Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints
- 11 September 2015
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 103 (10), 1747-1761
- https://doi.org/10.1109/jproc.2015.2466548
Abstract
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type communication (MTC) devices. The limited hardware, low-complexity, and severe energy constraints of MTC devices present unique communication and security challenges. As a result, robust physical-layer security methods that can supplement or even replace lightweight cryptographic protocols are appealing solutions. In this paper, we present an overview of low-complexity physical-layer security schemes that are suitable for the IoT. A local IoT deployment is modeled as a composition of multiple sensor and data subnetworks, with uplink communications from sensors to controllers, and downlink communications from controllers to actuators. The state of the art in physical-layer security for sensor networks is reviewed, followed by an overview of communication network security techniques. We then pinpoint the most energy-efficient and low-complexity security techniques that are best suited for IoT sensing applications. This is followed by a discussion of candidate low-complexity schemes for communication security, such as on-off switching and space-time block codes. The paper concludes by discussing open research issues and avenues for further work, especially the need for a theoretically well-founded and holistic approach for incorporating complexity constraints in physical-layer security designs.Keywords
This publication has 85 references indexed in Scilit:
- Cognitive network secrecy with interference engineeringIEEE Network, 2014
- Wireless Network Intrinsic SecrecyIEEE/ACM Transactions on Networking, 2014
- Physical Layer Security in Cellular Networks: A Stochastic Geometry ApproachIEEE Transactions on Wireless Communications, 2013
- Channel Aware Encryption and Decision Fusion for Wireless Sensor NetworksIEEE Transactions on Information Forensics and Security, 2013
- Percolation and Connectivity in the Intrinsically Secure Communications GraphIEEE Transactions on Information Theory, 2012
- Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and CollusionIEEE Transactions on Information Forensics and Security, 2011
- Secure Communication in Stochastic Wireless Networks—Part I: ConnectivityIEEE Transactions on Information Forensics and Security, 2011
- On the Throughput Cost of Physical Layer Security in Decentralized Wireless NetworksIEEE Transactions on Wireless Communications, 2011
- Secure Type-Based Multiple AccessIEEE Transactions on Information Forensics and Security, 2011
- Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009