Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

被引:19
|
作者
Li, Zhen [1 ]
Jing, Tao [1 ]
Ma, Liran [2 ]
Huo, Yan [1 ]
Qian, Jin [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 10044, Peoples R China
[2] Texas Christian Univ, Dept Comp Sci, Ft Worth, TX 76129 USA
关键词
Vickrey auction; physical layer security; cooperative jamming; incentive mechanism; CIoT networks; PHYSICAL-LAYER SECURITY; COGNITIVE INTERNET; SPECTRUM ACCESS; THINGS; INFORMATION; SECRECY;
D O I
10.3390/s16030339
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be achieved. Simulation results demonstrate the effective performance of the cooperative jamming scheme and the auction framework.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Worst-Case Jamming for Secure Communications in Multi-Antenna Cooperative Cognitive Radio Networks with Energy Harvesting
    Li, Zhen
    Jing, Tao
    Huo, Yan
    Qian, Jin
    [J]. 2015 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION, AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2015, : 110 - 115
  • [2] Worst-Case Jamming Attack and Optimum Defense Strategy in Cooperative Relay Networks
    Sadr, Mohammad Amin Maleki
    Ahmadian-Attari, Mahmoud
    Amiri, Rouhollah
    Sabegh, Vahid Veysi
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2019, 3 (01): : 7 - 12
  • [3] Cooperative Jamming for Secure Communications in MIMO Relay Networks
    Huang, Jing
    Swindlehurst, A. Lee
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) : 4871 - 4884
  • [4] Cooperative Jamming for Secure Communications in MIMO Cooperative Cognitive Radio Networks
    Li, Zhen
    Jing, Tao
    Cheng, Xiuzhen
    Huo, Yan
    Zhou, Wei
    Chen, Dechang
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7609 - 7614
  • [5] Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
    Yang, Maoqiang
    Zhang, Bangning
    Huang, Yuzhen
    Yang, Nan
    Guo, Daoxing
    Gao, Bin
    [J]. SENSORS, 2016, 16 (11):
  • [6] Worst-Case Jamming on MIMO Gaussian Channels
    Gao, Jie
    Vorobyov, Sergiy A.
    Jiang, Hai
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (21) : 5821 - 5836
  • [7] Fast Design of Wireless Mesh Networks to Defend Against Worst-Case Jamming
    Nicholas, Paul J.
    Alderson, David L.
    [J]. MILITARY OPERATIONS RESEARCH, 2018, 23 (03) : 5 - 20
  • [8] Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming
    Huo, Yan
    Fan, Xin
    Ma, Liran
    Cheng, Xiuzhen
    Tian, Zhi
    Chen, Dechang
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (06) : 3265 - 3280
  • [9] Worst-Case Optimization of Relay Position in Cooperative Broadcast Wireless Networks
    Jin, Ying
    Zhang, Yimin D.
    [J]. WIRELESS SENSING, LOCALIZATION, AND PROCESSING VI, 2011, 8061
  • [10] Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
    Hu, Hequn
    Gao, Zhenzhen
    Liao, Xuewen
    Leung, Victor C. M.
    [J]. SENSORS, 2017, 17 (09)