [CrossRef]
- Kobayashi, M.; Debbah, M.; Shamai, S. Secure communication over frequency-selective fading channels: A practical vandermonde precoding. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 1–19. [Google Scholar] [CrossRef] [Green Version]
- Gündüz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. In Proceedings of the IEEE International Symposium on Information Theory and Its Applications (ISITA), Auckland, New Zealand, 7–10 December 2008; pp. 1–6. [Google Scholar]
- Ardestanizadeh, E.; Franceschetti, M.; Javidi, T.; Kim, Y.H. Wiretap channel with secure rate-limited feedback. IEEE Trans. Inf. Theory 2009, 55, 5353–5361. [Google Scholar] [CrossRef]
- Tekin, E.; Yener, A. The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 2008, 54, 2735–2751. [Google Scholar] [CrossRef]
- Lai, L.; El Gamal, H. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory 2008, 54, 4005–4019. [Google Scholar] [CrossRef]
- Liang, Y.; Somekh-Baruch, A.; Poor, H.V.; Shamai, S.; Verdú, S. Capacity of cognitive interference channels with and without secrecy. IEEE Trans. Inf. Theory 2009, 55, 604–619. [Google Scholar] [CrossRef]
- Mukherjee, A. Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proc. IEEE 2015, 103, 1747–1761. [Google Scholar] [CrossRef]
- Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
- Zhang, X.; McKay, M.R.; Zhou, X.; Heath, R.W. Artificial-noise-aided secure multi-antenna transmission with limited feedback. IEEE Trans. Wirel. Commun. 2015, 14, 2742–2754. [Google Scholar] [CrossRef]
- Wang, G.; Meng, C.; Heng, W.; Chen, X. Secrecy energy efficiency optimization in AN-aided distributed antenna systems with energy harvesting. IEEE Access. 2018, 6, 32830–32838. [Google Scholar] [CrossRef]
- Hu, L.; Wen, H.; Wu, B.; Pan, F.; Liao, R.F.; Song, H.; Tang, J.; Wang, X. Cooperative jamming for physical layer security enhancement in internet of things. IEEE Internet Things J. 2018, 5, 219–228. [Google Scholar] [CrossRef]
- Zhang, G.; Xu, J.; Wu, Q.; Cui, M.; Li, X.; Lin, F. Wireless powered cooperative jamming for secure OFDM system. IEEE Trans. Veh. Technol. 2018, 67, 1331–1346. [Google Scholar] [CrossRef]
- Liu, M.; Liu, Y. Power allocation for secure SWIPT systems with wireless-powered cooperative jamming. IEEE Commun. Lett. 2017, 21, 1353–1356. [Google Scholar] [CrossRef]
- Cumanan, K.; Alexandropoulos, G.C.; Ding, Z.; Karagiannidis, G.K. Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis. IEEE Trans. Veh. Technol. 2017, 66, 7495–7505. [Google Scholar] [CrossRef]
- Sun, L.; Ren, P.; Du, Q.; Wang, Y. Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 2016, 12, 291–300. [Google Scholar] [CrossRef]
- Kailkhura, B.; Wimalajeewa, T.; Varshney, P. Collaborative compressive detection with physical layer secrecy constraints. IEEE Trans. Signal Process. 2017, 65, 1013–1025. [Google Scholar] [CrossRef]
- Dautov, R.; Tsouri, G.R. Securing while sampling in wireless body area networks with application to electrocardiography. IEEE J. Biomed. Health Inform. 2016, 20, 135–142. [Google Scholar] [CrossRef] [PubMed]
- Choi, J. Secure transmissions via compressive sensing in multicarrier systems. IEEE Signal Process. Lett. 2016, 23, 1315–1319. [Google Scholar] [CrossRef]
- Yu, N.Y. Indistinguishability of compressed encryption with circulant matrices for wireless security. IEEE Signal Process. Lett. 2017, 24, 181–185. [Google Scholar] [CrossRef]
