Cargando…

Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity,...

Descripción completa

Detalles Bibliográficos
Autores principales: Hu, Hequn, Gao, Zhenzhen, Liao, Xuewen, Leung, Victor C. M.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5621061/
https://www.ncbi.nlm.nih.gov/pubmed/28869540
http://dx.doi.org/10.3390/s17092023
_version_ 1783267677369794560
author Hu, Hequn
Gao, Zhenzhen
Liao, Xuewen
Leung, Victor C. M.
author_facet Hu, Hequn
Gao, Zhenzhen
Liao, Xuewen
Leung, Victor C. M.
author_sort Hu, Hequn
collection PubMed
description The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ([Formula: see text]), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. [Formula: see text] is analyzed for the proposed secure schemes, and the closed form expressions of [Formula: see text] for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better [Formula: see text] than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar [Formula: see text] , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.
format Online
Article
Text
id pubmed-5621061
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-56210612017-10-03 Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay Hu, Hequn Gao, Zhenzhen Liao, Xuewen Leung, Victor C. M. Sensors (Basel) Article The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ([Formula: see text]), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. [Formula: see text] is analyzed for the proposed secure schemes, and the closed form expressions of [Formula: see text] for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better [Formula: see text] than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar [Formula: see text] , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. MDPI 2017-09-04 /pmc/articles/PMC5621061/ /pubmed/28869540 http://dx.doi.org/10.3390/s17092023 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Hu, Hequn
Gao, Zhenzhen
Liao, Xuewen
Leung, Victor C. M.
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
title Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
title_full Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
title_fullStr Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
title_full_unstemmed Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
title_short Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
title_sort secure communications in ciot networks with a wireless energy harvesting untrusted relay
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5621061/
https://www.ncbi.nlm.nih.gov/pubmed/28869540
http://dx.doi.org/10.3390/s17092023
work_keys_str_mv AT huhequn securecommunicationsinciotnetworkswithawirelessenergyharvestinguntrustedrelay
AT gaozhenzhen securecommunicationsinciotnetworkswithawirelessenergyharvestinguntrustedrelay
AT liaoxuewen securecommunicationsinciotnetworkswithawirelessenergyharvestinguntrustedrelay
AT leungvictorcm securecommunicationsinciotnetworkswithawirelessenergyharvestinguntrustedrelay