1. Introduction
With the continuous development of information technology, the smart era has arrived. Novel thoughts and applications have been proposed for smart phones, smart vehicles, smart grids, smart health, and so on. Interrelated with everyday life, the smart home has also been considered to improve the quality of life.
The idea of smart homes is connecting appliances together with the architecture of Internet of Things (IoT). The main application of smart homes can be classified but not limited to the following four categories [
1,
2,
3].
Home control: home control is the most basic function that a home host can use as a central or remote controller to control smart devices.
Living condition optimization: The smart home system can optimize living conditions based on the data collected by sensors in terms of temperature, humidity, air quality, and so on.
Surveillance and security: smart home systems can protect the home physically by surveillance devices and smart door locks.
Digital entertainment: the entertainment system can connect all the devices into one Graphical User Interface (GUI) to apply a better entertainment experience.
We illustrate a smart home example in
Figure 1. In this example, smart devices like smart light, air quantity sensor, smart temperature sensor, smart TV, surveillance device, smart door lock, and robotic cleaner are wirelessly connected to a home router, and the home router is wire connected with the Internet for more web services. The system model of the proposed protocol in this work is abstracted from this example.
1.1. Motivation
The tremendous application potential of smart homes has attracted the focus of academia and industry. However, another issue must be considered for better improvement of smart home, i.e., security issues [
4,
5]. Due to the wireless communication environment and the distributed network structure, smart home systems are facing a lot of attacks like Denial of Service (DoS) attack, black hole attack, Sybil attack, and so on.
To protect the smart home, two features of the sensors and devices in smart home should be considered. First, most of the sensors and devices are power and computation limited. Although such design enables optimization of the system’s power consumption, it leads to the fact that such nodes cannot operate large-scale computations. Second, the smart home system is designed with central authentication absent. Home routers can connect with all smart devices or nodes; however, the home router is not trustworthy enough for authentication. This case leads to the hard problem of key management in smart home. For the first problem, a lot of lightweight encryption [
6,
7,
8,
9] and lightweight authentication algorithms [
10,
11] have been proposed, but these algorithms are all based on a shared key which falls into the second problem. Thus, the existing security strategies are not suitable for smart homes and new directions should be considered.
Recently, physical layer security approach has attracted a lot of focus as an important supplement of traditional encryption-based security strategy. Moreover, the two main benefits of physical layer security are key needless and lightweight computation, which perfectly match the requirement of smart home security. Thus, it is desired to propose novel protocols based on physical layer security for smart home.
1.2. Related Work
Smart Home Security. The recent researches on smart home security are mainly focused on key management, device authentication, intrusion detection, and privacy preservation. For key management in smart homes, Reference [
12] proposed lightweight session-key sharing in a smart home. Reference [
13] designed the key establishment protocol considering power constraints. Also, in Reference [
14], the authors considered key pairing for RF4CE ubiquitous smart homes. For device authentication, the authors in Reference [
15] proposed a context-aware authentication for smart homes and the authors in Reference [
16] proposed two-factor mutual authentication. For intrusion detection, Mehdi et al. investigated host-based intrusion detection in Reference [
17] and Anthi et al. provided intrusion detection system with supervision for smart homes in Reference [
18]. For privacy preservation, in Reference [
19], a communication protocol has been proposed with a shared key by generating chaotic systems.
Physical Layer Security. The concept of physical layer security can be dated back to the basic research of Shannon in Reference [
20], and Wyner generalized the concept in Reference [
21] for practical use. The most relevant researches of physical layer security are those on the cooperative communications. Based on the credibility of the cooperative node, the physical layer security problem in cooperative communication can be divided into trusted relay security and untrusted relay security [
22]. For the trusted relay security, the two-way relay usually conducts decode-and-forward to form a summed signal at the trusted relay [
23,
24]. By applying Multiple Inputs Multiple Outputs (MIMO) into cooperative communication, extra space redundancy will be used for securing transmission; see Reference [
25] for distributed beamforming and Reference [
26] for null space zero-forcing precoding. For untrusted relay security, Reference [
27] reduced the obtained information at an untrusted relay with the help of a helper. Signal processing method is another way to resist the untrusted relay attack, the works in References [
28,
29] investigate the precoding design and the derivation of secrecy capacity for untrusted relay. Despite of the credibility of a relay node, another approach has been considered for securing two-way or multi-hop communication, i.e., physical layer network coding. Jayasinghe and coauthors focus on the secure beamforming for physical layer network coding for two-way relaying in Reference [
30], and References [
31,
32] consider the multi-hop securing relaying with physical layer network coding.
