Next Article in Journal
Adaptive Repetitive Control of A Linear Oscillating Motor under Periodic Hydraulic Step Load
Previous Article in Journal
Dual-Band Circularly Polarized Dielectric Resonator Antenna for WLAN and WiMAX Applications
Previous Article in Special Issue
SNPL: One Scheme of Securing Nodes in IoT Perception Layer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding

School of Cyber Engineering, Xidian University, Xi’an 710126, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(4), 1138; https://doi.org/10.3390/s20041138
Submission received: 20 January 2020 / Revised: 13 February 2020 / Accepted: 13 February 2020 / Published: 21 February 2020
(This article belongs to the Special Issue Threat Identification and Defence for Internet-of-Things)

Abstract

:
Smart homes have been shown to be one of the most important applications of Internet of Things (IoT); however, security issues are still the main drawback to be improved, especially facing the problem of terminal power constraint and distributed network architecture. In this paper, we propose a novel secure group data exchange protocol in smart homes with physical layer approaches which retains the benefit of key sharing needless and lightweight computation. As the core technique, nested lattice physical layer network coding is conduct in each sensor node to form a summed data at a home router. With such summed data, the untrusted home router attack and external eavesdropper attack can be resistant. Performance has been analyzed for the proposed protocol in terms of time slot cost, security resistance, and secrecy capacity. Finally, simulations have been conducted to demonstrate the theoretical analysis.

1. Introduction

With the continuous development of information technology, the smart era has arrived. Novel thoughts and applications have been proposed for smart phones, smart vehicles, smart grids, smart health, and so on. Interrelated with everyday life, the smart home has also been considered to improve the quality of life.
The idea of smart homes is connecting appliances together with the architecture of Internet of Things (IoT). The main application of smart homes can be classified but not limited to the following four categories [1,2,3].
  • Home control: home control is the most basic function that a home host can use as a central or remote controller to control smart devices.
  • Living condition optimization: The smart home system can optimize living conditions based on the data collected by sensors in terms of temperature, humidity, air quality, and so on.
  • Surveillance and security: smart home systems can protect the home physically by surveillance devices and smart door locks.
  • Digital entertainment: the entertainment system can connect all the devices into one Graphical User Interface (GUI) to apply a better entertainment experience.
We illustrate a smart home example in Figure 1. In this example, smart devices like smart light, air quantity sensor, smart temperature sensor, smart TV, surveillance device, smart door lock, and robotic cleaner are wirelessly connected to a home router, and the home router is wire connected with the Internet for more web services. The system model of the proposed protocol in this work is abstracted from this example.

1.1. Motivation

The tremendous application potential of smart homes has attracted the focus of academia and industry. However, another issue must be considered for better improvement of smart home, i.e., security issues [4,5]. Due to the wireless communication environment and the distributed network structure, smart home systems are facing a lot of attacks like Denial of Service (DoS) attack, black hole attack, Sybil attack, and so on.
To protect the smart home, two features of the sensors and devices in smart home should be considered. First, most of the sensors and devices are power and computation limited. Although such design enables optimization of the system’s power consumption, it leads to the fact that such nodes cannot operate large-scale computations. Second, the smart home system is designed with central authentication absent. Home routers can connect with all smart devices or nodes; however, the home router is not trustworthy enough for authentication. This case leads to the hard problem of key management in smart home. For the first problem, a lot of lightweight encryption [6,7,8,9] and lightweight authentication algorithms [10,11] have been proposed, but these algorithms are all based on a shared key which falls into the second problem. Thus, the existing security strategies are not suitable for smart homes and new directions should be considered.
Recently, physical layer security approach has attracted a lot of focus as an important supplement of traditional encryption-based security strategy. Moreover, the two main benefits of physical layer security are key needless and lightweight computation, which perfectly match the requirement of smart home security. Thus, it is desired to propose novel protocols based on physical layer security for smart home.

1.2. Related Work

Smart Home Security. The recent researches on smart home security are mainly focused on key management, device authentication, intrusion detection, and privacy preservation. For key management in smart homes, Reference [12] proposed lightweight session-key sharing in a smart home. Reference [13] designed the key establishment protocol considering power constraints. Also, in Reference [14], the authors considered key pairing for RF4CE ubiquitous smart homes. For device authentication, the authors in Reference [15] proposed a context-aware authentication for smart homes and the authors in Reference [16] proposed two-factor mutual authentication. For intrusion detection, Mehdi et al. investigated host-based intrusion detection in Reference [17] and Anthi et al. provided intrusion detection system with supervision for smart homes in Reference [18]. For privacy preservation, in Reference [19], a communication protocol has been proposed with a shared key by generating chaotic systems.
Physical Layer Security. The concept of physical layer security can be dated back to the basic research of Shannon in Reference [20], and Wyner generalized the concept in Reference [21] for practical use. The most relevant researches of physical layer security are those on the cooperative communications. Based on the credibility of the cooperative node, the physical layer security problem in cooperative communication can be divided into trusted relay security and untrusted relay security [22]. For the trusted relay security, the two-way relay usually conducts decode-and-forward to form a summed signal at the trusted relay [23,24]. By applying Multiple Inputs Multiple Outputs (MIMO) into cooperative communication, extra space redundancy will be used for securing transmission; see Reference [25] for distributed beamforming and Reference [26] for null space zero-forcing precoding. For untrusted relay security, Reference [27] reduced the obtained information at an untrusted relay with the help of a helper. Signal processing method is another way to resist the untrusted relay attack, the works in References [28,29] investigate the precoding design and the derivation of secrecy capacity for untrusted relay. Despite of the credibility of a relay node, another approach has been considered for securing two-way or multi-hop communication, i.e., physical layer network coding. Jayasinghe and coauthors focus on the secure beamforming for physical layer network coding for two-way relaying in Reference [30], and References [31,32] consider the multi-hop securing relaying with physical layer network coding.

