Abstract

The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be achieved. Simulation results demonstrate the effective performance of the cooperative jamming scheme and the auction framework.

Highlights

  • With the tremendous deployment of the Internet and mobile communications, the Internet of Things (IoT) emerges as a promising technology to connect billions of everyday objects and the surrounding environments using different kinds of sensors and actuators [1,2,3]

  • The primary network consists of a primary transmitter-receiver pair (Pt, Pr), while the secondary network consists of a secondary transmitter-receiver pair (St, Sr) and a secondary user that acts as a helper (He)

  • This paper addresses the physical layer security issue in Cognitive Internet of Things (CIoT) networks by employing cooperative jamming

Read more

Summary

Introduction

With the tremendous deployment of the Internet and mobile communications, the Internet of Things (IoT) emerges as a promising technology to connect billions of everyday objects and the surrounding environments using different kinds of sensors and actuators [1,2,3]. The problem of how to choose and negotiate with a suitable helper among multiple secondary users needs to be solved Bearing these challenges in mind, at first, we propose a novel cooperative jamming scheme to encourage the helper by employing energy harvesting technology [24]. We assume there exists channel mismatches for the eavesdropper links that are norm-bounded [28,29] Based on this scheme, we propose a novel auction framework to solve the helper selection and the corresponding energy allocation problems. The proposed framework guarantees an improved secure communication quality of the primary user, i.e., the degraded SINR at the eavesdropper, and stimulates the cooperative behavior of the helper.

Existing Work on Jamming in Physical Layer Security
Existing Work on Auction
System and Communication Models
Communication Process in Phase 1
Communication Process in Phase 2
Proposed Cooperative Jamming Scheme
Problem Formulation
Proposed Solutions
The First Stage
The Second Stage
An Illustrative Example
Proposed Auction Framework
Mathematical Definitions
Strategy of Bidders
Implementation Details
Simulation Study
Simulation Study of the Proposed Jamming Scheme
Simulation Study of the Proposed Auction Framework
Summary and Future Work
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.