- Barcelo-Llado, J.E.; Morell, A.; Seco-Granados, G. Amplify-and-forward compressed sensing as an energy-efficient solution in wireless sensor networks. IEEE Sens. J. 2014, 14, 1710–1719. [Google Scholar] [CrossRef]
- Barcelo-Llado, J.E.; Morell, A.; Seco-Granados, G. Amplify-and-forward compressed sensing as a physical-layer secrecy solution in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 839–850. [Google Scholar] [CrossRef]
- Lyu, Q.; Han, G.; Fu, X. Physical layer security in multi-hop AF relay network based on compressed sensing. IEEE Commun. Lett. 2018, 99, 1–4. [Google Scholar]
- Jeon, H.; Hwang, D.; Choi, J.; Lee, H.; Ha, J. Secure type-based multiple access. IEEE Trans. Inf. Forensics Secur. 2011, 6, 763–774. [Google Scholar] [CrossRef]
- Jeon, H.; Choi, J.; McLaughlin, S.; Ha, J. Channel aware encryption and decision fusion for wireless networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 619–625. [Google Scholar] [CrossRef]
- Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperative relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
- Krikidis, I.; Thompson, J.S.; McLaughlin, S. Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 2009, 8, 5003–5011. [Google Scholar] [CrossRef]
- Zou, Y.; Wang, X.; Shen, W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef]
- Fan, L.; Lei, X.; Yang, N.; Duong, T.Q.; Karagiannidis, G.K. Secure multiple amplify-and-forward relaying with cochannel interference. IEEE J. Sel. Top. Signal Process. 2016, 10, 1494–1505. [Google Scholar] [CrossRef]
- Fan, L.; Lei, X.; Yang, N.; Duong, T.Q.; Karagiannidis, G.K. Secrecy cooperative networks with outdated relay selection over correlated fading channels. IEEE Trans. Veh. Technol. 2017, 66, 7599–7603. [Google Scholar] [CrossRef]
- He, X.; Yener, A. Two-hop secure communication using an untrusted relay. EURASIP J. Wirel. Commun. Netw. 2009, 2009, 1–13. [Google Scholar] [CrossRef]
- He, X.; Yener, A. Cooperation with an untrusted relay: A secrecy perspective. IEEE Trans. Inf. Theory 2010, 56, 3807–3827. [Google Scholar] [CrossRef]
- Sun, L.; Zhang, T.; Li, Y.; Niu, H. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Trans. Veh. Technol. 2012, 61, 3801–3807. [Google Scholar] [CrossRef]
- Sun, L.; Ren, P.; Du, Q.; Wang, Y.; Gao, Z. Security-aware relaying scheme for cooperative networks with untrusted relay nodes. IEEE Commun. Lett. 2015, 19, 463–466. [Google Scholar] [CrossRef]
- Wang, W.; Teh, K.C.; Li, K.H. Relay selection for secure successive AF relaying networks with untrusted nodes. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2466–2476. [Google Scholar] [CrossRef]
- Xu, H.; Sun, L.; Ren, P.; Du, Q.; Wang, Y. Cooperative privacy preserving scheme for downlink transmission in multiuser relay networks. IEEE Trans. Inf. Forensics Secur. 2017, 12, 825–839. [Google Scholar] [CrossRef]
- Xu, H.; Sun, L. Towards enhanced security for two-way untrusted relaying systems: A constellation overlapping scheme. In Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–7. [Google Scholar]
- Janna, S.; Premnath, S.N.; Clark, M.; Kasera, S.K.; Patwari, N.; Krishnamurthy, S.V. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th ACM MobiCom, Beijing, China, 20–25 September 2009; pp. 321–332. [Google Scholar]
- Zeng, K. Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Commun. Mag. 2015, 53, 33–39. [Google Scholar] [CrossRef]
- Wilson, R.; Tse, D.; Scholtz, R.A. Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Trans. Inf. Forensics Secur. 2007, 2, 364–375. [Google Scholar] [CrossRef]