1.3. Contributions
In this paper, we propose a novel secure group data exchange protocol in smart homes with physical layer network coding. The main contributions can be summarized as follows:
- -
We propose group data exchange protocols with a physical layer security approach. Each sensor node in a smart home conducts nested lattice physical layer network code, and summed coded data is formed in the home router. Such summed coded data cannot be divided into original data by an untrusted home router and external eavesdropper.
- -
We analyze the performance of our proposed protocol in terms of time slot cost, security resistance, and secrecy capacity. For the time slots cost, the proposed protocol is equal to the sensor node number. For security resistance, the summed coded data can prevent attacks from untrusted home routers as well as external eavesdroppers. For secrecy capacity, an expression has been derived for different attacks.
- -
We conduct simulations to demonstrate the theoretical analysis. Firstly, we show that the time slots cost of the proposed protocol is less than Time Division Multiple Access (TDMA) and network layer coding approach. Secondly, we perform the secrecy capacity with an untrusted home router attack. Thirdly, we perform the secrecy capacity with an external eavesdropper attack. Lastly, we perform the secrecy capacity with both an untrusted home router and an external eavesdropper attack.
1.4. Organization
The rest of this paper is organized as follows:
Section 2 introduces the system model and basic conditions and definitions.
Section 3 proposes the secure group data exchange protocol with physical layer network coding.
Section 4 analyzes the performance of proposed protocol.
Section 5 conducts simulations to perform. Finally,
Section 6 concludes this work.
2. Preliminaries and System Model
In this section, we introduce the system model of the proposed information exchange protocol in a smart home. The basic conditions and definitions, transmission model, and security model are involved in these section sequentially.
2.1. System Model
The proposed protocol considers the secure data exchange between different sensor nodes in a smart home. All the sensor nodes only directly connect with the home router, which is denoted as HR in the protocol. We abstracted the system model in
Figure 2.
As the system model shown in
Figure 2, we consider
N sensor nodes in this work. The sensor node is shortened to SN in the protocol, and the
ith sensor is denoted as
. Each SN connects with HR with a wireless path. Note that we consider the situation that each SN can only communicate with HR, so there is no wire or wireless path between different SNs.
The proposed protocol involves N time slots. In the first time slot, which is denoted as an up-link phase, each SN send its data to be exchanged in the HR. The up-link phase is also called multiple access (MAC). The second time slot to the last time slot is denoted as a down-link phase. In this phase, HR broadcasts the collect data from the first time slot to all SNs. The down-link phase is also called broadcast (BC).
Actually, with such a transmission assumption, the HR acts as a relay in whole transmissions. In addition, HR works in the Decode and Forward (DF) model in the proposed protocol, so HR will first decode the collect data after the first time slot transmission and forward the data in the second time slot. We will have another assumption about HR that HR is equipped with multiple antennas. Such an assumption is practical for almost all the home routers on the market. We denote the antenna number of HR as and we have the constraint as . Why must the antenna number satisfy this constraint? We will answer this question in the next section after the introducing of the up-link phase transmission.
We now discuss about the channel between HR and SN. We denote the up-link channel matrix between HR and as . Due to the reason that HR is equipped with multiple antennas, is a matrix if is also equipped with multiple antennas. If is only equipped with one antenna, is a vector. For now, most of the sensors in smart homes are single antenna, so we only use such a situation. We also denote the down-link channel matrix as .
The SNs being equipped with a signal antenna is also the reason that time slots for the down-link phase are needed. For each, SN can only receive one data stream for one time slot; however, the HR has data streams that need to be broadcasted in the down-link phase. Such a situation can be easily explained with a detailed explanation of the protocol.
