Cargando…

Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity,...

Descripción completa

Detalles Bibliográficos
Autores principales: Hu, Hequn, Gao, Zhenzhen, Liao, Xuewen, Leung, Victor C. M.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5621061/
https://www.ncbi.nlm.nih.gov/pubmed/28869540
http://dx.doi.org/10.3390/s17092023
Descripción
Sumario:The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ([Formula: see text]), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. [Formula: see text] is analyzed for the proposed secure schemes, and the closed form expressions of [Formula: see text] for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better [Formula: see text] than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar [Formula: see text] , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.