Cargando…
Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things
Smart homes can improve the quality of life and be implemented by Internet of Things (IoT) technologies. However, security is a very important issue in smart homes. For this reason, we propose a secrecy transmission protocol for primary user (PU) by selecting friendly jammer in cognitive IoT model....
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6308576/ https://www.ncbi.nlm.nih.gov/pubmed/30518061 http://dx.doi.org/10.3390/s18124257 |
_version_ | 1783383221587673088 |
---|---|
author | Xie, Ping Xing, Ling Wu, Honghai Seo, Jung Taek You, Ilsun |
author_facet | Xie, Ping Xing, Ling Wu, Honghai Seo, Jung Taek You, Ilsun |
author_sort | Xie, Ping |
collection | PubMed |
description | Smart homes can improve the quality of life and be implemented by Internet of Things (IoT) technologies. However, security is a very important issue in smart homes. For this reason, we propose a secrecy transmission protocol for primary user (PU) by selecting friendly jammer in cognitive IoT model. In particular, a secondary transmitter (ST) is selected to transmit secondary signals by the PU’s frequency spectrum, while another ST is chosen to transmit artificial noise to protect the transmission confidentiality of the PU against eavesdropping. Moreover, two selection schemes are presented to confirm the former and the latter ST, and the goal is to optimize the secondary transmission performance and the primary security performance, respectively. For the non-security model and the proposed protocol, we derive the closed-form expressions of the intercept probability and the outage probability for the PU. We also obtain the closed-form expression of outage probability for the secondary user. The numerical results show that the security performance of the PU is significantly enhanced in our protocol compared to the non-security model. In addition, the outage performance of the secondary users is also improved in high secondary transmit SNR region. |
format | Online Article Text |
id | pubmed-6308576 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-63085762019-01-04 Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things Xie, Ping Xing, Ling Wu, Honghai Seo, Jung Taek You, Ilsun Sensors (Basel) Article Smart homes can improve the quality of life and be implemented by Internet of Things (IoT) technologies. However, security is a very important issue in smart homes. For this reason, we propose a secrecy transmission protocol for primary user (PU) by selecting friendly jammer in cognitive IoT model. In particular, a secondary transmitter (ST) is selected to transmit secondary signals by the PU’s frequency spectrum, while another ST is chosen to transmit artificial noise to protect the transmission confidentiality of the PU against eavesdropping. Moreover, two selection schemes are presented to confirm the former and the latter ST, and the goal is to optimize the secondary transmission performance and the primary security performance, respectively. For the non-security model and the proposed protocol, we derive the closed-form expressions of the intercept probability and the outage probability for the PU. We also obtain the closed-form expression of outage probability for the secondary user. The numerical results show that the security performance of the PU is significantly enhanced in our protocol compared to the non-security model. In addition, the outage performance of the secondary users is also improved in high secondary transmit SNR region. MDPI 2018-12-04 /pmc/articles/PMC6308576/ /pubmed/30518061 http://dx.doi.org/10.3390/s18124257 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Xie, Ping Xing, Ling Wu, Honghai Seo, Jung Taek You, Ilsun Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things |
title | Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things |
title_full | Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things |
title_fullStr | Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things |
title_full_unstemmed | Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things |
title_short | Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things |
title_sort | cooperative jammer selection for secrecy improvement in cognitive internet of things |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6308576/ https://www.ncbi.nlm.nih.gov/pubmed/30518061 http://dx.doi.org/10.3390/s18124257 |
work_keys_str_mv | AT xieping cooperativejammerselectionforsecrecyimprovementincognitiveinternetofthings AT xingling cooperativejammerselectionforsecrecyimprovementincognitiveinternetofthings AT wuhonghai cooperativejammerselectionforsecrecyimprovementincognitiveinternetofthings AT seojungtaek cooperativejammerselectionforsecrecyimprovementincognitiveinternetofthings AT youilsun cooperativejammerselectionforsecrecyimprovementincognitiveinternetofthings |