1.3. Contributions

In this paper, we propose a novel secure group data exchange protocol in smart homes with physical layer network coding. The main contributions can be summarized as follows:
-
We propose group data exchange protocols with a physical layer security approach. Each sensor node in a smart home conducts nested lattice physical layer network code, and summed coded data is formed in the home router. Such summed coded data cannot be divided into original data by an untrusted home router and external eavesdropper.
-
We analyze the performance of our proposed protocol in terms of time slot cost, security resistance, and secrecy capacity. For the time slots cost, the proposed protocol is equal to the sensor node number. For security resistance, the summed coded data can prevent attacks from untrusted home routers as well as external eavesdroppers. For secrecy capacity, an expression has been derived for different attacks.
-
We conduct simulations to demonstrate the theoretical analysis. Firstly, we show that the time slots cost of the proposed protocol is less than Time Division Multiple Access (TDMA) and network layer coding approach. Secondly, we perform the secrecy capacity with an untrusted home router attack. Thirdly, we perform the secrecy capacity with an external eavesdropper attack. Lastly, we perform the secrecy capacity with both an untrusted home router and an external eavesdropper attack.

1.4. Organization

The rest of this paper is organized as follows: Section 2 introduces the system model and basic conditions and definitions. Section 3 proposes the secure group data exchange protocol with physical layer network coding. Section 4 analyzes the performance of proposed protocol. Section 5 conducts simulations to perform. Finally, Section 6 concludes this work.

2. Preliminaries and System Model

In this section, we introduce the system model of the proposed information exchange protocol in a smart home. The basic conditions and definitions, transmission model, and security model are involved in these section sequentially.

2.1. System Model

The proposed protocol considers the secure data exchange between different sensor nodes in a smart home. All the sensor nodes only directly connect with the home router, which is denoted as HR in the protocol. We abstracted the system model in Figure 2.
As the system model shown in Figure 2, we consider N sensor nodes in this work. The sensor node is shortened to SN in the protocol, and the ith sensor is denoted as S N i . Each SN connects with HR with a wireless path. Note that we consider the situation that each SN can only communicate with HR, so there is no wire or wireless path between different SNs.
The proposed protocol involves N time slots. In the first time slot, which is denoted as an up-link phase, each SN send its data to be exchanged in the HR. The up-link phase is also called multiple access (MAC). The second time slot to the last time slot is denoted as a down-link phase. In this phase, HR broadcasts the collect data from the first time slot to all SNs. The down-link phase is also called broadcast (BC).
Actually, with such a transmission assumption, the HR acts as a relay in whole transmissions. In addition, HR works in the Decode and Forward (DF) model in the proposed protocol, so HR will first decode the collect data after the first time slot transmission and forward the data in the second time slot. We will have another assumption about HR that HR is equipped with multiple antennas. Such an assumption is practical for almost all the home routers on the market. We denote the antenna number of HR as n H R and we have the constraint as n H R N 1 . Why must the antenna number satisfy this constraint? We will answer this question in the next section after the introducing of the up-link phase transmission.
We now discuss about the channel between HR and SN. We denote the up-link channel matrix between HR and S N i as h i . Due to the reason that HR is equipped with multiple antennas, h i is a matrix if S N i is also equipped with multiple antennas. If S N i is only equipped with one antenna, h i is a vector. For now, most of the sensors in smart homes are single antenna, so we only use such a situation. We also denote the down-link channel matrix as g i .
The SNs being equipped with a signal antenna is also the reason that N 1 time slots for the down-link phase are needed. For each, SN can only receive one data stream for one time slot; however, the HR has N 1 data streams that need to be broadcasted in the down-link phase. Such a situation can be easily explained with a detailed explanation of the protocol.
Finally, we discuss some definitions and notations in this paper. We use bold type in the equations to represent vectors and matrices and use normal type in the equations to represent scalars. Also, we use Tr · , · 1 , det · , and E · to denote the trace, inverse or pseudo-inverse determinant, and expectation of matrix, respectively.

