Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

作者: Hequn Hu , Zhenzhen Gao , Xuewen Liao , Victor Leung

DOI: 10.3390/S17092023

关键词:

摘要: The Internet of Things (IoT) represents a bright prospect that variety common appliances can connect to one another, as well with the rest Internet, vastly improve our lives. Unique communication and security challenges have been brought out by limited hardware, low-complexity, severe energy constraints IoT devices. In addition, spectrum scarcity problem has also stimulated use large number this paper, cognitive (CIoT) is considered where an network works secondary system using underlay sharing. A wireless harvesting (EH) node used relay coverage device. However, could be potential eavesdropper intercept device's messages. This paper considers secure between device (e.g., sensor) destination controller) via EH untrusted relay. Since equipped adequate supply, schemes based on destination-aided jamming are proposed power splitting (PS) time (TS) policies, called intuitive PS (Int-PS), precoded scheme (Pre-PS), TS (Int-TS) (Pre-TS), respectively. performances evaluated through metric probability successfully transmission ( P S T ), which interference constraint primary user satisfied secrecy rate positive. analyzed for schemes, closed form expressions Pre-PS Pre-TS derived validated simulation results. Numerical results show better than under similar consumption. When polices , average transmit consumption lower. influences slitting ratios discussed simulations.

参考文章(33)
S. Durrani, A. A. Nasir, Xiangyun Zhou, R. A. Kennedy, Relaying Protocols for Wireless Energy Harvesting and Information Processing IEEE Transactions on Wireless Communications. ,vol. 12, pp. 3622- 3636 ,(2013) , 10.1109/TWC.2013.062413.122042
Li Da Xu, Wu He, Shancang Li, Internet of Things in Industries: A Survey IEEE Transactions on Industrial Informatics. ,vol. 10, pp. 2233- 2243 ,(2014) , 10.1109/TII.2014.2300753
Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, Michele Zorzi, Internet of Things for Smart Cities IEEE Internet of Things Journal. ,vol. 1, pp. 22- 32 ,(2014) , 10.1109/JIOT.2014.2306328
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yanikomeroglu, Access Strategies for Spectrum Sharing in Fading Environment: Overlay, Underlay, and Mixed IEEE Transactions on Mobile Computing. ,vol. 9, pp. 1780- 1793 ,(2010) , 10.1109/TMC.2010.57
Xun Zhou, Rui Zhang, Chin Keong Ho, Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff IEEE Transactions on Communications. ,vol. 61, pp. 4754- 4767 ,(2013) , 10.1109/TCOMM.2013.13.120855
I. Krikidis, J. Thompson, S. Mclaughlin, Relay selection for secure cooperative networks with jamming IEEE Transactions on Wireless Communications. ,vol. 8, pp. 5003- 5011 ,(2009) , 10.1109/TWC.2009.090323
Wei-Cheng Liao, Tsung-Hui Chang, Wing-Kin Ma, Chong-Yung Chi, QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach IEEE Transactions on Signal Processing. ,vol. 59, pp. 1202- 1216 ,(2011) , 10.1109/TSP.2010.2094610
Yulong Zou, Xianbin Wang, Weiming Shen, Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks IEEE Journal on Selected Areas in Communications. ,vol. 31, pp. 2099- 2111 ,(2013) , 10.1109/JSAC.2013.131011
Matthieu Bloch, JoÃo Barros, Miguel R. D. Rodrigues, Steven W. McLaughlin, Wireless Information-Theoretic Security IEEE Transactions on Information Theory. ,vol. 54, pp. 2515- 2534 ,(2008) , 10.1109/TIT.2008.921908
Xiang He, Aylin Yener, End-to-End Secure Multi-Hop Communication with Untrusted Relays IEEE Transactions on Wireless Communications. ,vol. 12, pp. 1- 11 ,(2013) , 10.1109/TWC.2012.120412.101358