A Physical Layer Security Scheme for Mobile Health Cyber-Physical Systems

被引:26
作者
Atat, Rachad [1 ]
Liu, Lingjia [2 ]
Ashdown, Jonathan [3 ]
Medley, Michael J. [3 ]
Matyjas, John D. [3 ]
Yi, Yang [2 ]
机构
[1] Univ Kansas, Elect Engn & Comp Sci Dept, Lawrence, KS 66044 USA
[2] Virginia Polytech Inst & State Univ, Elect & Comp Engn Dept, Blacksburg, VA 24061 USA
[3] Air Force Res Lab, Informat Directorate, Rome, NY 13441 USA
基金
美国国家科学基金会;
关键词
Eavesdropping; end-to-end delay; mobile health (m-Health); physical layer security; secure transmission; stochastic geometry; STOCHASTIC GEOMETRY; CELLULAR NETWORKS; WIRELESS NETWORKS; AGGREGATE INTERFERENCE; D2D COMMUNICATION; ENERGY EFFICIENCY; WORMHOLE ATTACKS; ARCHITECTURE; EHEALTH; DESIGN;
D O I
10.1109/JIOT.2017.2780263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile health (m-Health) is one potential application of cyber-physical systems, where biomedical sensors and mobile devices interact tightly together to transmit medical data to an m-Health server. In this paper, we consider a three-tier hierarchical m-Health system: 1) the sensor network tier capturing vital signals; 2) the mobile computing network tier processing and routing the sensed data to a fixed remote location; and 3) the back-end network tier processing and analyzing the sensed medical data along with patient's medical history. Based on this architecture, a physical layer security scheme for the second tier is developed and network performance of the introduced scheme is analyzed under different metrics using stochastic geometry. To be specific, secure transmission range and average end-to-end delay are analyzed for two different strategies: the mobile device transmits: 1) to the nearest neighbor and 2) to the furthest neighbor. Furthermore, we consider the cases of full knowledge on eavesdroppers' locations and when such information is unavailable. Results show that transmitting to the nearest neighbor achieves the highest secure transmission distance with the lowest mean delay when full information on eavesdroppers is available.
引用
收藏
页码:295 / 309
页数:15
相关论文
共 79 条
[1]   On the Location of an Eavesdropper in Multiterminal Networks [J].
Anand, S. ;
Chandramouli, R. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :148-157
[2]  
[Anonymous], P NETW DISTR SYST SE
[3]  
[Anonymous], 2021, IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016)-Redline, P1
[4]  
Atat R., 2016, P IEEE GLOB COMM C G, V2016, P1, DOI [10.1109/GLOCOM.2016.7841890, DOI 10.1109/GLOCOM.2016.78411890]
[5]  
Baccelli F., 2011, 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks (WiOpt 2011), P354, DOI 10.1109/WIOPT.2011.5930040
[6]   Stochastic Geometry and Wireless Networks: Volume I Theory [J].
Baccelli, Francois ;
Blaszczyszyn, Bartlomiej .
FOUNDATIONS AND TRENDS IN NETWORKING, 2008, 3 (3-4) :249-444
[7]   Special Issue on eHealth and mHealth: Challenges and Future Directions for Assessment, Treatment, and Dissemination INTRODUCTION [J].
Borrelli, Belinda ;
Ritterband, Lee M. .
HEALTH PSYCHOLOGY, 2015, 34 :1205-1208
[8]  
Canelo F, 2013, IEEE GLOB COMM CONF, P1711, DOI 10.1109/GLOCOM.2013.6831320
[9]  
Cao Y, 2015, PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), P2, DOI 10.1109/NAS.2015.7255196
[10]  
Capkun S., 2003, ACM WORKSHOP SECURIT, P21