Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT

被引:11
|
作者
Jain, Sonam [1 ]
Bose, Ranjan [1 ,2 ]
机构
[1] Indian Inst Technol Delhi, Dept Elect Engn, New Delhi 110016, India
[2] Indraprastha Inst Informat Technol Delhi, Dept Elect & Commun Engn, New Delhi 110020, India
关键词
Delay constraint; energy accumulation (EA); intercept probability; mutual information (MI); rateless codes (RCs); relay selection; reliability outage event; WIRELESS SENSOR NETWORKS; FOUNTAIN CODES; SELECTION; INTERNET; SECRECY;
D O I
10.1109/JIOT.2020.2969955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Integrating the Internet-of-Things (IoT) paradigm with industrial wireless sensor networks (IWSNs) has led to a technological evolution known as Industrial IoT (IIoT). To ensure reliable, secure, and low-latency communication in IIoT applications like healthcare, we use rateless codes (RCs) for forward error correction (FEC) at the physical layer (PHY) in a cooperative delay-constrainted environment. Probability of violation (Prvio) is used as a performance metric which consists of: 1) reliability outage probability, i.e., the probability with which the information cannot be successfully decoded within the time constraint T and 2) information intercept probability, which reflects the secrecy performance. Since RC can adjust the rate on the fly, we analyze the performance when relay transmits a fraction of the message and the receiver does energy accumulation (EA). We derive a closed-form expression of Prvio in a single-relay system at a high signal-to-noise ratio (SNR) when the receiver either accumulates energy or mutual information (MI) from the received signals. Furthermore, Prvio of various relay selection schemes is evaluated in a multirelay system. Such kind of analysis in which relay selection is done using RC for PHY-FEC is first of its kind and it is compared to fixed-rate codes. Overall, results show the significant benefits of PHY-RC for guaranteeing the Quality-of-Service (QoS) requirements essential in IIoT applications.
引用
收藏
页码:6550 / 6565
页数:16
相关论文
共 50 条
  • [21] Optimization and realization of SWIPT relay channel transmission rate based on rateless code
    Lei W.
    Dong M.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 98 - 107
  • [22] A Novel Secure Data Transmission Scheme in Industrial Internet of Things
    Hongwen Hui
    Chengcheng Zhou
    Shenggang Xu
    Fuhong Lin
    中国通信, 2020, 17 (01) : 73 - 88
  • [23] A Novel Secure Data Transmission Scheme in Industrial Internet of Things
    Hui, Hongwen
    Zhou, Chengcheng
    Xu, Shenggang
    Lin, Fuhong
    CHINA COMMUNICATIONS, 2020, 17 (01) : 73 - 88
  • [24] Multi-relay cooperative transmission based on rateless codes and adaptive demodulation
    Lei, Weijia
    Song, Haina
    IET COMMUNICATIONS, 2018, 12 (05) : 586 - 594
  • [25] Secure Time Synchronization Scheme in IoT based on Blockchain
    Fan, Kai
    Ren, Yanhui
    Yan, Zheng
    Yang, Shangyang
    Li, Hui
    Yang, Yintang
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1063 - 1068
  • [26] Secure Transmission Against Pilot Contamination: A Cooperative Scheme with Multiple Antennas
    Wu, Rengyong
    Yuan, Shenglan
    Yuan, Chao
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 52 - 57
  • [27] Secure Data Transmission Scheme for Indoor Mobile Cooperative Localization System
    Destiarti A, Rafina
    Kristalina, Prima
    Sudarsono, Amang
    2017 INTERNATIONAL ELECTRONICS SYMPOSIUM ON ENGINEERING TECHNOLOGY AND APPLICATIONS (IES-ETA), 2017, : 50 - 56
  • [28] Energy Efficient Relay Selection Scheme for Cooperative Transmission Aided Rateless Codes in Wireless Sensor Networks
    Zhu, Kaiyan
    Wang, Fei
    Li, Songsong
    Niu, Fanglin
    Jiang, Fengjiao
    2016 INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING AND COMMUNICATIONS TECHNOLOGY (IECT 2016), 2016, : 258 - 262
  • [29] An IoT-based secure data transmission in WBSN
    Karthiga I.
    Sankar S.
    International Journal of Cloud Computing, 2020, 9 (2-3): : 311 - 329
  • [30] Secure QR Code Scheme Based on Visual Cryptography
    Cao, Xiaohe
    Feng, Liuping
    Cao, Peng
    Hu, Jianhua
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 433 - 436