Finally, we discuss some definitions and notations in this paper. We use bold type in the equations to represent vectors and matrices and use normal type in the equations to represent scalars. Also, we use , , , and to denote the trace, inverse or pseudo-inverse determinant, and expectation of matrix, respectively.
2.2. Transmission Model
We begin to formulate the transmission model of the proposed protocol. In the up-link phase, each SN sends its data to HR. We take SN i as an example; then, the data to be exchange is denoted as . We assume the data is to be exchanged in binary field, so the elements of are 0 or 1. For the situation that the original data is not in binary field, the sensors convert them.
Before transmission, each SN conducts physical layer network coding for its own data:
where
denote the physical layer network encoding. In this proposed protocol, we apply the best performance for now, i.e., nested lattice code, into the smart home.
After the physical layer network coding, precoding is conducted for all SNs for signal processing. The precoding vector is denoted as
, so the transmitting signal for SN
i is as follows:
After the up-link phase transmission, the received signal at HR is as follows:
where
is the noise vector of HR and is modeled by
.
With the received signal
, HR first conducts parallel to serial conversion for the vector and conducts decode for each element
as follows:
With the decoded
, HR forwards each element in each time slot in the down-link phase. In the second time slot, HR forwards
. Alike the up-link phase, precoding is also conducted for HR to generate the transmitting signal as follows:
The reason for the subscript 2 is that such a transmitting signal will be transmitted in the second time slot.
Then, HR broadcasts
to all SNs in the second time slot. We take SN
j as an example; the received signal is as follows:
where
is the noise at SN
j modeled by
.
SNj conducts decoding for to recover the data HR broadcast, and SNj stores the decoded data for the final recovering of all other data.
After decoding at the sensor node, the HR will begin the next time slot broadcasting. Identical with the second time slot, another round of precoding, broadcasting, recovering, and storing is conducted. The only part to be emphasized is that is broadcast in the tth time slot. HR broadcasts the last data in the Nth time slot. After this time slot, each user recovers all other datum from all other sensors with the help of its own data. The detail of the data recover will be discussed in the next section.
2.3. Security Model
We consider two types of attacks in our proposed protocol. The first attack is called as untrusted HR attack, and the second attack is an external eavesdropping attack.
For the untrusted HR attack, we have a pessimistic assumption that the home router itself is an attacker. Such assumption exists because the home router and the sensors may be from different manufacturers. Then, the home router may try to collect data from the sensors and to send it back to its own manufacturer under the policy of the user experience improvement program. The funny thing is that the collecting and sending back of the datum is totally legal, and the users usually ignored such situations. Moreover, almost all existing data exchange protocols cannot prevent the home router from reaching the data; thus, it is desired to consider a protocol to prevent the eavesdropping from the home router in the physical layer.
The external eavesdropper attack comes from two situations. First, the sensors which are not involved in the data exchange: The sensors in each round of data exchange are different, and the sensors which are not involved in this round may try to recover the exchanged data. Second, the sensors or home routers from other homes are also able to wiretap the channel due to the wireless communication environments. These sensors or router cannot be prevented with authentication, so we may try to prevent them in the physical layer.
2.4. Basic Conceptions and Notations for Nested Lattice Code
As in the literature review, nested lattice code has been shown to be the most efficient and reliable coding algorithm for now. Thus, we choose to use nested lattice code in the proposed protocol. Thus, in this subsection, we briefly introduce some basic conceptions and notations for nested lattice code.
Definition 1. Lattice Λ:
An n dimension lattice is a discrete subgroup of ; it is the linear combinations of some basis vectors:where is called generator matrix for lattice Λ
by defining as follows: Definition 2. Quantizer : The quantizer function of lattice is the mapping , i.e., mapping a vector to the closet lattice point as follows:where represents the Euclidean norm. Definition 3. Fundamental Region : is the Voronoi Region of the original, and Voronoi Region is defined as follows: which is the closest points set of a lattice point.
Thus, the fundamental region is the following: Definition 4. Modulo-: The modulo-Λ
operation is defined as follows: Definition 5. Nested Lattices : If is a lattice itself and is a sublattice of , i.e., , then the lattice pair is called nested. Under such case, is called fine lattice and is called coarse lattice.
