{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:33:18Z","timestamp":1762522398885,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T00:00:00Z","timestamp":1582243200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2016YFB0801001"],"award-info":[{"award-number":["2016YFB0801001"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China \u00a0under Grant","award":["61902297\uff0c61732022"],"award-info":[{"award-number":["61902297\uff0c61732022"]}]},{"name":"Shaanxi Inovation Team Project","award":["2018TD-007"],"award-info":[{"award-number":["2018TD-007"]}]},{"name":"Xi'an Science and Technology Planning Project","award":["201809168CX9JC10"],"award-info":[{"award-number":["201809168CX9JC10"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["JB191503"],"award-info":[{"award-number":["JB191503"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Smart homes have been shown to be one of the most important applications of Internet of Things (IoT); however, security issues are still the main drawback to be improved, especially facing the problem of terminal power constraint and distributed network architecture. In this paper, we propose a novel secure group data exchange protocol in smart homes with physical layer approaches which retains the benefit of key sharing needless and lightweight computation. As the core technique, nested lattice physical layer network coding is conduct in each sensor node to form a summed data at a home router. With such summed data, the untrusted home router attack and external eavesdropper attack can be resistant. Performance has been analyzed for the proposed protocol in terms of time slot cost, security resistance, and secrecy capacity. Finally, simulations have been conducted to demonstrate the theoretical analysis.<\/jats:p>","DOI":"10.3390\/s20041138","type":"journal-article","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T10:49:16Z","timestamp":1582282156000},"page":"1138","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding"],"prefix":"10.3390","volume":"20","author":[{"given":"Qiao","family":"Liu","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710126, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenjing","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710126, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sheng","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710126, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710126, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710126, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2020,2,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOM.2017.1600682CM","article-title":"Smart Home: Cognitive Interactive People-Centric Internet of Things","volume":"55","author":"Feng","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.jnca.2017.08.017","article-title":"A review of smart home applications based on Internet of Things","volume":"97","author":"Alaa","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MCOM.2016.7470945","article-title":"Toward software defined smart home","volume":"54","author":"Xu","year":"2016","journal-title":"IEEE Commun. Mag."},{"doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., and Prakash, A. (2016, January 22\u201326). Security Analysis of Emerging Smart Home Applications. Proceedings of theIEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA.","key":"ref_4","DOI":"10.1109\/SP.2016.44"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/2398356.2398377","article-title":"Computer security and the modern home","volume":"56","author":"Denning","year":"2013","journal-title":"Commun. ACM"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3679","DOI":"10.1109\/TII.2018.2791944","article-title":"Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption","volume":"14","author":"Muhammad","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"6384","DOI":"10.1109\/JIOT.2019.2900631","article-title":"Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things","volume":"6","author":"Tan","year":"2019","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Buchmann, J.A., G\u00f6pfert, F., G\u00fcneysu, T., Oder, T., and P\u00f6ppelmann, T. (2016, January 30). High-Performance and Lightweight Lattice-Based Public-Key Encryption. Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS, Xi\u2019an, China.","key":"ref_8","DOI":"10.1145\/2899007.2899011"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2934","DOI":"10.1109\/TCSI.2017.2702098","article-title":"A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks","volume":"64-I","author":"Yu","year":"2017","journal-title":"IEEE Trans. Circuits Syst."},{"key":"ref_10","first-page":"359","article-title":"Lightweight Mutual Authentication for IoT and Its Applications","volume":"2","author":"Li","year":"2017","journal-title":"T-SUSC"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","article-title":"Steganalysis of least significant bit matching using multi-order differences","volume":"7","author":"Xia","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","article-title":"Lightweight and secure session-key establishment scheme in smart home environments","volume":"16","author":"Kumar","year":"2015","journal-title":"IEEE Sens. J."},{"doi-asserted-by":"crossref","unstructured":"Li, Y. (2013, January 5\u20137). Design of a Key Establishment Protocol for Smart Home Energy Management System. Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2013, Madrid, Spain.","key":"ref_13","DOI":"10.1109\/CICSYN.2013.42"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1007\/s00779-012-0541-2","article-title":"A novel secure key paring protocol for RF4CE ubiquitous smart home systems","volume":"17","author":"Han","year":"2013","journal-title":"Pers. Ubiquitous Comput."},{"doi-asserted-by":"crossref","unstructured":"Ashibani, Y., Kauling, D., and Mahmoud, Q.H. (2017, January 8\u201311). A context-aware authentication service for smart homes. Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, CCNC 2017, Las Vegas, NV, USA.","key":"ref_15","DOI":"10.1109\/CCNC.2017.7983179"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1002\/sec.517","article-title":"Two-factor mutual authentication with key agreement in wireless sensor networks","volume":"9","author":"Vaidya","year":"2016","journal-title":"Secur. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Nobakht, M., Sivaraman, V., and Boreli, R. (September, January 31). A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow. Proceedings of the 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria.","key":"ref_17","DOI":"10.1109\/ARES.2016.64"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","article-title":"A Supervised Intrusion Detection System for Smart Home IoT Devices","volume":"6","author":"Anthi","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1844","DOI":"10.1109\/JIOT.2017.2707489","article-title":"A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes","volume":"4","author":"Song","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Labs Tech. J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","article-title":"Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey","volume":"16","author":"Mukherjee","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3170","DOI":"10.1109\/TWC.2012.070912.111293","article-title":"Physical Layer Integration of Private, Common, and Confidential Messages in Bidirectional Relay Networks","volume":"11","author":"Wyrembelski","year":"2012","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"8115","DOI":"10.1109\/TIT.2013.2281711","article-title":"The Role of Feedback in Two-Way Secure Communications","volume":"59","author":"He","year":"2013","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3532","DOI":"10.1109\/TSP.2012.2191543","article-title":"Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks","volume":"60","author":"Wang","year":"2012","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2111","DOI":"10.1109\/TSP.2014.2303942","article-title":"Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks","volume":"62","author":"Yang","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3693","DOI":"10.1109\/TVT.2012.2209692","article-title":"Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers","volume":"61","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2185","DOI":"10.1109\/TSP.2014.2307276","article-title":"Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay","volume":"62","author":"Mo","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_29","first-page":"1","article-title":"A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach","volume":"2017","author":"Liu","year":"2017","journal-title":"Mobile Inf. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/LCOMM.2014.2325861","article-title":"Secure Beamforming Design for Physical Layer Network Coding Based MIMO Two-Way Relaying","volume":"18","author":"Jayasinghe","year":"2014","journal-title":"IEEE Commun. Lett."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TWC.2012.120412.101358","article-title":"End-to-End Secure Multi-Hop Communication with Untrusted Relays","volume":"12","author":"He","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2531","DOI":"10.1109\/TIT.2015.2412114","article-title":"Secure Compute-and-Forward in a Bidirectional Relay","volume":"61","author":"Vatedka","year":"2015","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1007\/s00779-017-1049-6","article-title":"Secure group information exchange scheme for vehicular ad hoc networks","volume":"21","author":"Zhou","year":"2017","journal-title":"Pers. Ubiquitous Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/4\/1138\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:59:07Z","timestamp":1760173147000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/4\/1138"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,21]]},"references-count":33,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,2]]}},"alternative-id":["s20041138"],"URL":"https:\/\/doi.org\/10.3390\/s20041138","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,2,21]]}}}