Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT

被引:11
|
作者
Jain, Sonam [1 ]
Bose, Ranjan [1 ,2 ]
机构
[1] Indian Inst Technol Delhi, Dept Elect Engn, New Delhi 110016, India
[2] Indraprastha Inst Informat Technol Delhi, Dept Elect & Commun Engn, New Delhi 110020, India
关键词
Delay constraint; energy accumulation (EA); intercept probability; mutual information (MI); rateless codes (RCs); relay selection; reliability outage event; WIRELESS SENSOR NETWORKS; FOUNTAIN CODES; SELECTION; INTERNET; SECRECY;
D O I
10.1109/JIOT.2020.2969955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Integrating the Internet-of-Things (IoT) paradigm with industrial wireless sensor networks (IWSNs) has led to a technological evolution known as Industrial IoT (IIoT). To ensure reliable, secure, and low-latency communication in IIoT applications like healthcare, we use rateless codes (RCs) for forward error correction (FEC) at the physical layer (PHY) in a cooperative delay-constrainted environment. Probability of violation (Prvio) is used as a performance metric which consists of: 1) reliability outage probability, i.e., the probability with which the information cannot be successfully decoded within the time constraint T and 2) information intercept probability, which reflects the secrecy performance. Since RC can adjust the rate on the fly, we analyze the performance when relay transmits a fraction of the message and the receiver does energy accumulation (EA). We derive a closed-form expression of Prvio in a single-relay system at a high signal-to-noise ratio (SNR) when the receiver either accumulates energy or mutual information (MI) from the received signals. Furthermore, Prvio of various relay selection schemes is evaluated in a multirelay system. Such kind of analysis in which relay selection is done using RC for PHY-FEC is first of its kind and it is compared to fixed-rate codes. Overall, results show the significant benefits of PHY-RC for guaranteeing the Quality-of-Service (QoS) requirements essential in IIoT applications.
引用
收藏
页码:6550 / 6565
页数:16
相关论文
共 50 条
  • [41] Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
    Lingwei Xu
    Hao Yin
    Hong Jia
    Wenzhong Lin
    Xinpeng Zhou
    Yong Fu
    Xu Yu
    Digital Communications and Networks, 2023, 9 (02) : 400 - 410
  • [42] Blockchain-Based Secure Time Protection Scheme in IoT
    Fan, Kai
    Wang, Shangyang
    Ren, Yanhui
    Yang, Kan
    Yan, Zheng
    Li, Hui
    Yang, Yintang
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 4671 - 4679
  • [43] An Encryption-based Secure Framework for Data Transmission in IoT
    Chaudhry, Shikha
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 743 - 747
  • [44] Secure Optical Communication Based on Optical Code Reconfiguration Scheme
    Wang, Xu
    Gao, Zhensen
    Dai, Bo
    Kataoka, Nobuyuki
    Wada, Naoya
    PHOTONICS AND OPTOELECTRONICS MEETINGS (POEM) 2011: OPTICAL COMMUNICATION SYSTEMS AND NETWORKING, 2012, 8331
  • [45] Secret Key Transmission Based on Channel Reciprocity for Secure IoT
    Choi, Jinho
    Ha, Jeongseok
    2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 388 - 392
  • [46] A Polling-Based Transmission Scheme Using a Network Traffic Uniformity Metric for Industrial IoT Applications
    Igarashi, Yuichi
    Nakano, Ryo
    Wakamiya, Naoki
    SENSORS, 2019, 19 (01)
  • [47] A new cooperative transmission scheme using the space-time delay code
    Oechtering, TJ
    Sezgin, A
    2004 ITG: WORKSHOP ON SMART ANTENNAS, PROCEEDINGS, 2004, : 41 - 48
  • [48] A Game Theory Based Scheme for Secure and Cooperative UAV Communication
    Xie, Liang
    Su, Zhou
    Chen, Nan
    Xu, Qichao
    Fan, Yixin
    Benslimane, Abderrahim
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [49] A provably secure code-based concurrent signature scheme
    Asaar, Maryam Rajabzadeh
    Ameri, Mohammad Hassan
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    IET INFORMATION SECURITY, 2018, 12 (01) : 34 - 41
  • [50] A Secure OFDM Transmission Scheme Based on Chaos Mapping
    Zhang, Xiaozhong
    Wang, Ying
    Zeng, Juan
    Wang, Yongming
    2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,