2.2. Transmission Model

We begin to formulate the transmission model of the proposed protocol. In the up-link phase, each SN sends its data to HR. We take SN i as an example; then, the data to be exchange is denoted as d i . We assume the data is to be exchanged in binary field, so the elements of d i are 0 or 1. For the situation that the original data is not in binary field, the sensors convert them.
Before transmission, each SN conducts physical layer network coding for its own data:
c i = E d i
where E · denote the physical layer network encoding. In this proposed protocol, we apply the best performance for now, i.e., nested lattice code, into the smart home.
After the physical layer network coding, precoding is conducted for all SNs for signal processing. The precoding vector is denoted as P i , so the transmitting signal for SN i is as follows:
X i = P i · c i
After the up-link phase transmission, the received signal at HR is as follows:
Y H R = i = 1 n h i X i + z H R ,
where z H R is the noise vector of HR and is modeled by z H R CN 0 , I n HR .
With the received signal Y H R , HR first conducts parallel to serial conversion for the vector and conducts decode for each element Y H R i as follows:
Y ^ H R i = D Y H R i .
With the decoded Y ^ H R i , HR forwards each element in each time slot in the down-link phase. In the second time slot, HR forwards Y ^ H R 1 . Alike the up-link phase, precoding is also conducted for HR to generate the transmitting signal as follows:
X H R 2 = P H R 2 · Y ^ H R 1 .
The reason for the subscript 2 is that such a transmitting signal will be transmitted in the second time slot.
Then, HR broadcasts X H R 2 to all SNs in the second time slot. We take SNj as an example; the received signal is as follows:
Y j = g j · X H R 2 + z j ,
where z j is the noise at SNj modeled by z j CN 0 , 1 .
SNj conducts decoding for Y j to recover the data HR broadcast, and SNj stores the decoded data for the final recovering of all other data.
After decoding at the sensor node, the HR will begin the next time slot broadcasting. Identical with the second time slot, another round of precoding, broadcasting, recovering, and storing is conducted. The only part to be emphasized is that Y ^ H R t 1 is broadcast in the tth time slot. HR broadcasts the last data Y ^ H R N 1 in the Nth time slot. After this time slot, each user recovers all other datum from all other sensors with the help of its own data. The detail of the data recover will be discussed in the next section.

2.3. Security Model

We consider two types of attacks in our proposed protocol. The first attack is called as untrusted HR attack, and the second attack is an external eavesdropping attack.
For the untrusted HR attack, we have a pessimistic assumption that the home router itself is an attacker. Such assumption exists because the home router and the sensors may be from different manufacturers. Then, the home router may try to collect data from the sensors and to send it back to its own manufacturer under the policy of the user experience improvement program. The funny thing is that the collecting and sending back of the datum is totally legal, and the users usually ignored such situations. Moreover, almost all existing data exchange protocols cannot prevent the home router from reaching the data; thus, it is desired to consider a protocol to prevent the eavesdropping from the home router in the physical layer.
The external eavesdropper attack comes from two situations. First, the sensors which are not involved in the data exchange: The sensors in each round of data exchange are different, and the sensors which are not involved in this round may try to recover the exchanged data. Second, the sensors or home routers from other homes are also able to wiretap the channel due to the wireless communication environments. These sensors or router cannot be prevented with authentication, so we may try to prevent them in the physical layer.

2.4. Basic Conceptions and Notations for Nested Lattice Code

As in the literature review, nested lattice code has been shown to be the most efficient and reliable coding algorithm for now. Thus, we choose to use nested lattice code in the proposed protocol. Thus, in this subsection, we briefly introduce some basic conceptions and notations for nested lattice code.
Definition 1.
Lattice Λ: An n dimension lattice is a discrete subgroup of R n ; it is the linear combinations of some basis vectors:
Λ = λ = x G Λ : x Z n ,
where G Λ is called generator matrix for lattice Λ by defining as follows:
G g 1 t | | g n t t .
Definition 2.
Quantizer Q Λ · : The quantizer function of lattice is the mapping Q Λ · : R n Λ , i.e., mapping a vector to the closet lattice point as follows:
Q Λ x = a r g m i n λ Λ x λ ,
where · represents the Euclidean norm.
Definition 3.
Fundamental Region R Λ : R Λ is the Voronoi Region of the original, and Voronoi Region is defined as follows:
V Λ λ x : Q Λ x = λ ,
which is the closest points set of a lattice point.
Thus, the fundamental region is the following:
R Λ = x : Q Λ x = 0
Definition 4.
Modulo- Λ : The modulo-Λ operation is defined as follows:
x mod Λ x Q Λ ( x )
Definition 5.
Nested Lattices Λ f , Λ c : If Λ f is a lattice itself and Λ c is a sublattice of Λ f , i.e., Λ c Λ f , then the lattice pair Λ f , Λ c is called nested. Under such case, Λ f is called fine lattice and Λ c is called coarse lattice.
Definition 6.
Nested Lattice Code C : The nested lattice codebook C is defined as all the coset leaders in Λ f / Λ c as follows:
C Λ c , Λ f = Λ f mod Λ c .
Geometrically speaking, codeword C Λ c , Λ f is the lattice point of Λ f and lies in the fundamental region of Λ c :
C = { Λ f R Λ c } .
Example 1.
We give an example of nested lattice code. The fine lattice Λ f is generated by g 1 = ( 1 , 0 ) and g 2 = ( 1 / 2 , 3 / 2 ) . The coarse lattice is Λ c = 2 Λ f . We use Figure 3 to illustrate this example. In the figure, the Voronoi region of fine lattice is represented by a full line and the the Voronoi region of coarse lattice is represented by a dashed line. The four codewords of nested lattice is represented by the solid dots, and the other lattice point of fine lattice is represented by the soft dots.