Definition 6. Nested Lattice Code : The nested lattice codebook is defined as all the coset leaders in as follows: Geometrically speaking, codeword is the lattice point of and lies in the fundamental region of : Example 1. We give an example of nested lattice code. The fine lattice is generated by and . The coarse lattice is . We use Figure 3 to illustrate this example. In the figure, the Voronoi region of fine lattice is represented by a full line and the the Voronoi region of coarse lattice is represented by a dashed line. The four codewords of nested lattice is represented by the solid dots, and the other lattice point of fine lattice is represented by the soft dots. 3. The Proposed Data Exchange Protocol
In this section, we will introduce the proposed secure group data exchange protocol in a smart home with physical layer network coding. According to the system model, the discussion on the protocol is also divided into three parts: up-link phase, decode-and-forward, and down-link phase.
3.1. Up-Link Phase
In the up-link phase, all SNs send their data to HR at the same time. Before transmitting, each SN conducts physical layer network coding for secure, reliable, and efficient transmission. As in the literature review, nested lattice code has been shown to be the most efficient and reliable coding algorithm for now. Thus, we choose to use nested lattice code in the proposed protocol. The basic introduction of nested lattice code has been discussed in the last section, and we denote the nested lattice code as
. The encoding could be rewritten as follows:
After the encoding, each SN conducts precoding
to generate
equivalent parallelized subchannels. The signal processing algorithm could be referred to in References [
28,
29,
33], especially the work in Reference [
33] presents the group information exchange. In this work, the neighbour nodes align its signals into the same subchannel. Similar to this work, the data from
and
and from
and
are aligned into the same subchannels. Especially,
only aligns its data with
in the first subchannel and
only aligns its data with
in the last subchannel. We focus the physical layer network coding in this work, so we will not go into detail on the design of
.
Before we introduce the decode and forward in HR, we recall the question of the antenna number constraint . Due to each SN aligning its data with its neighbour SN for two times and and only aligning one time, at least subchannels are required. To provide at least independent data streams, HR must have at least antennas.
3.2. Decode and Forward in HR
After the up-link phase transmission, HR receives the converged data from all SNs. The precoding matrices reduce the wireless channel interference, generate
subchannels, and align the coded data from two neighbour SNs into the same subchannel. Thus, the received signal at HR could be written as follows:
is an
vector, and we conduct parallel to serial conversion to convert this vector into
elements as follows:
Then, the nested lattice code decoding is conducted for each element to recover the sum code of two neighbour SNs. By the nested lattice decoding,
is sent by nearest point quantizer as follows:
To be noted, the decoded data is still a codeword in and HR will broadcast the decoded words in the down-link phase. Before that, we give an example to show the decode at HR.
Example 2. We follow Example 1, i.e., the fine lattice is generated by and and the coarse lattice is . The sent code at is 01, which is shown as a green diamond in Figure 4, and the sent code at is 11, which is shown as an orange diamond. The noise is shown as a blue arrow, and the nearest point quantizer sent back to codeword as and is shown as a red dot. 3.3. Down-link Phase
After decoding, HR broadcasts the decoded word in the down-link phase. Due to the reason that SN is only equipped with a single antenna, HR can only broadcast one summed codeword in each time slot. Recalling that there are summed codewords, the down-link phase needs time slots to accomplish the broadcasting.
The up-link phase costs one time slot; the down-link phase begins in the second time slot. In this time slot, HR broadcasts the first element of the decoded word, i.e., . Similarly, in the tth time slot, HR broadcasts the th element of the decoded word as .
The down-link precoding is also conducted for each time slot; however, we still avoid going into detail on the precoding design. The precoding at HR and filtering at each SN can successfully reduce the channel interference. Then, in the tth time slot, each SN applies nested lattice decoding to obtain . After times broadcasting, each SN recovers all elements of the summed coded data. With these summed coded data, each SN recovers the original data from all other nodes with the help of its own data.
