Next Article in Journal
Photonic Discrete-time Quantum Walks and Applications
Next Article in Special Issue
The Reconciliation of Multiple Conflicting Estimates: Entropy-Based and Axiomatic Approaches
Previous Article in Journal
Numerical and Non-Asymptotic Analysis of Elias’s and Peres’s Extractors with Finite Input Sequences
Previous Article in Special Issue
Information Geometric Approach on Most Informative Boolean Function Conjecture
Open AccessReview

A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions

by Li Sun 1,2,* and Qinghe Du 1,3
1
School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, China
2
State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
3
National Simulation Education Center for Communications and Information Systems, Xi’an Jiaotong University, Xi’an 710049, China
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(10), 730; https://doi.org/10.3390/e20100730
Received: 22 July 2018 / Revised: 24 August 2018 / Accepted: 20 September 2018 / Published: 23 September 2018
With the uninterrupted revolution of communications technologies and the great-leap-forward development of emerging applications, the ubiquitous deployment of Internet of Things (IoT) is imperative to accommodate constantly growing user demands and market scales. Communication security is critically important for the operations of IoT. Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, has drawn considerable attention from both the academia and the industries. However, the unique features of IoT, such as low-cost, wide-range coverage, massive connection, and diversified services, impose great challenges for the PLS protocol design in IoT. In this article, we present a comprehensive review of the PLS techniques toward IoT applications. The basic principle of PLS is first briefly introduced, followed by the survey of the existing PLS techniques. Afterwards, the characteristics of IoT are identified, based on which the challenges faced by PLS protocol design are summarized. Then, three newly-proposed PLS solutions are highlighted, which match the features of IoT well and are expected to be applied in the near future. Finally, we conclude the paper and point out some further research directions. View Full-Text
Keywords: Internet of Things; physical layer security; anti-eavesdropping; noise aggregation; constellation rotation; fountain code Internet of Things; physical layer security; anti-eavesdropping; noise aggregation; constellation rotation; fountain code
Show Figures

Figure 1

MDPI and ACS Style

Sun, L.; Du, Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy 2018, 20, 730.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop