Abstract

Smart homes have been shown to be one of the most important applications of Internet of Things (IoT); however, security issues are still the main drawback to be improved, especially facing the problem of terminal power constraint and distributed network architecture. In this paper, we propose a novel secure group data exchange protocol in smart homes with physical layer approaches which retains the benefit of key sharing needless and lightweight computation. As the core technique, nested lattice physical layer network coding is conduct in each sensor node to form a summed data at a home router. With such summed data, the untrusted home router attack and external eavesdropper attack can be resistant. Performance has been analyzed for the proposed protocol in terms of time slot cost, security resistance, and secrecy capacity. Finally, simulations have been conducted to demonstrate the theoretical analysis.

Highlights

  • With the continuous development of information technology, the smart era has arrived.Novel thoughts and applications have been proposed for smart phones, smart vehicles, smart grids, smart health, and so on

  • Each sensor node in a smart home conducts nested lattice physical layer network code, and summed coded data is formed in the home router

  • We focus the physical layer network coding in this work, so we will not go into detail on the design of Pi

Read more

Summary

Introduction

With the continuous development of information technology, the smart era has arrived. The idea of smart homes is connecting appliances together with the architecture of Internet of Things (IoT). The main application of smart homes can be classified but not limited to the following four categories [1,2,3]. Living condition optimization: The smart home system can optimize living conditions based on the data collected by sensors in terms of temperature, humidity, air quality, and so on. In this example, smart devices like smart light, air quantity sensor, smart temperature sensor, smart TV, surveillance device, smart door lock, and robotic cleaner are wirelessly connected to a home router, and the home router is wire connected with the Internet for more web services. The system model of the proposed protocol in this work is abstracted from this example

Motivation
Related Work
Contributions
Organization
System Model
Transmission Model
Security Model
Basic Conceptions and Notations for Nested Lattice Code
The Proposed Data Exchange Protocol
Up-Link Phase
Decode and Forward in HR
Down-link Phase
Time Slots Cost Analysis
Untrusted HR Attack
External Eavesdropping Attack
Secrecy Capacity with Untrusted HR
Secrecy Capacity with External Eve
Secrecy Capacity with Both Attacks
Simulation Results
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.