The recovering progress is also known as successive decoding algorithm. Taking as an example, receive in the tth time slot. With the help of its own coded data , recovers and decodes it back to binary field. Identically, recovers with the help of and successively recovers and until . In the th time slot, receives and recovers . Then, in the th time slot, recovers with the help of . Identically, recovers and until in the last time slot.
4. Performance Analysis for Proposed Protocol
In this section, we evaluate the performance of the proposed data exchange protocol. Three types of analyses have been conducted in terms of time slots cost, security resistant, and secrecy capacity.
4.1. Time Slots Cost Analysis
With the introduction of the proposed protocol, we can clearly see that the time slots cost of the protocol is N. We denote the time slots cost as , so we have . For comparison, we also give the time slots cost of the naive TDMA protocol and network layer coding protocol for N SN data exchanges.
For the naive TDMA, only one SN communicates with HR in each time slot. Thus, it takes 4 time slots for 2 SNs to accomplish data exchange. In total, the time slots cost can be computed as follows:
For network layer coding, it prefers opposite progress to the proposed protocol. In the up-link phase, each SN sends its data to HR from the first time slot to the Nth time slot. HR stores all the data, conducts network layer coding after the Nth time slot, and broadcasts the coded data in the th time slot. Thus, the total time slots cost is .
Apparently, the proposed protocol takes the least time slots cost for the same data exchange application. We will illustrate the numerical figure of this result in the next section, and we will show that the TDMA approach is not available when the SNs number is large.
4.2. Security-Resistant Analysis
Recalling the security model, two types of attacks have been considered, i.e., untrusted HR attack as well as external eavesdropping attack.
4.2.1. Untrusted HR Attack
As in the description in
Section 2.3, HR can act two roles in a smart home. Usually, HR acts as the helper to assist the sensor nodes; however, HR can also act as a potential attacker to collect data from the sensors for improper usage.
For the proposed protocol, HR is the receiver for the up-link phase, so HR can distinguish the subchannels and the corresponding data in each subchannel. However, the received data at HR is a summed codeword of two neighbour SNs, and HR cannot directly recover the individual codewords from each SN.
We use the example in
Section 3.2 to explain why the HR cannot recover the original data. The received data
at HR is the summed codeword of 01 from
and 11 from
. However,
can also be the sum of 11 from
and 01 from
. Also, it could be the sum of 00 and 10 or 10 and 00. In other words, for the received codeword
, it could be any original data. Thus, HR cannot tell which data SN has sent.
4.2.2. External Eavesdropping Attack
Before we analyze the security performance at the external eavesdropper, we first discuss the wiretap channel. Although the eavesdropping may come from two types of attackers, i.e., in home sensor and out home sensor, the situation is totally identical. Thus, we consider these two attackers as one type called , and is the eavesdropper between and HR in the up-link phase.
We denote the wiretap channel matrix between
, and
is
, so the received signal at
is as follows:
For Equation (
20), the precoding matrices
can reduce the channel interference
; however, only the situation
can correctly recover the summed code. Otherwise, each eavesdropper can only receive some superimposed signals. Moreover, even the eavesdropper is very close to the HR and the channel is identical to HR. The eavesdropper can only recover the summed codeword, which cannot be separated from the original data.
For the down-link phase eavesdroppers, they cannot launch more effective attacks than in the up-link phase. Due to the evidence of data processing, the mutual information between the down-link phase Eve cannot be larger than the up-link phase. Thus, the down-link phase eavesdroppers cannot launch more effective attacks.
4.3. Secrecy Capacity Analysis
The secrecy capacity is the most general and important performance metric for physical layer security protocol. With different attack models, the analysis is in terms of untrusted HR, external Eve, and both HR and Eve.
4.3.1. Secrecy Capacity with Untrusted HR
We first derive the secrecy capacity with only untrusted HR attacks. In this case, each SN regulates its transmission rate
to avoid HR obtaining enough information to correctly recover any information. Thus, the secrecy capacity under this case is as follows:
where
is the obtained information at an untrusted HR. The coefficient
is because it takes
N time slots to accomplish the whole data exchange.
Such an expression for secrecy capacity is a general derivation, and we must explore the details of
and
to obtain the final result. The
of the proposed protocol is as follows:
where
is the input covariances of
:
The third step can be obtained because the codeword is independent from each other.