3. The Proposed Data Exchange Protocol

In this section, we will introduce the proposed secure group data exchange protocol in a smart home with physical layer network coding. According to the system model, the discussion on the protocol is also divided into three parts: up-link phase, decode-and-forward, and down-link phase.

3.1. Up-Link Phase

In the up-link phase, all SNs send their data to HR at the same time. Before transmitting, each SN conducts physical layer network coding for secure, reliable, and efficient transmission. As in the literature review, nested lattice code has been shown to be the most efficient and reliable coding algorithm for now. Thus, we choose to use nested lattice code in the proposed protocol. The basic introduction of nested lattice code has been discussed in the last section, and we denote the nested lattice code as C = c 1 , c 2 , , c i , . The encoding could be rewritten as follows:
E · : d i c i .
After the encoding, each SN conducts precoding P i to generate n H R equivalent parallelized subchannels. The signal processing algorithm could be referred to in References [28,29,33], especially the work in Reference [33] presents the group information exchange. In this work, the neighbour nodes align its signals into the same subchannel. Similar to this work, the data from S N i and S N N 1 and from S N i and S N N + 1 are aligned into the same subchannels. Especially, S N 1 only aligns its data with S N 2 in the first subchannel and S N N only aligns its data with S N N 1 in the last subchannel. We focus the physical layer network coding in this work, so we will not go into detail on the design of P i .
Before we introduce the decode and forward in HR, we recall the question of the antenna number constraint n H R N + 1 . Due to each SN aligning its data with its neighbour SN for two times and S N 1 and S N N only aligning one time, at least N 1 subchannels are required. To provide at least N 1 independent data streams, HR must have at least N 1 antennas.

3.2. Decode and Forward in HR

After the up-link phase transmission, HR receives the converged data from all SNs. The precoding matrices reduce the wireless channel interference, generate N 1 subchannels, and align the coded data from two neighbour SNs into the same subchannel. Thus, the received signal at HR could be written as follows:
Y H R = i = 1 n h i X i + z H R = c 1 c 2 c 2 c 3 c i 1 c i c i c i + 1 c N 1 c N + z H R
Y H R is an N 1 × 1 vector, and we conduct parallel to serial conversion to convert this vector into N 1 elements as follows:
Y H R i = c i c i + 1 + z H R i .
Then, the nested lattice code decoding is conducted for each element to recover the sum code of two neighbour SNs. By the nested lattice decoding, Y H R i is sent by nearest point quantizer as follows:
Y ^ H R i = Y H R mod Λ c = c i c i + 1 + z H R i mod Λ c .
To be noted, the decoded data is still a codeword in Λ f , Λ c and HR will broadcast the decoded words in the down-link phase. Before that, we give an example to show the decode at HR.
Example 2.
We follow Example 1, i.e., the fine lattice Λ f is generated by g 1 = ( 1 , 0 ) and g 2 = ( 1 / 2 , 3 / 2 ) and the coarse lattice is Λ c = 2 Λ f . The sent code at S N i is 01, which is shown as a green diamond in Figure 4, and the sent code at S N i + 1 is 11, which is shown as an orange diamond. The noise is shown as a blue arrow, and the nearest point quantizer sent y i back to codeword as y ^ i and is shown as a red dot.

3.3. Down-link Phase

After decoding, HR broadcasts the decoded word in the down-link phase. Due to the reason that SN is only equipped with a single antenna, HR can only broadcast one summed codeword in each time slot. Recalling that there are N 1 summed codewords, the down-link phase needs N 1 time slots to accomplish the broadcasting.
The up-link phase costs one time slot; the down-link phase begins in the second time slot. In this time slot, HR broadcasts the first element of the decoded word, i.e., Y ^ H R = c 1 c 2 . Similarly, in the tth time slot, HR broadcasts the t 1 th element of the decoded word as Y ^ H R = c t 1 c t .
The down-link precoding is also conducted for each time slot; however, we still avoid going into detail on the precoding design. The precoding at HR and filtering at each SN can successfully reduce the channel interference. Then, in the tth time slot, each SN applies nested lattice decoding to obtain c t 1 c t . After N 1 times broadcasting, each SN recovers all elements of the summed coded data. With these summed coded data, each SN recovers the original data from all other nodes with the help of its own data.
The recovering progress is also known as successive decoding algorithm. Taking S N i as an example, S N i receive c i 1 c i in the tth time slot. With the help of its own coded data c i , S N i recovers c i 1 and decodes it back to binary field. Identically, S N i recovers c i 2 with the help of c i 1 and successively recovers c i 3 and c i 4 until c 1 . In the t + 1 th time slot, S N i receives c i c i + 1 and S N i recovers c i + 1 . Then, in the t + 2 th time slot, S N i recovers c i + 2 with the help of c i + 1 . Identically, S N i recovers c i + 3 and c i + 4 until c N in the last time slot.

4. Performance Analysis for Proposed Protocol

In this section, we evaluate the performance of the proposed data exchange protocol. Three types of analyses have been conducted in terms of time slots cost, security resistant, and secrecy capacity.

