Abstract

Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming‐based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.

Highlights

  • The popularization of smart devices and corresponding applications in Internet of Things (IoT) systems, such as smart city, intelligent industry, and security surveillance, has penetrated modern life [1]

  • (i) We formulate a general cooperative jamming model and present main metrics to measure security levels of signal transmission (ii) We systematically review cooperative jamming strategies for limited energy scenarios in terms of optimal power allocation and wireless-powered methods (iii) We raise a series of interesting open issues that need to be studied in depth to improve secure energy efficiency for physical layer security

  • We investigate cooperative jamming schemes for physical layer security for an IoT system with energy constraints

Read more

Summary

Introduction

The popularization of smart devices and corresponding applications in Internet of Things (IoT) systems, such as smart city, intelligent industry, and security surveillance, has penetrated modern life [1]. We heavily rely on these wireless smart devices for private information transmission. The rapid development of mobile computing prompts smart devices to receive wireless signals without restriction. Due to the broadcast nature of wireless channels, legitimate wireless signals are vulnerable to unauthorized receivers. Wiretap, caused by an eavesdropper, is a passive attack and does not interfere with legitimate transceivers. Though a legitimate receiver can receive untampered signals, the privacy leakage of these signals is unacceptable along with more attention to information security [2,3,4]

Objectives
Methods
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.