Design and Optimization of Physical Layer Security Transmission Scheme in Random Cognitive Internet of Things

Author(s):  
Zeyuan Zhu ◽  
Baoquan Yu ◽  
Xiaojing Chu ◽  
Yueming Cai
Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

AbstractAiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.


2020 ◽  
Vol 12 (4) ◽  
pp. 66-78
Author(s):  
Rabia Tugce Yazicigil ◽  
Phillip M. Nadeau ◽  
Daniel D. Richman ◽  
Chiraag Juvekar ◽  
Saurav Maji ◽  
...  

2021 ◽  
Author(s):  
Grishma Khadka ◽  
Biplob Ray ◽  
Jinho Choi ◽  
Nemai Karmakar

<div>This paper has proposed detection and physical layer security provision for printed sensory tag systems for internet of things (IoT) applications. The printed sensory tags can be a very cost-effective way to speed up the proliferation of the intelligent world of IoT. The printed Radio Frequency Identification (RFID) of a sensory tag is chipless with the fully printable feature, non-line-of-sight reading, low cost, and robustness to the environment. The detection and adoption of security features for such tags in a robust environment are still challenging. This paper initially presents a robust technology for detecting tags using both the amplitude and phase information of the frequency signature. After successfully identifying tag IDs, the paper presents novel physical layer security using a deep learning model to prevent the cloning of tags. Our experiment shows that the proposed system can detect and identify the unique physical attributes of the tag and isolate the clone tag from the genuine tag. It is believed that such real-time and precise detection and security features bring this technology closer to commercialisation for IoT applications.</div>


2020 ◽  
Vol 7 (1) ◽  
pp. 99-115 ◽  
Author(s):  
Bin Dai ◽  
Zheng Ma ◽  
Yuan Luo ◽  
Xuxun Liu ◽  
Zhuojun Zhuang ◽  
...  

2020 ◽  
Vol 16 (6) ◽  
pp. 155014772093346
Author(s):  
Xin Fan ◽  
Yan Huo

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.


Sign in / Sign up

Export Citation Format

Share Document