Physical-layer security in Internet of Things based on compressed sensing and frequency selection

Information security is a vital concern in Internet of Things (IoT). Traditional security method based on public or private key encryption scheme is limited by the trade-off between low cost and high level of security. Among different security solutions, utilising compressed sensing (CS) in combination with the physical-layer security to achieve the security is a remarkable method. However, in the current literatures, little attention has been given to the area of static environment, which will lead the risk of information leakage in the CS security model. In this study, the authors propose a new CS security model, in which circulant matrix is exploited to improve the generation efficiency of the measurement matrix, and binary resilient functions are utilised to enhance the security. Furthermore, considering the practical application, they present a feasible framework, named CS security scheme based on frequency-selective, where the frequency-selective feature of the wireless channel is applied to support the static environment. To verify the effectiveness of the proposed scheme, they conducted experiments and numerical simulations to evaluate the performance, and the results are satisfactory.

[1]  Syed Taha Ali,et al.  Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[2]  Arnon D. Cohen,et al.  The weighted diagnostic distortion (WDD) measure for ECG signal compression , 2000, IEEE Transactions on Biomedical Engineering.

[3]  Ting Jiang,et al.  Compressed Sensing Based on the Characteristic Correlation of ECG in Hybrid Wireless Sensor Network , 2015, Int. J. Distributed Sens. Networks.

[4]  Gill R. Tsouri,et al.  Establishing secure measurement matrix for compressed sensing using wireless physical layer security , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[5]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[6]  Lida Xu,et al.  Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things , 2013, IEEE Transactions on Industrial Informatics.

[7]  Babak Seyfe,et al.  Perfect secrecy via compressed sensing , 2010, 2013 Iran Workshop on Communication and Information Theory.

[8]  Y. Rachlin,et al.  The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[9]  Sriram Vishwanath,et al.  Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.

[10]  Gill R. Tsouri,et al.  Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography , 2016, IEEE Journal of Biomedical and Health Informatics.

[11]  A. Robert Calderbank,et al.  Performance bounds for expander-based compressed sensing in the presence of Poisson noise , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[12]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[13]  Ivan Martinovic,et al.  Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.

[14]  Korbinian Strimmer,et al.  Entropy Inference and the James-Stein Estimator, with Application to Nonlinear Gene Association Networks , 2008, J. Mach. Learn. Res..

[15]  K. Gopalakrishnan A study of correlation-immune, resilient and related cryptographic functions , 1994 .

[16]  K. P. Soman,et al.  Ensuring Security to the Compressed Sensing Data Using a Steganographic Approach , 2013 .

[17]  Thomas Strohmer,et al.  General Deviants: An Analysis of Perturbations in Compressed Sensing , 2009, IEEE Journal of Selected Topics in Signal Processing.