Physical layer security in massive internet of things: delay and security analysis

被引:11
作者
Zhang, Shuai [1 ]
Xu, Xiaoming [1 ]
Peng, Jianhua [1 ]
Huang, Kaizhi [1 ]
Li, Zhigang [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; telecommunication security; radiofrequency interference; probability; radio networks; queueing theory; telecommunication network reliability; wireless channels; physical layer security; massive internet; security analysis; promising application scenario; study delay performance; secrecy performance; massive IoT; IoT devices; low-complexity noise injection scheme; packet delay; packet secrecy outage probability; IoT device intensity; optimal power allocation coefficient; secrecy transmission rate; delay-security tradeoff; INTERACTING QUEUES; STABILITY; NETWORKS;
D O I
10.1049/iet-com.2018.5570
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Delay and security are both highly concerned in massive internet of things (IoT) which is a promising application scenario in 5G wireless communication system. In this study, the authors develop an integrated framework to study delay performance and secrecy performance in massive IoT. First, stochastic geometry and queuing theory are applied to model the spatially location of IoT devices and the temporal arrival of packets. To enhance the physical layer security of massive IoT with limited overhead increment at IoT devices, a low-complexity noise injection scheme is applied. Then, the packet delay and packet secrecy outage probability are derived to characterise delay performance and secrecy performance. It is demonstrated that the IoT device intensity and power allocation coefficient arouse a tradeoff between the delay and security. Furthermore, optimal power allocation coefficient that maximises secrecy transmission rate can be derived, which can improve the delay-security tradeoff. The analytical and simulation results show the effects of power allocation coefficient and IoT device intensity on the tradeoff between delay performance and secrecy performance.
引用
收藏
页码:93 / 98
页数:6
相关论文
共 15 条
[1]   What Will 5G Be? [J].
Andrews, Jeffrey G. ;
Buzzi, Stefano ;
Choi, Wan ;
Hanly, Stephen V. ;
Lozano, Angel ;
Soong, Anthony C. K. ;
Zhang, Jianzhong Charlie .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (06) :1065-1082
[2]  
[Anonymous], APPL DISCRETE TIME Q
[3]   Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone [J].
Chae, Seong Ho ;
Choi, Wan ;
Lee, Jung Hoon ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1617-1628
[4]   Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis [J].
Gharbieh, Mohammad ;
ElSawy, Hesham ;
Bader, Ahmed ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (08) :3585-3600
[5]   Artificial Noise Injection for Securing Single-Antenna Systems [J].
He, Biao ;
She, Yechao ;
Lau, Vincent K. N. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (10) :9577-9581
[6]   Stability of N interacting queues in random-access systems [J].
Luo, W ;
Ephremides, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (05) :1579-1587
[7]   Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints [J].
Mukherjee, Amitav .
PROCEEDINGS OF THE IEEE, 2015, 103 (10) :1747-1761
[8]   Internet of Things in the 5G Era: Enablers, Architecture, and Business Models [J].
Palattella, Maria Rita ;
Dohler, Mischa ;
Grieco, Alfredo ;
Rizzo, Gianluca ;
Torsner, Johan ;
Engel, Thomas ;
Ladid, Latif .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (03) :510-527
[9]   ON THE STABILITY OF INTERACTING QUEUES IN A MULTIPLE-ACCESS SYSTEM [J].
RAO, RR ;
EPHREMIDES, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1988, 34 (05) :918-930
[10]   A Novel Fuzzy Identification Method Based on Ant Colony Optimization Algorithm [J].
Tsai, Shun-Hung ;
Chen, Yu-Wen .
IEEE ACCESS, 2016, 4 :3747-3756