Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things

被引:164
作者
Hu, Lin [1 ]
Wen, Hong [1 ]
Wu, Bin [2 ]
Pan, Fei [1 ]
Liao, Run-Fa [1 ]
Song, Huanhuan [1 ]
Tang, Jie [1 ]
Wang, Xiumin [3 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Sichuan, Peoples R China
[2] Tianjin Univ, Sch Comp Sci & Technol, Tianjin Key Lab Adv Networking, Tianjin 300350, Peoples R China
[3] China Jiliang Univ, Coll Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
关键词
Cooperative jamming (CJ); Internet of Things (IoT); physical layer security (PLS); secrecy outage probability (SOP); secrecy rate; MULTI-ANTENNA TRANSMISSION; SECRECY OUTAGE PROBABILITY; MISO WIRETAP CHANNELS; ARTIFICIAL-NOISE; MAXIMIZATION; DESIGN;
D O I
10.1109/JIOT.2017.2778185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is becoming an emerging paradigm to achieve ubiquitous connectivity, via massive deployment of physical objects, such as sensors, controllers, and actuators. However, concerns on the IoT security are raised due to the wireless broadcasting nature and the energy constraint of the physical objects. In this paper, we study secure downlink transmission from a controller to an actuator, with the help of a cooperative jammer to fight against multiple passive and noncolluding eavesdroppers. In addition to artificial noise aided secrecy beamforming for secure transmission, cooperative jamming (CJ) is explored to further enhance physical layer security. In particular, we provide a secrecy enhancing transmit design to minimize the secrecy outage probability (SOP), subject to a minimum requirement on the secrecy rate. Based on a strict mathematical analysis, we further characterize the impacts of the main channel quality and the minimum secrecy rate on transmit designs. Numerical results confirm that our design can enhance both security (in terms of SOP) and power efficiency as compared with the approach without CJ.
引用
收藏
页码:219 / 228
页数:10
相关论文
共 38 条
[1]  
[Anonymous], EVID BASED COMPLEMEN, DOI DOI 10.3343/ALM.2016.36.1.73
[2]  
[Anonymous], 2012, BASIC PROBABILITY TH
[3]   Statistical Analysis and Minimization of Security Vulnerability Region in Amplify-and-Forward Cooperative Systems [J].
Behnad, Aydin ;
Shahbaz, Mahsa Bataghva ;
Willink, Tricia J. ;
Wang, Xianbin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (04) :2534-2547
[4]  
Boyd S, 2004, CONVEX OPTIMIZATION
[5]   S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol [J].
Chen, Dajiang ;
Zhang, Ning ;
Qin, Zhen ;
Mao, Xufei ;
Qin, Zhiguang ;
Shen, Xuemin ;
Li, Xiang-Yang .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01) :88-100
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[8]  
Gradshteyn I. S., 2015, Table of integrals, series, and products
[9]   GPU-Accelerated Rendering Methods to Visually Analyze Large-Scale Disaster Simulation Data [J].
Heitzler M. ;
Lam J.C. ;
Hackl J. ;
Adey B.T. ;
Hurni L. .
Journal of Geovisualization and Spatial Analysis, 2017, 1 (1-2)
[10]   Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems [An overview of signal processing approaches] [J].
Hong, Y. -W. Peter ;
Lan, Pang-Chang ;
Kuo, C. -C. Jay .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) :29-40