2018
DOI: 10.3390/e20100730
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions

Abstract: With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
64
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(64 citation statements)
references
References 76 publications
(112 reference statements)
0
64
0
Order By: Relevance
“…Conventionally, encryption/decryption algorithms that generate public/private keys are used to guarantee the security [1,2]. Recently, a security framework for the physical layer, called the wiretap channel or physical-layer security (PLS) [3][4][5][6][7][8][9][10][11], has been introduced as a potential solution. In PLS, difference between Shannon capacity of the data link and that of the eavesdropping link, named secrecy capacity, is commonly used to evaluate secrecy performance such as average secrecy capacity (ASC), secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC).…”
Section: Introductionmentioning
confidence: 99%
“…Conventionally, encryption/decryption algorithms that generate public/private keys are used to guarantee the security [1,2]. Recently, a security framework for the physical layer, called the wiretap channel or physical-layer security (PLS) [3][4][5][6][7][8][9][10][11], has been introduced as a potential solution. In PLS, difference between Shannon capacity of the data link and that of the eavesdropping link, named secrecy capacity, is commonly used to evaluate secrecy performance such as average secrecy capacity (ASC), secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC).…”
Section: Introductionmentioning
confidence: 99%
“…where and AE BE h h are the channel gain of the A-E and B-E links, respectively, and E n is AWGN with variance N0. During the broadcast signal phase, E also overhears the information from R. Hence, the received signal at E can be given by (12) The signal to noise ratio (SNR) at node A can be formulated as…”
Section: ( )mentioning
confidence: 99%
“…Due to its simple implementation (i.e., only exploiting characteristics of the wireless medium such as link distance and channel state information), PLS can be implemented efficiently in wireless communication networks, internet-of-things (IoT) networks, etc. [9][10][11][12][13][14]. The authors of [15] investigated a joint relay selection and power scheme to enhance the PLS of a cooperative network with a multiple-antenna source and a single-antenna destination in the presence of untrusted relays and passive eavesdroppers.…”
mentioning
confidence: 99%
“…For this reason, a recent trend in the literature is focused on PLS solutions for IoT applications [1], [2], [3], [4]. Lowcomplexity security frameworks for key generation based on PLS have also been proposed [5], together with solutions that consider adversaries having infinite computational capabilities [6] over realistic wireless channels [7].…”
Section: Introductionmentioning
confidence: 99%