For
, it is the mutual information between HR and all SNs, so we have the following:
With Equations (
22) and (
24), Equation (
21) can be rewritten as follows:
4.3.2. Secrecy Capacity with External Eve
Under this case, the HR is not an attacker; however, external eavesdroppers exist to wiretap the channel. As in the aforementioned description, we only consider the eavesdroppers for the up-link phase as the down-link phase eavesdroppers cannot launch more effective attacks. In the up-link phase, each SN, HR, and the eavesdropper between them forms a classical wiretap channel. Thus, the secrecy capacity is the sum of the secrecy capacity for each wiretap subchannel. Then, we have the following:
where
is the transmission rate of user
i for an external eavesdropper attack and its analysis is identical to Equation (
22) as follows:
is the obtained information of the external eavesdropper. Consider the situation that eavesdroppers may not wiretap some SN; we use the variable
to describe whether an eavesdropper exists. If an eavesdropper wiretaps
, we have
; otherwise,
. Then, we give the expression of
as follows:
With Equations (
27) and (
28), Equation (
26) can be rewritten as follows:
4.3.3. Secrecy Capacity with Both Attacks
In this last section, we consider the most pessimistic situation that the HR is untrusted and that there are external eavesdroppers. The analysis for such a situation is a composition of the former two cases, so we have the following:
The analyses of
,
, and
are identical to the former two cases, so we have the following:
With Equations (
31), (
32), and (
33), Equation (
30) can be written as follows:
5. Simulation Results
In this section, simulations have been conducted to perform the proposed protocol in terms of time slots cost, secrecy capacity with an untrusted HR attack, secrecy capacity with an external eavesdropper, and secrecy capacity with an untrusted HR and an external eavesdropper attack.
Following the analysis in
Section 4.1, we first illustrate the time slots cost in
Figure 5 and
Figure 6. We first compare the time slots cost between the naive TDMA approach and our proposed protocol in
Figure 5. The results demonstrate the analysis that the time slots cost of TDMA is tremendous when the SN number is over 4. Although the time slots cost of our protocol is also increasing with the increase in SN number, the cost is still acceptable.
We also compare the time slots cost between the network code protocol and our proposed protocol. The time slots cost difference of these two approaches is always 1 whether the SN number increases or not. Thus, the result in
Figure 6 is two parallel lines with a gap of 1.
In the following, we show the numerical results of secrecy capacity of the proposed protocol. For the later simulations, the SN is set as 5 and the antenna number of HR is 4. In each round, we generate new channels between SN and HR and with the channel between SN and Eve. The final results obtained over 10,000 rounds of iteration.
We first compare the secrecy capacity under an untrusted HR attack with channel capacity without any attacks, and the result is shown in
Figure 7. Apparently the secrecy capacity is less than the channel capacity without an attack, which is in accordance with the evidence that we sacrificed the transmission recourse for improving the security.
We also compare the secrecy capacity under an external eavesdropper with channel capacity without any attacks. The simulation result is shown in
Figure 8. We consider the cases of one eavesdropper, two eavesdroppers, three eavesdroppers, four eavesdroppers, and five eavesdroppers. According with theoretical analysis, the secrecy capacity is reduced with the increasing number of eavesdroppers. Another interesting fact that should be noticed is that, when comparing
Figure 8 with
Figure 7, the secrecy capacity under an untrusted HR attack is less than the secrecy capacity under one external eavesdropper, and this fact also reflects that the untrusted HR can launch more effective attacks than a single eavesdropper.
Finally, we compare the secrecy capacity under both untrusted HR and external eavesdropper attack with channel capacity without any attacks. The result is illustrated in
Figure 9. Similar to the former simulation, we also consider the number of eavesdroppers from one to five. The result shows that the secrecy capacity is only half of the channel capacity for only one eavesdropper. For the worst case, i.e., five eavesdropper, an outage occurred when the channel situation was very bad.
