A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer

被引:44
作者
Letafati, Mehdi [1 ]
Kuhestani, Ali [2 ]
Wong, Kai-Kit [3 ]
Piran, Md Jalil [4 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran 136511155, Iran
[2] Qom Univ Technol, Fac Elect & Comp Engn, Commun & Elect Dept, Qom 3716146611, Iran
[3] UCL, Dept Elect & Elect Engn, London WC1E 6BT, England
[4] Sejong Univ, Dept Comp Sci & Engn, Seoul 05006, South Korea
基金
英国工程与自然科学研究理事会;
关键词
Jamming; Security; Internet of Things; Resilience; Wireless communication; Physical layer; Device-to-device communication; Information security; Internet of Things (IoT); physical layer security (PLS); transmission resiliency; PHYSICAL-LAYER SECURITY; CHANNEL ESTIMATION; NETWORKS; SYSTEMS;
D O I
10.1109/JIOT.2020.3026475
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-antenna transmitter communicates with a half-duplex single-antenna receiver in the presence of a sophisticated multiple-antenna-aided passive eavesdropper and a multiple-antenna-assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret keys. The secret key is utilized for the frequency hopping (FH) sequence of the proposed communication system. We then proceed to derive a new closed-form expression for the achievable secret key rate (SKR) and the ergodic secrecy rate (ESR) for characterizing the secrecy benefits of our proposed scheme, in terms of both information secrecy and transmission resiliency. Moreover, the optimal power sharing between the AN and the message signal is investigated with the objective of enhancing the secrecy rate. Finally, through extensive simulations, we demonstrate that our proposed system model outperforms the state-of-the-art transmission schemes in terms of secrecy and resiliency. Several numerical examples and discussions are also provided to offer further engineering insights.
引用
收藏
页码:4373 / 4388
页数:16
相关论文
共 51 条
[31]   Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios [J].
Sciancalepore, Savio ;
Di Pietro, Roberto .
IEEE ACCESS, 2019, 7 :156175-156190
[32]   Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges [J].
Shakhatreh, Hazim ;
Sawalmeh, Ahmad H. ;
Al-Fuqaha, Ala ;
Dou, Zuochao ;
Almaita, Eyad ;
Khalil, Issa ;
Othman, Noor Shamsiah ;
Khreishah, Abdallah ;
Guizani, Mohsen .
IEEE ACCESS, 2019, 7 :48572-48634
[33]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715
[34]   Spread-Spectrum Techniques for Bio-Friendly Underwater Acoustic Communications [J].
Sherlock, Benjamin ;
Neasham, Jeffrey A. ;
Tsimenidis, Charalampos C. .
IEEE ACCESS, 2018, 6 :4506-4520
[35]  
Song TL, 2016, INT CONF COMPUT NETW, P346
[36]   A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions [J].
Sun, Li ;
Du, Qinghe .
ENTROPY, 2018, 20 (10)
[37]   Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes [J].
Sun, Li ;
Zhang, Taiyi ;
Li, Yubo ;
Niu, Hao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (08) :3801-3807
[38]   A Survey on LoRa Networking: Research Problems, Current Solutions, and Open Issues [J].
Sundaram, Jothi Prasanna ;
Du, Wan ;
Zhao, Zhiwei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :371-388
[39]   Jamming Mitigation via Hierarchical Security Game for IoT Communications [J].
Tang, Xiao ;
Ren, Pinyi ;
Han, Zhu .
IEEE ACCESS, 2018, 6 :5766-5779
[40]   Analysis of a Frequency-Hopping Millimeter-Wave Cellular Uplink [J].
Torrieri, Don ;
Talarico, Salvatore ;
Valenti, Matthew C. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (10) :7089-7098