...
首页> 外文期刊>Sensors >Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
【24h】

Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

机译:使用无线能量收集不受信任的中继在CIoT网络中进行安全通信

获取原文
   

获取外文期刊封面封底 >>

       

摘要

The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.
机译:物联网(IoT)代表着光明的前景,即各种通用设备可以相互连接以及与Internet的其余部分相连接,以极大地改善我们的生活。物联网设备的有限硬件,低复杂性和严格的能源限制给通信和安全带来了独特的挑战。此外,大量物联网设备的使用也引发了严重的频谱稀缺问题。在本文中,考虑了认知物联网(CIoT),其中物联网网络用作使用底层频谱共享的辅助系统。无线能量收集(EH)节点用作中继,以改善IoT设备的覆盖范围。但是,中继可能是窃听IoT设备消息的潜在窃听者。本文考虑了通过无线EH不信任中继在IoT设备(例如传感器)和目的地(例如控制器)之间进行安全通信的问题。由于目标可以配备足够的能量,因此基于功率分配(PS)和时间划分(TS)策略提出了基于目标辅助干扰的安全方案,称为预编码的基于PS(Int-PS)的直观安全方案基于PS(Pre-PS)的安全方案,基于TS(Int-TS)的直观安全方案和基于TS(Pre-TS)的预编码安全方案。通过成功安全传输的概率度量(P S S T)来评估所提出方案的安全性能,该度量表示满足主要用户的干扰约束并且保密率为正的概率。针对提出的安全方案对PS进行了分析,并通过仿真结果推导并验证了Pre-PS和Pre-TS的PS的闭式表达式。数值结果表明,在相似功耗下,预编码安全方案比直观安全方案具有更好的PS T。当基于PS和TS策略的安全方案具有相似的PS T时,基于TS的安全方案的平均发射功率消耗会降低。还通过仿真讨论了功率分配和时间分割比的影响。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号