6. Conclusions
As one of the main drawbacks of smart homes, security issues should not be neglected for further application of Internet of Things. To address this problem, we propose a novel secure group data exchange protocol in this paper for smart homes with a physical layer security approach. As the core technique to obtain secure data exchange, physical layer network coding is applied for smart homes. Nested lattice code is carried out at each sensor node, and summed coded data is formed in a home router. With such summed coded data, attacks can be prevented from both an untrusted home router as well as an external eavesdropper. We analyzed the proposed protocol in terms of time slots cost, security resistance, and secrecy capacity. Finally, we conducted simulations to demonstrate the theoretical analysis.
The future work of the proposed protocol includes the following:
The optimization of secrecy capacity, especially with strict power constraints of sensor nodes.
The design of a novel physical layer network coding algorithm with less computation cost.
The implementation of the proposed protocol into real smart home systems.
Author Contributions
Conceptualization, Q.L. and H.L.; methodology, Q.L. and W.Z.; software, Q.L., W.Z. and S.D.; validation, H.L. and Y.W.; formal analysis, Q.L., W.Z. and H.L.; investigation, W.Z. and S.D.; resources, Q.L. and S.D.; data curation, Q.L., S.D. and Y.W.; writing—original draft preparation, Q.L.; writing—review and editing, Q.L., H.L. and Y.W.; visualization, Q.L., W.Z. and S.D.; supervision, H.L.; project administration, H.L. and Y.W.; funding acquisition, Q.L., H.L. and Y.W. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by National Key Research and Development Program of China (2016YFB0801001); by National Natural Science Foundation of China under grants 61902297 and 61732022; by the Fundamental Research Funds for the Central Universities (grant No. JB191503); Shaanxi Inovation Team Project (2018TD-007); and by Xi’an Science and Technology Planning Project (201809168CX9JC10).
Conflicts of Interest
The authors declare no conflict of interest.
References
- Feng, S.; Setoodeh, P.; Haykin, S. Smart Home: Cognitive Interactive People-Centric Internet of Things. IEEE Commun. Mag. 2017, 55, 34–39. [Google Scholar] [CrossRef]
- Alaa, M.; Zaidan, A.A.; Zaidan, B.B.; Talal, M.; Kiah, M.L.M. A review of smart home applications based on Internet of Things. J. Netw. Comput. Appl. 2017, 97, 48–65. [Google Scholar] [CrossRef]
- Xu, K.; Wang, X.; Wei, W.; Song, H.; Mao, B. Toward software defined smart home. IEEE Commun. Mag. 2016, 54, 116–122. [Google Scholar] [CrossRef]
- Fernandes, E.; Jung, J.; Prakash, A. Security Analysis of Emerging Smart Home Applications. In Proceedings of theIEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, 22–26 May 2016; pp. 636–654. [Google Scholar]
- Denning, T.; Kohno, T.; Levy, H.M. Computer security and the modern home. Commun. ACM 2013, 56, 94–103. [Google Scholar] [CrossRef]
- Muhammad, K.; Hamza, R.; Ahmad, J.; Lloret, J.; Wang, H.; Baik, S.W. Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption. IEEE Trans. Ind. Inform. 2018, 14, 3679–3689. [Google Scholar] [CrossRef]
- Tan, S.; Yeow, K.; Hwang, S.O. Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things. IEEE Internet Things J. 2019, 6, 6384–6395. [Google Scholar] [CrossRef]
- Buchmann, J.A.; Göpfert, F.; Güneysu, T.; Oder, T.; Pöppelmann, T. High-Performance and Lightweight Lattice-Based Public-Key Encryption. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi’an, China, 30 May 2016; pp. 2–9. [Google Scholar]
- Yu, W.; Köse, S. A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks. IEEE Trans. Circuits Syst. 2017, 64-I, 2934–2944. [Google Scholar] [CrossRef]
- Li, N.; Liu, D.; Nepal, S. Lightweight Mutual Authentication for IoT and Its Applications. T-SUSC 2017, 2, 359–370. [Google Scholar] [CrossRef]