- Tomasin, S.; Trentini, F.; Laurenti, N. Secret key agreement by LLR thresholding and syndrome feedback over AWGN channel. IEEE Commun. Lett. 2014, 18, 26–29. [Google Scholar] [CrossRef]
- Premnath, S.N.; Jana, S.; Croft, J.; Gowda, P.L.; Clark, M.; Kasera, S.K.; Patwari, N.; Krishnamurthy, S.V. Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 2013, 12, 917–930. [Google Scholar] [CrossRef]
- Soosahabi, R.; Naragi-Pour, M. Scalable PHY-layer security for distributed detection in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1118–1126. [Google Scholar] [CrossRef]
- Aysal, T.C.; Barner, K.E. Sensor data cryptography in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2008, 3, 273–289. [Google Scholar] [CrossRef]
- Hussain, M.; Du, Q.; Sun, L.; Ren, P. Security enhancement for video transmission via noise aggregation in immersive systems. Multimed. Tools Appl. 2016, 75, 5345–5357. [Google Scholar] [CrossRef]
- Sun, L.; Xu, H. Unequal secrecy protection for untrusted two-way relaying systems: Constellation overlapping and noise aggregation. IEEE Trans. Veh. Technol. 2018, 1–15. [Google Scholar] [CrossRef]
- Boutros, J.; Viterbo, E. Signal space diversity: A power- and bandwidth-efficient diversity technique for the Rayleigh fading channel. IEEE Trans. Inf. Theory 1998, 44, 1453–1467. [Google Scholar] [CrossRef]
- Sun, L.; Zhang, T.; Niu, H. Inter-relay interference in two-path digital relaying systems: Detrimental or beneficial? IEEE Trans. Wirel. Commun. 2011, 10, 2468–2473. [Google Scholar] [CrossRef]
- Lu, H.; Hong, P.L.; Xue, K.P. Analysis on decode-and-forward two-path relay networks: When and how to cooperate. IEEE Trans. Veh. Technol. 2016, 65, 5758–5763. [Google Scholar] [CrossRef]
- Sun, L.; Du, Q.; Ren, P.; Wang, Y. Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation. IEEE Trans. Veh. Technol. 2016, 65, 8767–8774. [Google Scholar] [CrossRef]
- Ren, C.; Chen, J.; Tellambura, C. Spectrum sharing with device-to-device successive relaying and hybrid complex field network coding. IEEE Trans. Veh. Technol. 2017, 66, 7947–7963. [Google Scholar] [CrossRef]
- Xu, H.; Sun, L.; Ren, P.; Du, Q. Securing two-way cooperative systems with an untrusted relay: A constellation-rotation aided approach. IEEE Commun. Lett. 2015, 19, 2270–2273. [Google Scholar] [CrossRef]
- Luby, M. LT codes. In Proceedings of the 43rd IEEE Annual Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 16–19 November 2002; Volume 1, pp. 271–280. [Google Scholar]
- Byers, J.; Luby, M.; Mitzenmacher, M. A digital fountain approach to asynchronous reliable multicast. IEEE J. Sel. Areas Commun. 2002, 20, 1528–1540. [Google Scholar] [CrossRef] [Green Version]
- Zhang, X.; Du, Q. Adaptive low-complexity erasure-correcting code based protocols for QoS-driven mobile multicast services over wireless networks. IEEE Trans. Veh. Technol. 2006, 55, 1633–1647. [Google Scholar] [CrossRef]
- Shokrollahi, A. Rapter codes. IEEE Trans. Inf. Theory 2006, 52, 2551–2567. [Google Scholar] [CrossRef]
- Nonenmacher, J.; Biersack, E.; Towsley, D. Partity-based loss recovery for reliable multicast transmission. IEEE/ACM Trans. Netw. 1998, 6, 349–361. [Google Scholar] [CrossRef]
- MacKay, D. Fountain codes. IEE Proc. Commun. 2005, 152, 1062–1068. [Google Scholar] [CrossRef]
- Niu, H.; Iwai, M.; Sezaki, K.; Sun, L.; Du, Q. Exploiting fountain codes for secure wireless delivery. IEEE Commun. Lett. 2014, 18, 777–780. [Google Scholar] [CrossRef]
