Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays

被引:17
作者
Van Nhan Vo [1 ,2 ]
Duc-Dung Tran [3 ]
So-In, Chakchai [2 ]
Hung Tran [4 ]
机构
[1] Duy Tan Univ, Int Sch, Danang 550000, Vietnam
[2] Khon Kaen Univ, Fac Sci, Dept Comp Sci, Appl Network Technol Lab, Khon Kaen 40002, Thailand
[3] Duy Tan Univ, Fac Elect & Elect Engn, Danang 550000, Vietnam
[4] Malardalen Univ, Sch Innovat Design & Engn, S-72123 Vasteras, Sweden
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Energy harvesting; Internet of Things sensor networks; untrusted relay; physical layer security; PHYSICAL-LAYER SECURITY; SENSOR NETWORKS; COMMUNICATION; SELECTION;
D O I
10.1109/ACCESS.2018.2867500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.
引用
收藏
页码:48247 / 48258
页数:12
相关论文
共 50 条
[31]   Modeling and Analysis of Ambient RF Energy Harvesting in Networks with Secrecy Guard Zones [J].
Kishk, Mustafa A. ;
Dhillon, Harpreet S. .
2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
[32]   ENERGY HARVESTING: GATHERING ENERGY FOR THE INTERNET OF THINGS AND THE SENSORS BEHIND [J].
Arakistain, Ivan .
DYNA, 2015, 90 (03) :300-306
[33]   Wireless energy harvesting: Empirical results and practical considerations for Internet of Things [J].
Sanislav, Teodora ;
Zeadally, Sherali ;
Mois, George Dan ;
Folea, Silviu Corneliu .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 :149-158
[34]   Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer [J].
Sun, Juan ;
Zhang, Shubin ;
Chi, Kaikai .
SENSORS, 2021, 21 (24)
[35]   Software Defined Networking for Energy Harvesting Internet of Things [J].
Huang, Xumin ;
Yu, Rong ;
Kang, Jiawen ;
Xia, Zhuoquan ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03) :1389-1399
[36]   A Literature Review on Energy Harvesting for Internet of Things Applications [J].
Rakshith, N. ;
Minavathi .
EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018, 2019, 545 :613-630
[37]   Movers and Shakers: Kinetic Energy Harvesting for the Internet of Things [J].
Gorlatova, Maria ;
Sarik, John ;
Grebla, Guy ;
Cong, Mina ;
Kymissis, Ioannis ;
Zussman, Gil .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2015, 33 (08) :1624-1639
[38]   Secrecy performance of a novel energy efficient hybrid CIoT network with beacon-aided RF energy harvesting under dissimilar fading environments [J].
Thakur, Chandrima ;
Chattopadhyay, Sudipta .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) :4057-4075
[39]   Security-reliability tradeoff analysis of untrusted energy harvesting relay networks [J].
Chen, Dechuan ;
Yang, Weiwei ;
Hu, Jianwei ;
Mou, Weifeng ;
Cai, Yueming .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (01)
[40]   Secrecy outage probability of a two-way cooperative network with an energy harvesting untrusted AF relay [J].
Shashibhushan Sharma ;
Anurag Kumar ;
Sanjay Dhar Roy ;
Sumit Kundu .
CSI Transactions on ICT, 2018, 6 (2) :129-136