Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers

被引:2
|
作者
Vo, Van Nhan [1 ,2 ]
Nguyen, Tri Gia [3 ]
So-In, Chakchai [2 ]
Tran, Hung [4 ,5 ]
Sanguanpong, Surasak [6 ]
机构
[1] Duy Tan Univ, Int Sch, Danang 550000, Vietnam
[2] Khon Kaen Univ, Dept Comp Sci, Appl Network Technol ANT Lab, Fac Sci, Khon Kaen 40002, Thailand
[3] Duy Tan Univ, Fac Informat Technol, Danang 550000, Vietnam
[4] Malardalen Univ, Sch Innovat Design & Engn, S-72123 Vasteras, Sweden
[5] Nguyen Tat Thanh Univ, Fac Informat Technol, Ho Chi Minh 700000, Vietnam
[6] Kasetsart Univ, Dept Engn, Fac Engn, Bangkok 10900, Thailand
来源
MOBILE NETWORKS & APPLICATIONS | 2020年 / 25卷 / 01期
关键词
Energy harvesting; Internet of things; Wireless sensor networks; Security constraint; Physical layer security; PHYSICAL-LAYER SECURITY; NETWORKS; COMMUNICATION;
D O I
10.1007/s11036-019-01217-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN's power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.
引用
收藏
页码:193 / 210
页数:18
相关论文
共 50 条
  • [41] A novel secure relay selection strategy for energy-harvesting-enabled Internet of things
    Huo, Yan
    Xu, Mi
    Fan, Xin
    Jing, Tao
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [42] A novel secure relay selection strategy for energy-harvesting-enabled Internet of things
    Yan Huo
    Mi Xu
    Xin Fan
    Tao Jing
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [43] Energy management algorithm for solar-powered energy harvesting wireless sensor node for Internet of Things
    Shin, Minchul
    Joe, Inwhee
    IET COMMUNICATIONS, 2016, 10 (12) : 1508 - 1521
  • [44] Transmission Policies for Energy Harvesting Sensors with Time-Correlated Energy Supply
    Michelusi, Nicolo
    Stamatiou, Kostas
    Zorzi, Michele
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (07) : 2988 - 3001
  • [45] ECRB-Based Optimal Parameter Encoding Under Secrecy Constraints
    Goken, Cagri
    Gezici, Sinan
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (13) : 3556 - 3570
  • [46] Performance Evaluation of Energy-Autonomous Sensors Using Power-Harvesting Beacons for Environmental Monitoring in Internet of Things (IoT)
    Mois, George Dan
    Sanislav, Teodora
    Folea, Silviu Corneliu
    Zeadally, Sherali
    SENSORS, 2018, 18 (06)
  • [47] Secrecy Limits of Energy Harvesting IoT Networks under Channel Imperfections
    Jameel, Furqan
    Chang, Zheng
    Jantti, Riku
    2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [48] Wireless energy harvesting: Empirical results and practical considerations for Internet of Things
    Sanislav, Teodora
    Zeadally, Sherali
    Mois, George Dan
    Folea, Silviu Corneliu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 121 : 149 - 158
  • [49] Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer
    Sun, Juan
    Zhang, Shubin
    Chi, Kaikai
    SENSORS, 2021, 21 (24)
  • [50] Deep Reinforcement Learning Optimal Transmission Algorithm for Cognitive Internet of Things With RF Energy Harvesting
    Guo, Shaoai
    Zhao, Xiaohui
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (02) : 1216 - 1227