4.1. Time Slots Cost Analysis

With the introduction of the proposed protocol, we can clearly see that the time slots cost of the protocol is N. We denote the time slots cost as T S P H Y , so we have T S P H Y = N . For comparison, we also give the time slots cost of the naive TDMA protocol and network layer coding protocol for N SN data exchanges.
For the naive TDMA, only one SN communicates with HR in each time slot. Thus, it takes 4 time slots for 2 SNs to accomplish data exchange. In total, the time slots cost can be computed as follows:
T S T D M A = 4 * C N 2 = 2 N * ( N 1 ) .
For network layer coding, it prefers opposite progress to the proposed protocol. In the up-link phase, each SN sends its data to HR from the first time slot to the Nth time slot. HR stores all the data, conducts network layer coding after the Nth time slot, and broadcasts the coded data in the N + 1 th time slot. Thus, the total time slots cost is T S N E T = N + 1 .
Apparently, the proposed protocol takes the least time slots cost for the same data exchange application. We will illustrate the numerical figure of this result in the next section, and we will show that the TDMA approach is not available when the SNs number is large.

4.2. Security-Resistant Analysis

Recalling the security model, two types of attacks have been considered, i.e., untrusted HR attack as well as external eavesdropping attack.

4.2.1. Untrusted HR Attack

As in the description in Section 2.3, HR can act two roles in a smart home. Usually, HR acts as the helper to assist the sensor nodes; however, HR can also act as a potential attacker to collect data from the sensors for improper usage.
For the proposed protocol, HR is the receiver for the up-link phase, so HR can distinguish the subchannels and the corresponding data in each subchannel. However, the received data at HR is a summed codeword of two neighbour SNs, and HR cannot directly recover the individual codewords from each SN.
We use the example in Section 3.2 to explain why the HR cannot recover the original data. The received data y ^ i at HR is the summed codeword of 01 from S N i and 11 from S N i + 1 . However, y ^ i can also be the sum of 11 from S N i and 01 from S N i + 1 . Also, it could be the sum of 00 and 10 or 10 and 00. In other words, for the received codeword y ^ i , it could be any original data. Thus, HR cannot tell which data SN has sent.

4.2.2. External Eavesdropping Attack

Before we analyze the security performance at the external eavesdropper, we first discuss the wiretap channel. Although the eavesdropping may come from two types of attackers, i.e., in home sensor and out home sensor, the situation is totally identical. Thus, we consider these two attackers as one type called E v e , and E v e i is the eavesdropper between S N i and HR in the up-link phase.
We denote the wiretap channel matrix between S N i , and E v e i is h i e , so the received signal at E v e i is as follows:
Y E i = i = 1 N h i e X i + z E i = i = 1 N h i e P i c i + z E i .
For Equation (20), the precoding matrices P i can reduce the channel interference h i ; however, only the situation h i e = h i E v e i can correctly recover the summed code. Otherwise, each eavesdropper can only receive some superimposed signals. Moreover, even the eavesdropper is very close to the HR and the channel is identical to HR. The eavesdropper can only recover the summed codeword, which cannot be separated from the original data.
For the down-link phase eavesdroppers, they cannot launch more effective attacks than in the up-link phase. Due to the evidence of data processing, the mutual information between the down-link phase Eve cannot be larger than the up-link phase. Thus, the down-link phase eavesdroppers cannot launch more effective attacks.

4.3. Secrecy Capacity Analysis

The secrecy capacity is the most general and important performance metric for physical layer security protocol. With different attack models, the analysis is in terms of untrusted HR, external Eve, and both HR and Eve.

4.3.1. Secrecy Capacity with Untrusted HR

We first derive the secrecy capacity with only untrusted HR attacks. In this case, each SN regulates its transmission rate R i U H to avoid HR obtaining enough information to correctly recover any information. Thus, the secrecy capacity under this case is as follows:
C s U H = 1 N i = 1 N R i U H R H U H + ,
where R U H is the obtained information at an untrusted HR. The coefficient 1 N is because it takes N time slots to accomplish the whole data exchange.
Such an expression for secrecy capacity is a general derivation, and we must explore the details of R i U H and R U H to obtain the final result. The R i U H of the proposed protocol is as follows:
R i U H = log det I + h i Q i h i t ,
where Q i is the input covariances of S N i :
Q i = E X i X i t = E P i c i c i t P i t = E P i P i t .
The third step can be obtained because the codeword is independent from each other.
For R H U H , it is the mutual information between HR and all SNs, so we have the following:
R H U H = I Y H R ; X 1 , X 2 , , X N = log det I + i = 1 N h i Q i h i t .
With Equations (22) and (24), Equation (21) can be rewritten as follows:
C s U H = 1 N i = 1 N R i U H R H U H + = 1 N log det i = 1 N I + h i Q i h i t I + i = 1 N h i Q i h i t .

