Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT

被引:11
|
作者
Jain, Sonam [1 ]
Bose, Ranjan [1 ,2 ]
机构
[1] Indian Inst Technol Delhi, Dept Elect Engn, New Delhi 110016, India
[2] Indraprastha Inst Informat Technol Delhi, Dept Elect & Commun Engn, New Delhi 110020, India
关键词
Delay constraint; energy accumulation (EA); intercept probability; mutual information (MI); rateless codes (RCs); relay selection; reliability outage event; WIRELESS SENSOR NETWORKS; FOUNTAIN CODES; SELECTION; INTERNET; SECRECY;
D O I
10.1109/JIOT.2020.2969955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Integrating the Internet-of-Things (IoT) paradigm with industrial wireless sensor networks (IWSNs) has led to a technological evolution known as Industrial IoT (IIoT). To ensure reliable, secure, and low-latency communication in IIoT applications like healthcare, we use rateless codes (RCs) for forward error correction (FEC) at the physical layer (PHY) in a cooperative delay-constrainted environment. Probability of violation (Prvio) is used as a performance metric which consists of: 1) reliability outage probability, i.e., the probability with which the information cannot be successfully decoded within the time constraint T and 2) information intercept probability, which reflects the secrecy performance. Since RC can adjust the rate on the fly, we analyze the performance when relay transmits a fraction of the message and the receiver does energy accumulation (EA). We derive a closed-form expression of Prvio in a single-relay system at a high signal-to-noise ratio (SNR) when the receiver either accumulates energy or mutual information (MI) from the received signals. Furthermore, Prvio of various relay selection schemes is evaluated in a multirelay system. Such kind of analysis in which relay selection is done using RC for PHY-FEC is first of its kind and it is compared to fixed-rate codes. Overall, results show the significant benefits of PHY-RC for guaranteeing the Quality-of-Service (QoS) requirements essential in IIoT applications.
引用
收藏
页码:6550 / 6565
页数:16
相关论文
共 50 条
  • [11] A random linear code based secure transmission scheme for wireless fading channels
    Olawoyin, Lukman A.
    Zhang, Nana
    Oloyede, A. O.
    Faruk, Nasir
    Yang, Hongwen
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (04)
  • [12] Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT
    Vinoth, R.
    Deborah, Lazarus Jegatha
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) : 3801 - 3811
  • [13] Design of Rateless Transmission Scheme Based on Punctured Polar Codes
    Wang, Sha
    Jiao, Jian
    Feng, Bowen
    Wu, Shaohua
    Gu, Shushi
    Zhang, Qinyu
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 815 - 822
  • [14] Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT
    Li, Tao
    Hofmann, Christoph
    Franz, Elke
    PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 365 - 368
  • [15] Rateless Code-Aided Transmission Scheme to Achieve Secrecy in a Delay-Constraint Environment
    Jain, Sonam
    Bose, Ranjan
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [16] A secure lightweight mutual authentication scheme in Social Industrial IoT environment
    Arij Ben Amor
    Sarra Jebri
    Mohamed Abid
    Aref Meddeb
    The Journal of Supercomputing, 2023, 79 : 13578 - 13600
  • [17] A secure lightweight mutual authentication scheme in Social Industrial IoT environment
    Ben Amor, Arij
    Jebri, Sarra
    Abid, Mohamed
    Meddeb, Aref
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (12): : 13578 - 13600
  • [18] A Secure Certificateless Signature Scheme for Cloud-Assisted Industrial IoT
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (04) : 6834 - 6843
  • [19] Asynchronous cooperative transmission scheme using linear dispersion code
    Gao M.
    Ge J.
    Han C.
    Chi K.
    High Technology Letters, 2010, 16 (02) : 138 - 142
  • [20] A Flexible and Efficient Authentication and Secure Data Transmission Scheme for IoT Applications
    Fang, Dongfeng
    Qian, Yi
    Hu, Rose Qingyang
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 3474 - 3484