scholarly journals Secure Transmission for Buffer-Aided Relay Networks in the Internet of Things

2019 ◽  
Vol 9 (21) ◽  
pp. 4506
Author(s):  
Chen Wei ◽  
Wendong Yang ◽  
Yueming Cai

This paper investigates the secure transmission for buffer-aided relay networks in the Internet of Things (IoT) in the presence of multiple passive eavesdroppers. For security enhancement, we adopt the max-link relay selection policy and propose three secure transmission schemes: (1) non-jamming (NJ); (2) source cooperative jamming (SCJ); and (3) source cooperative jamming with optimal power allocation (SCJ-OPA). Moreover, to analyze the secrecy performance comprehensively, two eavesdropping scenarios, i.e., non-colluding eavesdroppers (NCE) and colluding eavesdroppers (CE) are considered. Based on this, by modeling the dynamic buffer state transition as a Markov chain, we derive the exact closed-form expressions of the secrecy outage probability, the average secrecy throughput, and the end-to-end delay for each schemes. The analytical analysis and simulation shows that the SCJ-OPA scheme achieves similar performance as the NJ scheme when the total transmit power is small. On the other hand, when the transmit power is high, the performance achieved by SCJ-OPA is similar to that of SCJ. Thereby, the SCJ-OPA scheme can achieve better performance across the entire total transmit power, which makes up the defects of NJ and SCJ exactly.

2020 ◽  
Vol 16 (6) ◽  
pp. 155014772093346
Author(s):  
Xin Fan ◽  
Yan Huo

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.


Author(s):  
Sivaganesan D

The internet of things constitutes for more and advanced opportunities paving way for a competitive advantage in numerous industrious in the prevailing and the upcoming markets. The internet of things and the technologies associated with it are not only creating alterations in the internetwork alone but also with the things that are connected to it. As the internet of things includes the generation and the analysis of the data as the important process, it finds difficulties in administering and protecting the data that are flowing from different levels. This in turn causes difficulties in the secure transmission of the information from its source to the authorized destination and the authorized person at the right time. So the above reasons bring in the capability of the block chain into the IOT, to improve the security as well as implant the transparency. The paper put forward a block chain enabled IOT for the pharmaceutical sector to elude the issue of counterfeit in the medicines.


Author(s):  
JUSAK JUSAK ◽  
BRAMASTA AGNANDA SETIAWAN ◽  
SONY SOLEHUDIN ◽  
IRA PUSPASARI

ABSTRAKData World Health Organization (WHO) pada tahun 2014 menunjukkan bahwa di Indonesia sebanyak 37% dari seluruh penyebab kematian adalah penyakit yang berhubungan dengan jantung. Kehadiran teknologi dan pemanfaatan Internet of Things (IoT) diharapkan dapat membantu mengurangi resiko kematian akibat penyakit jantung tersebut. Pada penelitian ini, pengukuran dan pengamatan sinyal jantung melalui tele-auskultasi sinyal elektrokardiogram (EKG) dilakukan. Untuk mengamankan sinyal EKG dalam proses transmisi melalui jaringan Internet digunakan metode anonimasi sinyal berbasis algoritma Jusak-Seedahmed. Hasil pengujian menunjukkkan bahwa algoritma Jusak-Seedahmed dapat melakukan proses anonimasi dan proses rekonstruksi sinyal dengan baik. Pengujian korelasi silang antara sinyal hasil rekonstruksi dan sinyal EKG asli sebelum anonimasi menghasilkan korelasi sebesar 1 pada lag=0. Sinyal EKG hasil rekonstruksi ditampilkan dalam aplikasi mobile untuk memudahkan analisis oleh dokter.Kata kunci: elektrokardiogram, keamanan, anonimasi, IoT, FFT ABSTRACTBased on the latest data released by the World Health Organization in 2014, deaths caused by cardiovascular disease in 2012 have reached 37% of the total number of non-communicable diseases deaths in Indonesia. Therefore, it is expected that the applications of the Internet of Things (IoT) might be used to reduce the risk of death due to the heart related problems. In this research, a tele-auscultation technique for measuring and monitoring electrocardiogram (ECG) signal was built. To secure transmission of the ECG signal over the Internet, we implemented a recently proposed Jusak-Seedahmed algorithm. Our examinations showed that the algorithm performed the anonymization and reconstruction processes well. Crosscorrelation analysis showed that correlation between the reconstructed and the original ECG signal at lag=0 was 1. Furthermore, a mobile-based application had been built to display the reconstructed ECG signal for further analysis.Keywords: electrocardiogram, security, anonimization, IoT, FFT


2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Xiaohui Shang ◽  
Aijun Liu ◽  
Yida Wang ◽  
Qing Xie ◽  
Yong Wang

In this paper, the secure uplink transmission scenario in Internet of Things (IoT) applications is investigated, where one of multiple sensors communicates with the controller aided by the cooperative relay. Firstly, by considering the direct link, an energy-efficient transmission scheme (EET) is proposed, which can be suitable for the resource-constrained devices and applications in IoT communication. Moreover, the secrecy outage probability (SOP) and secure energy efficiency (SEE) of different transmission strategies are derived, which contributes to the design of energy-efficient secure transmission. Finally, simulation results demonstrate that EET outperforms other transmission protocols in terms of SEE in most situations. To improve the secrecy performance and energy efficiency of the IoT deployment, EET can be adopted as an effective additional strategy in practical applications.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 11862-11870 ◽  
Author(s):  
Dechuan Chen ◽  
Weiwei Yang ◽  
Jianwei Hu ◽  
Yueming Cai ◽  
Xuanxuan Tang

2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2019 ◽  
pp. 4-44 ◽  
Author(s):  
Peter Thorns

This paper discusses the organisations involved in the development of application standards, European regulations and best practice guides, their scope of work and internal structures. It considers their respective visions for the requirements for future standardisation work and considers in more detail those areas where these overlap, namely human centric or integrative lighting, connectivity and the Internet of Things, inclusivity and sustainability.


Sign in / Sign up

Export Citation Format

Share Document