Abstract
In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.
Similar content being viewed by others
References
Wan J, Tang S, Shu Z, Li D, Wang S, Imran M, Vasilakos AV (2016) Software-defined industrial internet of things in the context of industry 4.0. IEEE Sens J 16(20):7373–7380
Zhang J, Duong TQ, Woods R, Marshall A (2017) Securing wireless communications of the internet of things from the physical layer, an overview. Entropy 19(8):1–16
Heng S, So-In C, Nguyen TG (2017) Distributed image compression architecture over wireless multimedia sensor networks. Wirel Commun Mob Comput 2017:1–21
Nguyen TG, So-In C, Nguyen NG, Phoemphon S (2017) A novel energy-efficient clustering protocol with area coverage awareness for wireless sensor networks. Peer to Peer Netw Appl 10(3):519–536
Mukherjee A (2015) Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proc IEEE 103(10):1747–1761
Naira AK, Asmib S, Gopakumar A (2016) Analysis of physical layer security via co-operative communication in internet of things. Procedia Technol 24:896–903
Abomhara M, Koien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Proc. IEEE int. conf. privacy security mobile syst., pp 1–8
Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun Survey Tuts 17(3):1294–1312
Zhou L, Chao H (2011) Multimedia traffic security architecture for the internet of things. IEEE Netw 25(3):35–40
Jing Q, Vasilakos A, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501
Zhang K, Liang X, Lu R, Shen X (2014) Sybil attacks and their defenses in the internet of things. IEEE Internet Things J 1(5):372–383
Abomhara M, Koien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Proc. IEEE int. conf. privacy security mobile syst., pp 1–8
Skarmeta AF, Ramos JLH, Moreno MV (2014) A decentralized approach for security and privacy challenges in the internet of things. In: Proc IEEE world forum internet thing, pp 67–72
Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58
Suo H, Wan J, Zou C, Liu J (2012) Security in the tnternet of things: A review. Proc IEEE Int Conf Comput Sci Electron Eng 3:648–651
Skarmeta AF, Hernandez-Ramos JL, Moreno MV (2014) A decentralized approach for security and privacy challenges in the internet of things. In: Proc IEEE World Forum Internet Things, no 67–72
Soni A, Upadhyay R, Jain A (2017) Internet of things and wireless physical layer security: A survey. Comput Commun Netw Internet Secur 5:115–123
Wang N, Jiang T, Li W, Lv S (2017) Physical-layer security in internet of things based on compressed sensing and frequency selection. IET Commun 11(9):1431–1437
Xu Q, Ren P, Song H, Du Q (2016) Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4:2840–2853
Pecorella T, Brilli L, Mucchi L (2016) The role of physical layer security in IoT: A novel perspective. Information 7(3):1–17
Zhong Z, Peng J, Huang K, Zhong Z (2017) Analysis on physical-layer security for internet of things in ultra dense heterogeneous networks. In: Proc. int. conf. on internet of things (iThings) and IEEE green computing and commun. (greencom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 39–43
Van NT, Do TN, Bao VNQ, An B (2017) Performance analysis of wireless energy harvesting multihop cluster-based networks over Nakagami-m fading channels. IEEE Access 6:3068–3084
Vo VN, Nguyen TG, So-In C, Baig ZA, Sanguanpong S (2018) Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy, IEEE Access
Kamalinejad P, Mahapatra C, Sheng Z, Mirabbasi S, Leung VCM, Guan YL (2015) Wireless energy harvesting for the internet of things. IEEE Commun Mag 53(6):102–108
Hu H, Gao Z, Liao X, Leung VCM (2017) Secure communications in ciot networks with a wireless energy harvesting untrusted relay. Sensors 17(9):1–21
Habibu H, Zungeru AM, Susan AA, Gerald I (2014) Energy harvesting wireless sensor networks: Design and modeling. Int J Wireless Mobile Netw 6(5):17–31
Shaikh FK, Zeadally S (2016) Energy harvesting in wireless sensor networks: A comprehensive review, Renew. Sustain Energy Rev 55:1041–1054
Li T, Dong Y, Fan P, Letaief KB (2017) Wireless communications with RF-based energy harvesting: From information theory to green systems. IEEE Access 5:27538–27550
Smart G, Atkinson J, Mitchell J, Rodrigues M, Andreopoulos Y (2016) Energy harvesting for the internet-of-things: Measurements and probability models. In: Proc int. conf. on telecommun., pp 1–6
Mallick S, Habib A-Z, Ahmed AS, Alam SS (2017) Performance appraisal of wireless energy harvesting in IoT. In: Proc int. conf. on elect. inform. and commun. technology, pp 1–6
