Abstract

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.

Highlights

  • With the development of Internet of Things (IoT), the traditional industrial models have been gradually changed, triggering a new wave of industrial, economic, and social development.[1,2,3] As a new form of Internet-based information technology, in addition to all the same types of cyber-attack threats as in the other wireless networks,[4,5,6] the IoT field faces more and more complex threats due to its multi-source heterogeneity, openness, ubiquity, and other characteristics

  • In view of the fact that IoT devices are generally energy constrained, we propose a power allocation scheme to minimize the sum of transmission power while meeting the basic security requirements

  • We propose a power allocation problem and give the corresponding solution algorithm in section ‘‘The power allocation problem.’’ the numerical results of our schemes are provided in section ‘‘Numerical results’’ and our work is concluded in section ‘‘Conclusion.’’

Read more

Summary

Introduction

With the development of Internet of Things (IoT), the traditional industrial models have been gradually changed, triggering a new wave of industrial, economic, and social development.[1,2,3] As a new form of Internet-based information technology, in addition to all the same types of cyber-attack threats as in the other wireless networks,[4,5,6] the IoT field faces more and more complex threats due to its multi-source heterogeneity, openness, ubiquity, and other characteristics. In scenarios where eavesdroppers’ channel state information (CSI) cannot be obtained, in some previous studies[22,23,24] different physical layer security transmission schemes were designed, via secrecy encoding together with artificial-noise-aided signaling, pace power synthesis, and power allocation, respectively. For enhancing the ability to decode the information, Bob and S-Eve can take different strategies to maximize their SINRs. Bob can work with Alice and Jammer, while S-Eve can use a more effective diversity receiving method.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call