- Xia, Z.; Wang, X.; Sun, X.; Wang, B. Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 2014, 7, 1283–1291. [Google Scholar] [CrossRef]
- Kumar, P.; Gurtov, A.; Iinatti, J.; Ylianttila, M.; Sain, M. Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 2015, 16, 254–264. [Google Scholar] [CrossRef] [Green Version]
- Li, Y. Design of a Key Establishment Protocol for Smart Home Energy Management System. In Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2013, Madrid, Spain, 5–7 June 2013; pp. 88–93. [Google Scholar]
- Han, K.; Kim, J.; Shon, T.; Ko, D. A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers. Ubiquitous Comput. 2013, 17, 945–949. [Google Scholar] [CrossRef]
- Ashibani, Y.; Kauling, D.; Mahmoud, Q.H. A context-aware authentication service for smart homes. In Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, CCNC 2017, Las Vegas, NV, USA, 8–11 January 2017; pp. 588–589. [Google Scholar]
- Vaidya, B.; Makrakis, D.; Mouftah, H.T. Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw. 2016, 9, 171–183. [Google Scholar] [CrossRef]
- Nobakht, M.; Sivaraman, V.; Boreli, R. A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow. In Proceedings of the 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, 31 August–2 September 2016; pp. 147–156. [Google Scholar]
- Anthi, E.; Williams, L.; Slowinska, M.; Theodorakopoulos, G.; Burnap, P. A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 2019, 6, 9042–9053. [Google Scholar] [CrossRef]
- Song, T.; Li, R.; Mei, B.; Yu, J.; Xing, X.; Cheng, X. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes. IEEE Internet Things J. 2017, 4, 1844–1852. [Google Scholar] [CrossRef]
- Shannon, C. Communication theory of secrecy systems. Bell Labs Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Wyner, A. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
- Wyrembelski, R.F.; Boche, H. Physical Layer Integration of Private, Common, and Confidential Messages in Bidirectional Relay Networks. IEEE Trans. Wirel. Commun. 2012, 11, 3170–3179. [Google Scholar] [CrossRef] [Green Version]
- He, X.; Yener, A. The Role of Feedback in Two-Way Secure Communications. IEEE Trans. Inf. Theory 2013, 59, 8115–8130. [Google Scholar] [CrossRef] [Green Version]
- Wang, H.; Yin, Q.; Xia, X. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks. IEEE Trans. Signal Process. 2012, 60, 3532–3545. [Google Scholar] [CrossRef]
- Yang, Y.; Sun, C.; Zhao, H.; Long, H.; Wang, W. Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks. IEEE Trans. Signal Process. 2014, 62, 2111–2126. [Google Scholar] [CrossRef]
- Zhang, R.; Song, L.; Han, Z.; Jiao, B. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers. IEEE Trans. Veh. Technol. 2012, 61, 3693–3704. [Google Scholar] [CrossRef]
- Mo, J.; Tao, M.; Liu, Y.; Wang, R. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay. IEEE Trans. Signal Process. 2014, 62, 2185–2199. [Google Scholar] [CrossRef] [Green Version]
- Liu, Q.; Gong, G.; Wang, Y.; Li, H. A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach. Mobile Inf. Syst. 2017, 2017, 1–12. [Google Scholar] [CrossRef]
- Jayasinghe, K.; Jayasinghe, P.; Rajatheva, N.; Latva-aho, M. Secure Beamforming Design for Physical Layer Network Coding Based MIMO Two-Way Relaying. IEEE Commun. Lett. 2014, 18, 1270–1273. [Google Scholar] [CrossRef]
- He, X.; Yener, A. End-to-End Secure Multi-Hop Communication with Untrusted Relays. IEEE Trans. Wirel. Commun. 2013, 12, 1–11. [Google Scholar] [CrossRef]
- Vatedka, S.; Kashyap, N.; Thangaraj, A. Secure Compute-and-Forward in a Bidirectional Relay. IEEE Trans. Inf. Theory 2015, 61, 2531–2556. [Google Scholar] [CrossRef] [Green Version]
- Zhou, L.; Liu, Q.; Wang, Y.; Li, H. Secure group information exchange scheme for vehicular ad hoc networks. Pers. Ubiquitous Comput. 2017, 21, 903–910. [Google Scholar] [CrossRef]
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).