Yang G, Ho CK, Guan YL (2014) Dynamic resource allocation for multiple-antenna wireless power transfer. IEEE Trans Signal Process 62(14):3565–3577
Xiao L, Wang P, Niyato D, Kim DI, Han Z (2014) Wireless networks with RF energy har-vesting: A contemporary survey. IEEE Commun Surveys Tutorials 17(2):757–789
Chen Z, Ding Z, Dai X, Zhang R (2016) A mathematical proof of the superiority of NOMA compared to conventional OMA. IEEE Trans. Signal Process., pp 1–28. arXiv:1612.01069
Vo VN, Nguyen TG, So-In C, Ha D-B (2017) Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer. IEEE Access 5:25196–25206
Wang N, Song X, Cheng J, Leung VCM (2014) Enhancing the security of free-space optical communications with secret sharing and key agreement. J Opt Commun Netw 6(12):1072– 1081
Ha D-B, Nguyen SQ (2017) Outage performance of energy harvesting DF relaying NOMA networks, Mobile Networks and Applicat., pp 1–14. [Online]. Available: https://doi.org/10.1007/s11036-017-0922-x
Ha D-B, Tran D-D, Truong T-V, Vo N-V (2016) Physical layer secrecy performance of energy harvesting networks with power transfer station selection. In: Proc IEEE Int. Conf. Commun. Electron., pp 451–456
Naderi MY, Chowdhury KR, Basagni S (2015) Wireless sensor networks with RF energy harvesting: Energy models and analysis. In: Proc IEEE Wireless Commun. and Networking Conf., pp 1494–1499
Oliveira D, Oliveira R (2016) Modeling energy availability in RF energy harvesting networks. In: Proc Int. Symp. on Wireless Commun. Syst., pp 383–387
Hoang TM, Duong TQ, Vo NS, Kundu C (2017) Physical layer security in cooperative energy harvesting networks with a friendly jammer. IEEE Wireless Commun Lett 6(2):174– 177
Tran H, Quach TX, Tran H, Uhlemann E (2017) Optimal energy harvesting time and transmit power in cognitive radio network under joint constraints of primary users and eavesdroppers. In: Proc. Int. Symp. on Personal, Indoor and Mobile Radio Commun., pp 1–8
Yang N, Yeoh PL, Elkashlan M, Schober R, Collings IB (2013) Transmit antenna selection for security enhancement in mimo wiretap channels. IEEE Trans Commun 61(1):144–154
Deng Y, Elkashlan M, Yeoh PL, Yang N, Mallik RK (2014) Cognitive mimo relay networks with generalized selection combining. IEEE Trans Wireless Commun 13(9):4911–4922
Gradshteyn I, Ryzhik I, Zwillinger D (2007) Table of integrals, series, and products. In: Jeffrey A (ed). Academic Press, USA
Tran H, Akerberg J, Bjorkman M, Tran H-V (2017) RF energy harvesting: an analysis of wireless sensor networks for reliable communication, Wirel. Netw, pp 1–15
Zou Y, Wang G (2016) Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack. IEEE Trans Ind Informat 12(2):780–787
Barros J, Rodrigues MRD (2006) Secrecy capacity of wireless channels, Proc. IEEE Int. Symp. Inf. Theory, pp 356–360.
Bhargav N, Cotton SL, Simmons DE (2016) Secrecy capacity analysis over κ-μ fading channels: Theory and applications. IEEE Trans Commun 64(7):1–26
Toan HV, Bao VNQ, Le HN (2017) Cognitive two-way relay systems with multiple primary receivers: exact and asymptotic outage formulation. IET Commun 11(16):2490–2497
Hine G (2017) Proof by mathematical induction: professional practice for secondary teachers. In: Australian Assoc. of Math. Teachers Biennial Conf., pp 1–8
Acknowledgements
This work was supported in part by the Thailand Research Fund, Thai Network Information Center Foundation, under Grant RSA6180067, in part by Khon Kaen University, and in part by the SSF Framework Grant Serendipity.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix: Proofs for the PDF and the CDF of \(\gamma _{PS_{m}}\)
Appendix: Proofs for the PDF and the CDF of \(\gamma _{PS_{m}}\)
With the number of power transfer stations N = 2, we have
Accordingly, the PDF of \(\gamma _{P{S_{m}}}\) is formulated as follows:
Using the induction method [50], the PDF of \(\gamma _{P{S_{m}}}\) with N PTSs (i.e., the summary of N random variables having nonidentical exponential distributions) can be obtained as follows:
Similarly, the CDF of \(\gamma _{P{S_{m}}}\) with N PTSs can be derived:
Rights and permissions
About this article
Cite this article
Vo, V.N., Nguyen, T.G., So-In, C. et al. Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. Mobile Netw Appl 25, 193–210 (2020). https://doi.org/10.1007/s11036-019-01217-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01217-7