4.3.2. Secrecy Capacity with External Eve

Under this case, the HR is not an attacker; however, external eavesdroppers exist to wiretap the channel. As in the aforementioned description, we only consider the eavesdroppers for the up-link phase as the down-link phase eavesdroppers cannot launch more effective attacks. In the up-link phase, each SN, HR, and the eavesdropper between them forms a classical wiretap channel. Thus, the secrecy capacity is the sum of the secrecy capacity for each wiretap subchannel. Then, we have the following:
C s E E = 1 N i = 1 N R i E E R E i E E + ,
where R i E E is the transmission rate of user i for an external eavesdropper attack and its analysis is identical to Equation (22) as follows:
R i E E = log det I + h i Q i h i t .
R E i E E is the obtained information of the external eavesdropper. Consider the situation that eavesdroppers may not wiretap some SN; we use the variable ν i to describe whether an eavesdropper exists. If an eavesdropper wiretaps S N i , we have ν i = 1 ; otherwise, ν i = 0 . Then, we give the expression of R E i E E as follows:
R E i E E = I Y E i ; X i = log det I + ν h i e Q i h i e t .
With Equations (27) and (28), Equation (26) can be rewritten as follows:
C s E E = 1 N i = 1 N R i E E R E i E E + = 1 N log det i = 1 N I + h i Q i h i t I + ν h i e Q i h i e t .

4.3.3. Secrecy Capacity with Both Attacks

In this last section, we consider the most pessimistic situation that the HR is untrusted and that there are external eavesdroppers. The analysis for such a situation is a composition of the former two cases, so we have the following:
C s U E = 1 N i = 1 N R i U E R E i U E R H U E + .
The analyses of R i U E , R E i U E , and R H U E are identical to the former two cases, so we have the following:
R i U E = log det I + h i Q i h i t ,
R E i U E = I Y E i ; X i = log det I + ν h i e Q i H i e t ,
R H U E = I Y H R ; X 1 , X 2 X N = log det I + i = 1 N h i Q i h i t .
With Equations (31), (32), and (33), Equation (30) can be written as follows:
C s U E = 1 N i = 1 N R i U E R E i U E R H U E + = 1 2 log det i = 1 N I + h i Q i h i t I + ν h i e Q i h i e t I + i = 1 N h i Q i h i t .

5. Simulation Results

In this section, simulations have been conducted to perform the proposed protocol in terms of time slots cost, secrecy capacity with an untrusted HR attack, secrecy capacity with an external eavesdropper, and secrecy capacity with an untrusted HR and an external eavesdropper attack.
Following the analysis in Section 4.1, we first illustrate the time slots cost in Figure 5 and Figure 6. We first compare the time slots cost between the naive TDMA approach and our proposed protocol in Figure 5. The results demonstrate the analysis that the time slots cost of TDMA is tremendous when the SN number is over 4. Although the time slots cost of our protocol is also increasing with the increase in SN number, the cost is still acceptable.
We also compare the time slots cost between the network code protocol and our proposed protocol. The time slots cost difference of these two approaches is always 1 whether the SN number increases or not. Thus, the result in Figure 6 is two parallel lines with a gap of 1.
In the following, we show the numerical results of secrecy capacity of the proposed protocol. For the later simulations, the SN is set as 5 and the antenna number of HR is 4. In each round, we generate new channels between SN and HR and with the channel between SN and Eve. The final results obtained over 10,000 rounds of iteration.
We first compare the secrecy capacity under an untrusted HR attack with channel capacity without any attacks, and the result is shown in Figure 7. Apparently the secrecy capacity is less than the channel capacity without an attack, which is in accordance with the evidence that we sacrificed the transmission recourse for improving the security.
We also compare the secrecy capacity under an external eavesdropper with channel capacity without any attacks. The simulation result is shown in Figure 8. We consider the cases of one eavesdropper, two eavesdroppers, three eavesdroppers, four eavesdroppers, and five eavesdroppers. According with theoretical analysis, the secrecy capacity is reduced with the increasing number of eavesdroppers. Another interesting fact that should be noticed is that, when comparing Figure 8 with Figure 7, the secrecy capacity under an untrusted HR attack is less than the secrecy capacity under one external eavesdropper, and this fact also reflects that the untrusted HR can launch more effective attacks than a single eavesdropper.
Finally, we compare the secrecy capacity under both untrusted HR and external eavesdropper attack with channel capacity without any attacks. The result is illustrated in Figure 9. Similar to the former simulation, we also consider the number of eavesdroppers from one to five. The result shows that the secrecy capacity is only half of the channel capacity for only one eavesdropper. For the worst case, i.e., five eavesdropper, an outage occurred when the channel situation was very bad.

6. Conclusions

As one of the main drawbacks of smart homes, security issues should not be neglected for further application of Internet of Things. To address this problem, we propose a novel secure group data exchange protocol in this paper for smart homes with a physical layer security approach. As the core technique to obtain secure data exchange, physical layer network coding is applied for smart homes. Nested lattice code is carried out at each sensor node, and summed coded data is formed in a home router. With such summed coded data, attacks can be prevented from both an untrusted home router as well as an external eavesdropper. We analyzed the proposed protocol in terms of time slots cost, security resistance, and secrecy capacity. Finally, we conducted simulations to demonstrate the theoretical analysis.
The future work of the proposed protocol includes the following:
  • The optimization of secrecy capacity, especially with strict power constraints of sensor nodes.
  • The design of a novel physical layer network coding algorithm with less computation cost.
  • The implementation of the proposed protocol into real smart home systems.

