Skip to main content

Advertisement

Log in

Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Wan J, Tang S, Shu Z, Li D, Wang S, Imran M, Vasilakos AV (2016) Software-defined industrial internet of things in the context of industry 4.0. IEEE Sens J 16(20):7373–7380

    Google Scholar 

  2. Zhang J, Duong TQ, Woods R, Marshall A (2017) Securing wireless communications of the internet of things from the physical layer, an overview. Entropy 19(8):1–16

    Article  Google Scholar 

  3. Heng S, So-In C, Nguyen TG (2017) Distributed image compression architecture over wireless multimedia sensor networks. Wirel Commun Mob Comput 2017:1–21

    Article  Google Scholar 

  4. Nguyen TG, So-In C, Nguyen NG, Phoemphon S (2017) A novel energy-efficient clustering protocol with area coverage awareness for wireless sensor networks. Peer to Peer Netw Appl 10(3):519–536

    Article  Google Scholar 

  5. Mukherjee A (2015) Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proc IEEE 103(10):1747–1761

    Article  Google Scholar 

  6. Naira AK, Asmib S, Gopakumar A (2016) Analysis of physical layer security via co-operative communication in internet of things. Procedia Technol 24:896–903

    Article  Google Scholar 

  7. Abomhara M, Koien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Proc. IEEE int. conf. privacy security mobile syst., pp 1–8

  8. Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun Survey Tuts 17(3):1294–1312

    Article  Google Scholar 

  9. Zhou L, Chao H (2011) Multimedia traffic security architecture for the internet of things. IEEE Netw 25(3):35–40

    Article  Google Scholar 

  10. Jing Q, Vasilakos A, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501

    Article  Google Scholar 

  11. Zhang K, Liang X, Lu R, Shen X (2014) Sybil attacks and their defenses in the internet of things. IEEE Internet Things J 1(5):372–383

    Article  Google Scholar 

  12. Abomhara M, Koien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Proc. IEEE int. conf. privacy security mobile syst., pp 1–8

  13. Skarmeta AF, Ramos JLH, Moreno MV (2014) A decentralized approach for security and privacy challenges in the internet of things. In: Proc IEEE world forum internet thing, pp 67–72

  14. Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58

    Article  Google Scholar 

  15. Suo H, Wan J, Zou C, Liu J (2012) Security in the tnternet of things: A review. Proc IEEE Int Conf Comput Sci Electron Eng 3:648–651

    Google Scholar 

  16. Skarmeta AF, Hernandez-Ramos JL, Moreno MV (2014) A decentralized approach for security and privacy challenges in the internet of things. In: Proc IEEE World Forum Internet Things, no 67–72

  17. Soni A, Upadhyay R, Jain A (2017) Internet of things and wireless physical layer security: A survey. Comput Commun Netw Internet Secur 5:115–123

    Google Scholar 

  18. Wang N, Jiang T, Li W, Lv S (2017) Physical-layer security in internet of things based on compressed sensing and frequency selection. IET Commun 11(9):1431–1437

    Google Scholar 

  19. Xu Q, Ren P, Song H, Du Q (2016) Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4:2840–2853

    Article  Google Scholar 

  20. Pecorella T, Brilli L, Mucchi L (2016) The role of physical layer security in IoT: A novel perspective. Information 7(3):1–17

    Article  Google Scholar 

  21. Zhong Z, Peng J, Huang K, Zhong Z (2017) Analysis on physical-layer security for internet of things in ultra dense heterogeneous networks. In: Proc. int. conf. on internet of things (iThings) and IEEE green computing and commun. (greencom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 39–43

  22. Van NT, Do TN, Bao VNQ, An B (2017) Performance analysis of wireless energy harvesting multihop cluster-based networks over Nakagami-m fading channels. IEEE Access 6:3068–3084

    Article  Google Scholar 

  23. Vo VN, Nguyen TG, So-In C, Baig ZA, Sanguanpong S (2018) Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy, IEEE Access

  24. Kamalinejad P, Mahapatra C, Sheng Z, Mirabbasi S, Leung VCM, Guan YL (2015) Wireless energy harvesting for the internet of things. IEEE Commun Mag 53(6):102–108

    Article  Google Scholar 

  25. Hu H, Gao Z, Liao X, Leung VCM (2017) Secure communications in ciot networks with a wireless energy harvesting untrusted relay. Sensors 17(9):1–21