- Khan, A.; Tassi, A.; Chatzigeorgiou, I. Rethinking the intercept probability of random linear network coding. IEEE Commun. Lett. 2015, 19, 1762–1765. [Google Scholar] [CrossRef]
- Karim, M.; Esmaeilzadeh, M.; Sadeghi, P. On reducing intercept probability for unsubscribed video layers using network coding. IEEE Commun. Lett. 2017, 21, 1385–1388. [Google Scholar] [CrossRef]
- Ho, T.; Médard, M.; Koetter, R.; Karger, D.; Effros, M.; Shi, J.; Leong, B. A random linear network coding approach to multicast. IEEE Trans. Inf. Theory 2006, 52, 4413–4430. [Google Scholar] [CrossRef]
- Li, B.; Li, X.; Zhang, R.; Tang, W.; Li, S. Joint power allocation and adaptive random network coding in wireless multicast networks. IEEE Trans. Commun. 2018, 66, 1520–1533. [Google Scholar] [CrossRef]
- Li, F.; Fu, S.; Liu, Z.; Qian, X. A cost-constrained video quality satisfaction study on mobile devices. IEEE Trans. Multimed. 2018, 20, 1154–1168. [Google Scholar] [CrossRef]
- Khan, A.; Chatzigeorgiou, I. Opportunistic relaying and random linear network coding for secure and reliable communication. IEEE Trans. Wirel. Commun. 2018, 17, 223–234. [Google Scholar] [CrossRef]
- Li, W.; Du, Q.; Sun, L.; Ren, P.; Wang, Y. Security enhanced via dynamic fountain code design for wireless delivery. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
- Sun, L.; Xu, H. Fountain-coding based secure communications exploiting outage prediction and limited feedback. IEEE Trans. Veh. Technol. 2018, 1–11, submitted. [Google Scholar]
PLS Technique | Advantages | Disadvantages | Implementation Complexity | Energy Consumption | Potential Application Scenarios |
---|---|---|---|---|---|
AN injection | AN generation can be easily realized | Additional energy consumption | Moderate | High | Telemedicine |
Compressive sensing | No need for additional power | Measurement matrix has to be shared | High | Low | Wireless body area networks |
Bit flipping | Signal processing operation at the transmitter is simple | Extra bandwidth and energy is needed | Low | High | Sensor networks |
Cooperative secrecy | Highly flexible and better security performance | Significant signaling overhead | High | Moderate | Unmanned aerial vehicle communications (UAV) |
Physical layer encryption | Easily incorporated with existing security protocols | Channel probing and secret key agreement is needed | High | Low | Remote coaching |
Noise aggregation | Easy to be implemented | Channel feedback is needed | Low | Low | Immersive systems, video surveillance |
Constellation rotation | Degree-of-freedom of the channels can be fully exploited | CSIT is needed | Moderate | Moderate | Device-to-device communications (D2D) |
Fountain coding | Comprehensive QoS guarantee | Channel feedback is needed | Low | Low | Industrial Internet of Things |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sun, L.; Du, Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy 2018, 20, 730. https://doi.org/10.3390/e20100730
Sun L, Du Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy. 2018; 20(10):730. https://doi.org/10.3390/e20100730
Chicago/Turabian StyleSun, Li, and Qinghe Du. 2018. "A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions" Entropy 20, no. 10: 730. https://doi.org/10.3390/e20100730
APA StyleSun, L., & Du, Q. (2018). A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy, 20(10), 730. https://doi.org/10.3390/e20100730