Author Contributions

Conceptualization, Q.L. and H.L.; methodology, Q.L. and W.Z.; software, Q.L., W.Z. and S.D.; validation, H.L. and Y.W.; formal analysis, Q.L., W.Z. and H.L.; investigation, W.Z. and S.D.; resources, Q.L. and S.D.; data curation, Q.L., S.D. and Y.W.; writing—original draft preparation, Q.L.; writing—review and editing, Q.L., H.L. and Y.W.; visualization, Q.L., W.Z. and S.D.; supervision, H.L.; project administration, H.L. and Y.W.; funding acquisition, Q.L., H.L. and Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Key Research and Development Program of China (2016YFB0801001); by National Natural Science Foundation of China under grants 61902297 and 61732022; by the Fundamental Research Funds for the Central Universities (grant No. JB191503); Shaanxi Inovation Team Project (2018TD-007); and by Xi’an Science and Technology Planning Project (201809168CX9JC10).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Feng, S.; Setoodeh, P.; Haykin, S. Smart Home: Cognitive Interactive People-Centric Internet of Things. IEEE Commun. Mag. 2017, 55, 34–39. [Google Scholar] [CrossRef]
  2. Alaa, M.; Zaidan, A.A.; Zaidan, B.B.; Talal, M.; Kiah, M.L.M. A review of smart home applications based on Internet of Things. J. Netw. Comput. Appl. 2017, 97, 48–65. [Google Scholar] [CrossRef]
  3. Xu, K.; Wang, X.; Wei, W.; Song, H.; Mao, B. Toward software defined smart home. IEEE Commun. Mag. 2016, 54, 116–122. [Google Scholar] [CrossRef]
  4. Fernandes, E.; Jung, J.; Prakash, A. Security Analysis of Emerging Smart Home Applications. In Proceedings of theIEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, 22–26 May 2016; pp. 636–654. [Google Scholar]
  5. Denning, T.; Kohno, T.; Levy, H.M. Computer security and the modern home. Commun. ACM 2013, 56, 94–103. [Google Scholar] [CrossRef]
  6. Muhammad, K.; Hamza, R.; Ahmad, J.; Lloret, J.; Wang, H.; Baik, S.W. Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption. IEEE Trans. Ind. Inform. 2018, 14, 3679–3689. [Google Scholar] [CrossRef]
  7. Tan, S.; Yeow, K.; Hwang, S.O. Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things. IEEE Internet Things J. 2019, 6, 6384–6395. [Google Scholar] [CrossRef]
  8. Buchmann, J.A.; Göpfert, F.; Güneysu, T.; Oder, T.; Pöppelmann, T. High-Performance and Lightweight Lattice-Based Public-Key Encryption. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi’an, China, 30 May 2016; pp. 2–9. [Google Scholar]
  9. Yu, W.; Köse, S. A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks. IEEE Trans. Circuits Syst. 2017, 64-I, 2934–2944. [Google Scholar] [CrossRef]
  10. Li, N.; Liu, D.; Nepal, S. Lightweight Mutual Authentication for IoT and Its Applications. T-SUSC 2017, 2, 359–370. [Google Scholar] [CrossRef]
  11. Xia, Z.; Wang, X.; Sun, X.; Wang, B. Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 2014, 7, 1283–1291. [Google Scholar] [CrossRef]
  12. Kumar, P.; Gurtov, A.; Iinatti, J.; Ylianttila, M.; Sain, M. Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 2015, 16, 254–264. [Google Scholar] [CrossRef] [Green Version]
  13. Li, Y. Design of a Key Establishment Protocol for Smart Home Energy Management System. In Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2013, Madrid, Spain, 5–7 June 2013; pp. 88–93. [Google Scholar]
  14. Han, K.; Kim, J.; Shon, T.; Ko, D. A novel secure key paring protocol for RF4CE ubiquitous smart home systems. Pers. Ubiquitous Comput. 2013, 17, 945–949. [Google Scholar] [CrossRef]
  15. Ashibani, Y.; Kauling, D.; Mahmoud, Q.H. A context-aware authentication service for smart homes. In Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, CCNC 2017, Las Vegas, NV, USA, 8–11 January 2017; pp. 588–589. [Google Scholar]
  16. Vaidya, B.; Makrakis, D.; Mouftah, H.T. Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw. 2016, 9, 171–183. [Google Scholar] [CrossRef]
  17. Nobakht, M.; Sivaraman, V.; Boreli, R. A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow. In Proceedings of the 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, 31 August–2 September 2016; pp. 147–156. [Google Scholar]
  18. Anthi, E.; Williams, L.; Slowinska, M.; Theodorakopoulos, G.; Burnap, P. A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 2019, 6, 9042–9053. [Google Scholar] [CrossRef]
  19. Song, T.; Li, R.; Mei, B.; Yu, J.; Xing, X.; Cheng, X. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes. IEEE Internet Things J. 2017, 4, 1844–1852. [Google Scholar] [CrossRef]
  20. Shannon, C. Communication theory of secrecy systems. Bell Labs Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  21. Wyner, A. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  22. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
