Study on Secrecy Capacity of Wireless Sensor Networks in Internet of Things Based on the Amplify-and-Forward Compressed Sensing Scheme

被引:7
作者
Guo, Jian-Lan [1 ]
Chen, Yu-Qiang [1 ]
Yang, Huai-De [1 ]
Chen, Chien-Ming [2 ]
Chen, Yeh-Cheng [3 ]
Zhang, Huiyu [4 ]
Zhang, Zhiyu [5 ]
机构
[1] Dongguan Polytech, Dept Comp Engn, Dongguan 523808, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Jinan 266510, Shandong, Peoples R China
[3] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
[4] Chongqing Univ Technol, Liangjiang Int Coll, Dept Elect Informat Engn, Chongqing 401135, Peoples R China
[5] Jilin Inst Chem Technol, Coll Mech & Elect Engn, Jilin 132022, Jilin, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; wireless sensor networks; physical layer security; compressed sensing; distributed strategy; ALGORITHM; MODEL;
D O I
10.1109/ACCESS.2019.2960603
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wireless sensor networks is a new technology for information acquisition and processing, which includes the techniques of sensor, computer, Internet of Things and network. Due to the fragility of wireless sensor networks, the security issue has become a prevalent concern in the wireless communication for Internet of Things . This paper offers a deep insight to the secrecy capacity of wireless sensor network and a calculable threshold of capacity based on the amplify-and-forward (AF) compressed sensing scheme. Moreover, we provide a feasible algorithm based on augmented Lagrange method for source reconstruction for the legitimate nodes and un-authorized nodes. Furthermore, we also discuss the impact of the numbers of active sensor nodes, relay nodes and eavesdropper nodes to the secrecy capacity. Simulation results demonstrate the correctness of the derived secrecy capacity.
引用
收藏
页码:185580 / 185589
页数:10
相关论文
共 42 条
[1]  
Agrawal S., 2011, IEEE Information Theory Workshop (ITW 2011), P563, DOI 10.1109/ITW.2011.6089519
[2]   Bio-inspired smog sensing model for wireless sensor networks based on intracellular signalling [J].
Alam, Sahabul ;
De, Debashis .
INFORMATION FUSION, 2019, 49 :100-119
[3]  
[Anonymous], 2015, IEEE T CYBERN
[4]  
Bajwa W, 2006, IPSN 2006: THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, P134
[5]   A Simple Proof of the Restricted Isometry Property for Random Matrices [J].
Baraniuk, Richard ;
Davenport, Mark ;
DeVore, Ronald ;
Wakin, Michael .
CONSTRUCTIVE APPROXIMATION, 2008, 28 (03) :253-263
[6]  
Barcelo-Llado JE, 2011, EUR SIGNAL PR CONF, P363
[7]   Distributed Compressive Sampling for Lifetime Optimization in Dense Wireless Sensor Networks [J].
Caione, Carlo ;
Brunelli, Davide ;
Benini, Luca .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2012, 8 (01) :30-40
[8]   Decoding by linear programming [J].
Candes, EJ ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (12) :4203-4215
[9]   Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications [J].
Chen, Chien-Ming ;
Wang, King-Hang ;
Yeh, Kuo-Hui ;
Xiang, Bin ;
Wu, Tsu-Yang .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) :3133-3142
[10]   A Secure Authentication Protocol for Internet of Vehicles [J].
Chen, Chien-Ming ;
Xiang, Bin ;
Liu, Yining ;
Wang, King-Hang .
IEEE ACCESS, 2019, 7 :12047-12057