Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers

被引:2
|
作者
Vo, Van Nhan [1 ,2 ]
Nguyen, Tri Gia [3 ]
So-In, Chakchai [2 ]
Tran, Hung [4 ,5 ]
Sanguanpong, Surasak [6 ]
机构
[1] Duy Tan Univ, Int Sch, Danang 550000, Vietnam
[2] Khon Kaen Univ, Dept Comp Sci, Appl Network Technol ANT Lab, Fac Sci, Khon Kaen 40002, Thailand
[3] Duy Tan Univ, Fac Informat Technol, Danang 550000, Vietnam
[4] Malardalen Univ, Sch Innovat Design & Engn, S-72123 Vasteras, Sweden
[5] Nguyen Tat Thanh Univ, Fac Informat Technol, Ho Chi Minh 700000, Vietnam
[6] Kasetsart Univ, Dept Engn, Fac Engn, Bangkok 10900, Thailand
来源
MOBILE NETWORKS & APPLICATIONS | 2020年 / 25卷 / 01期
关键词
Energy harvesting; Internet of things; Wireless sensor networks; Security constraint; Physical layer security; PHYSICAL-LAYER SECURITY; NETWORKS; COMMUNICATION;
D O I
10.1007/s11036-019-01217-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN's power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.
引用
收藏
页码:193 / 210
页数:18
相关论文
共 50 条
  • [1] Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers
    Van Nhan Vo
    Tri Gia Nguyen
    Chakchai So-In
    Hung Tran
    Surasak Sanguanpong
    Mobile Networks and Applications, 2020, 25 : 193 - 210
  • [2] Optimal Energy Harvesting Time and Power Allocation Policy in CRN Under Security Constraints from Eavesdroppers
    Hung Tran
    Truong Xuan Quach
    Ha-Vu Tran
    Uhlemann, Elisabeth
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [3] Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers
    Khandaker, Muhammad R. A.
    Wong, Kai-Kit
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (01) : 10 - 13
  • [4] ENERGY HARVESTING: GATHERING ENERGY FOR THE INTERNET OF THINGS AND THE SENSORS BEHIND
    Arakistain, Ivan
    DYNA, 2015, 90 (03): : 300 - 306
  • [5] Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays
    Van Nhan Vo
    Duc-Dung Tran
    So-In, Chakchai
    Hung Tran
    IEEE ACCESS, 2018, 6 : 48247 - 48258
  • [6] Secrecy Rate Maximization for MISO System with Energy Harvesting and Eavesdroppers
    Haider, Sami Ahmed
    Cai, Yunlong
    Zhao, Minjian
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [7] On the Secrecy for Relay-Aided SWIPT Internet of Things System With Cooperative Eavesdroppers
    Song, Kang
    Nie, Mengyun
    Jiang, Jing
    Li, Chunguo
    Yin, Yongfeng
    IEEE ACCESS, 2021, 9 : 28204 - 28212
  • [8] On secrecy performance of industrial Internet of things
    Jameel, Furqan
    Javed, Muhammad A.
    Jayakody, Dushantha N. K.
    Hassan, Syed A.
    INTERNET TECHNOLOGY LETTERS, 2018, 1 (02):
  • [9] Secrecy outage probability in energy harvesting aided underlay cognitive radio network under eavesdroppers scenarios
    Odeyemi, Kehinde O.
    Owolawi, Pius A.
    Olakanmi, Oladayo O.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (08)
  • [10] Secrecy Outage Analysis of an Untrusted Relaying Energy Harvesting System with Multiple Eavesdroppers
    Van Phu Tuan
    Kong, Hyung Yun
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (02) : 797 - 812