  23. Wyrembelski, R.F.; Boche, H. Physical Layer Integration of Private, Common, and Confidential Messages in Bidirectional Relay Networks. IEEE Trans. Wirel. Commun. 2012, 11, 3170–3179. [Google Scholar] [CrossRef] [Green Version]
  24. He, X.; Yener, A. The Role of Feedback in Two-Way Secure Communications. IEEE Trans. Inf. Theory 2013, 59, 8115–8130. [Google Scholar] [CrossRef] [Green Version]
  25. Wang, H.; Yin, Q.; Xia, X. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks. IEEE Trans. Signal Process. 2012, 60, 3532–3545. [Google Scholar] [CrossRef]
  26. Yang, Y.; Sun, C.; Zhao, H.; Long, H.; Wang, W. Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks. IEEE Trans. Signal Process. 2014, 62, 2111–2126. [Google Scholar] [CrossRef]
  27. Zhang, R.; Song, L.; Han, Z.; Jiao, B. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers. IEEE Trans. Veh. Technol. 2012, 61, 3693–3704. [Google Scholar] [CrossRef]
  28. Mo, J.; Tao, M.; Liu, Y.; Wang, R. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay. IEEE Trans. Signal Process. 2014, 62, 2185–2199. [Google Scholar] [CrossRef] [Green Version]
  29. Liu, Q.; Gong, G.; Wang, Y.; Li, H. A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach. Mobile Inf. Syst. 2017, 2017, 1–12. [Google Scholar] [CrossRef]
  30. Jayasinghe, K.; Jayasinghe, P.; Rajatheva, N.; Latva-aho, M. Secure Beamforming Design for Physical Layer Network Coding Based MIMO Two-Way Relaying. IEEE Commun. Lett. 2014, 18, 1270–1273. [Google Scholar] [CrossRef]
  31. He, X.; Yener, A. End-to-End Secure Multi-Hop Communication with Untrusted Relays. IEEE Trans. Wirel. Commun. 2013, 12, 1–11. [Google Scholar] [CrossRef]
  32. Vatedka, S.; Kashyap, N.; Thangaraj, A. Secure Compute-and-Forward in a Bidirectional Relay. IEEE Trans. Inf. Theory 2015, 61, 2531–2556. [Google Scholar] [CrossRef] [Green Version]
  33. Zhou, L.; Liu, Q.; Wang, Y.; Li, H. Secure group information exchange scheme for vehicular ad hoc networks. Pers. Ubiquitous Comput. 2017, 21, 903–910. [Google Scholar] [CrossRef]
Figure 1. A smart home illustration.
Figure 1. A smart home illustration.
Sensors 20 01138 g001
Figure 2. The system model for N sensor nodes data exchange in a smart home.
Figure 2. The system model for N sensor nodes data exchange in a smart home.
Sensors 20 01138 g002
Figure 3. Nested lattice code with g 1 = ( 1 , 0 ) , g 2 = ( 1 / 2 , 3 / 2 ) , and Λ c = 2 Λ f .
Figure 3. Nested lattice code with g 1 = ( 1 , 0 ) , g 2 = ( 1 / 2 , 3 / 2 ) , and Λ c = 2 Λ f .
Sensors 20 01138 g003
Figure 4. Nested lattice decode example.
Figure 4. Nested lattice decode example.
Sensors 20 01138 g004
Figure 5. Time slots cost comparison between the TDMA protocol and the proposed protocol.
Figure 5. Time slots cost comparison between the TDMA protocol and the proposed protocol.
Sensors 20 01138 g005
Figure 6. Time slots cost comparison between the network code protocol and the proposed protocol.
Figure 6. Time slots cost comparison between the network code protocol and the proposed protocol.
Sensors 20 01138 g006
Figure 7. Comparison between secrecy capacity under an untrusted home router (HR) and channel capacity without attack.
Figure 7. Comparison between secrecy capacity under an untrusted home router (HR) and channel capacity without attack.
Sensors 20 01138 g007
Figure 8. Comparison between secrecy capacity under an external eavesdropper and channel capacity without attack.
Figure 8. Comparison between secrecy capacity under an external eavesdropper and channel capacity without attack.
Sensors 20 01138 g008
Figure 9. Comparison between secrecy capacity under an untrusted home router along with an external eavesdropper and channel capacity without attack.
Figure 9. Comparison between secrecy capacity under an untrusted home router along with an external eavesdropper and channel capacity without attack.
Sensors 20 01138 g009

Share and Cite

MDPI and ACS Style

Liu, Q.; Zhang, W.; Ding, S.; Li, H.; Wang, Y. Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding. Sensors 2020, 20, 1138. https://doi.org/10.3390/s20041138

AMA Style

Liu Q, Zhang W, Ding S, Li H, Wang Y. Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding. Sensors. 2020; 20(4):1138. https://doi.org/10.3390/s20041138

Chicago/Turabian Style

Liu, Qiao, Wenjing Zhang, Sheng Ding, Hui Li, and Yong Wang. 2020. "Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding" Sensors 20, no. 4: 1138. https://doi.org/10.3390/s20041138

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop