Cargando…

Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasin...

Descripción completa

Detalles Bibliográficos
Autores principales: Li, Zhen, Jing, Tao, Ma, Liran, Huo, Yan, Qian, Jin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4813914/
https://www.ncbi.nlm.nih.gov/pubmed/26959032
http://dx.doi.org/10.3390/s16030339
_version_ 1782424343874109440
author Li, Zhen
Jing, Tao
Ma, Liran
Huo, Yan
Qian, Jin
author_facet Li, Zhen
Jing, Tao
Ma, Liran
Huo, Yan
Qian, Jin
author_sort Li, Zhen
collection PubMed
description The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be achieved. Simulation results demonstrate the effective performance of the cooperative jamming scheme and the auction framework.
format Online
Article
Text
id pubmed-4813914
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-48139142016-04-06 Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks Li, Zhen Jing, Tao Ma, Liran Huo, Yan Qian, Jin Sensors (Basel) Article The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be achieved. Simulation results demonstrate the effective performance of the cooperative jamming scheme and the auction framework. MDPI 2016-03-07 /pmc/articles/PMC4813914/ /pubmed/26959032 http://dx.doi.org/10.3390/s16030339 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Li, Zhen
Jing, Tao
Ma, Liran
Huo, Yan
Qian, Jin
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
title Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
title_full Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
title_fullStr Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
title_full_unstemmed Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
title_short Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks
title_sort worst-case cooperative jamming for secure communications in ciot networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4813914/
https://www.ncbi.nlm.nih.gov/pubmed/26959032
http://dx.doi.org/10.3390/s16030339
work_keys_str_mv AT lizhen worstcasecooperativejammingforsecurecommunicationsinciotnetworks
AT jingtao worstcasecooperativejammingforsecurecommunicationsinciotnetworks
AT maliran worstcasecooperativejammingforsecurecommunicationsinciotnetworks
AT huoyan worstcasecooperativejammingforsecurecommunicationsinciotnetworks
AT qianjin worstcasecooperativejammingforsecurecommunicationsinciotnetworks