Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints

被引:253
作者
Mukherjee, Amitav [1 ]
机构
[1] Ericsson Res, Radio Access Technol Grp, San Jose, CA 95134 USA
关键词
Internet of Things (IoT); low complexity; physical-layer security; resource constraints; secure sensing; DISTRIBUTED DETECTION; BROADCAST CHANNELS; POWER ALLOCATION; WIRETAP CHANNELS; SECRECY; NETWORKS; CAPACITY; MACHINE; TRANSMISSION; CRYPTOGRAPHY;
D O I
10.1109/JPROC.2015.2466548
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) will feature pervasive sensing and control capabilities via a massive deployment of machine-type communication (MTC) devices. The limited hardware, low-complexity, and severe energy constraints of MTC devices present unique communication and security challenges. As a result, robust physical-layer security methods that can supplement or even replace lightweight cryptographic protocols are appealing solutions. In this paper, we present an overview of low-complexity physical-layer security schemes that are suitable for the IoT. A local IoT deployment is modeled as a composition of multiple sensor and data subnetworks, with uplink communications from sensors to controllers, and downlink communications from controllers to actuators. The state of the art in physical-layer security for sensor networks is reviewed, followed by an overview of communication network security techniques. We then pinpoint the most energy-efficient and low-complexity security techniques that are best suited for IoT sensing applications. This is followed by a discussion of candidate low-complexity schemes for communication security, such as ON-OFF switching and space-time block codes. The paper concludes by discussing open research issues and avenues for further work, especially the need for a theoretically well-founded and holistic approach for incorporating complexity constraints in physical-layer security designs.
引用
收藏
页码:1747 / 1761
页数:15
相关论文
共 95 条
[1]   Noncoherent Capacity of Secret-Key Agreement With Public Discussion [J].
Agrawal, Anurag ;
Rezki, Zouheir ;
Khisti, Ashish J. ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :565-574
[2]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[3]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[4]  
Anand M., 2005, DMSN 05, P3
[5]  
[Anonymous], CISC VIS NETW IND GL
[6]  
[Anonymous], 2014, Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on, DOI [10.1109/PRISMS.2014.6970594, DOI 10.1109/PRISMS.2014.6970594]
[7]  
[Anonymous], ER MOB REP PULS NETW
[8]  
[Anonymous], 5G TECHN VIS
[9]  
Araujo A, 2012, INT WIREL COMMUN, P1023, DOI 10.1109/IWCMC.2012.6314346
[10]   Sensor data cryptography in wireless sensor networks [J].
Aysal, Tuncer Can ;
Barner, Kenneth E. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) :273-289