    Article  Google Scholar 

  26. Habibu H, Zungeru AM, Susan AA, Gerald I (2014) Energy harvesting wireless sensor networks: Design and modeling. Int J Wireless Mobile Netw 6(5):17–31

    Article  Google Scholar 

  27. Shaikh FK, Zeadally S (2016) Energy harvesting in wireless sensor networks: A comprehensive review, Renew. Sustain Energy Rev 55:1041–1054

    Article  Google Scholar 

  28. Li T, Dong Y, Fan P, Letaief KB (2017) Wireless communications with RF-based energy harvesting: From information theory to green systems. IEEE Access 5:27538–27550

    Article  Google Scholar 

  29. Smart G, Atkinson J, Mitchell J, Rodrigues M, Andreopoulos Y (2016) Energy harvesting for the internet-of-things: Measurements and probability models. In: Proc int. conf. on telecommun., pp 1–6

  30. Mallick S, Habib A-Z, Ahmed AS, Alam SS (2017) Performance appraisal of wireless energy harvesting in IoT. In: Proc int. conf. on elect. inform. and commun. technology, pp 1–6

  31. Yang G, Ho CK, Guan YL (2014) Dynamic resource allocation for multiple-antenna wireless power transfer. IEEE Trans Signal Process 62(14):3565–3577

    Article  MathSciNet  Google Scholar 

  32. Xiao L, Wang P, Niyato D, Kim DI, Han Z (2014) Wireless networks with RF energy har-vesting: A contemporary survey. IEEE Commun Surveys Tutorials 17(2):757–789

    Google Scholar 

  33. Chen Z, Ding Z, Dai X, Zhang R (2016) A mathematical proof of the superiority of NOMA compared to conventional OMA. IEEE Trans. Signal Process., pp 1–28. arXiv:1612.01069

  34. Vo VN, Nguyen TG, So-In C, Ha D-B (2017) Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer. IEEE Access 5:25196–25206

    Article  Google Scholar 

  35. Wang N, Song X, Cheng J, Leung VCM (2014) Enhancing the security of free-space optical communications with secret sharing and key agreement. J Opt Commun Netw 6(12):1072– 1081

    Article  Google Scholar 

  36. Ha D-B, Nguyen SQ (2017) Outage performance of energy harvesting DF relaying NOMA networks, Mobile Networks and Applicat., pp 1–14. [Online]. Available: https://doi.org/10.1007/s11036-017-0922-x

    Article  MathSciNet  Google Scholar 

  37. Ha D-B, Tran D-D, Truong T-V, Vo N-V (2016) Physical layer secrecy performance of energy harvesting networks with power transfer station selection. In: Proc IEEE Int. Conf. Commun. Electron., pp 451–456

  38. Naderi MY, Chowdhury KR, Basagni S (2015) Wireless sensor networks with RF energy harvesting: Energy models and analysis. In: Proc IEEE Wireless Commun. and Networking Conf., pp 1494–1499

  39. Oliveira D, Oliveira R (2016) Modeling energy availability in RF energy harvesting networks. In: Proc Int. Symp. on Wireless Commun. Syst., pp 383–387

  40. Hoang TM, Duong TQ, Vo NS, Kundu C (2017) Physical layer security in cooperative energy harvesting networks with a friendly jammer. IEEE Wireless Commun Lett 6(2):174– 177

    Article  Google Scholar 

  41. Tran H, Quach TX, Tran H, Uhlemann E (2017) Optimal energy harvesting time and transmit power in cognitive radio network under joint constraints of primary users and eavesdroppers. In: Proc. Int. Symp. on Personal, Indoor and Mobile Radio Commun., pp 1–8

  42. Yang N, Yeoh PL, Elkashlan M, Schober R, Collings IB (2013) Transmit antenna selection for security enhancement in mimo wiretap channels. IEEE Trans Commun 61(1):144–154

    Article  Google Scholar 

  43. Deng Y, Elkashlan M, Yeoh PL, Yang N, Mallik RK (2014) Cognitive mimo relay networks with generalized selection combining. IEEE Trans Wireless Commun 13(9):4911–4922

    Article  Google Scholar 

  44. Gradshteyn I, Ryzhik I, Zwillinger D (2007) Table of integrals, series, and products. In: Jeffrey A (ed). Academic Press, USA

  45. Tran H, Akerberg J, Bjorkman M, Tran H-V (2017) RF energy harvesting: an analysis of wireless sensor networks for reliable communication, Wirel. Netw, pp 1–15

    Google Scholar 

  46. Zou Y, Wang G (2016) Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack. IEEE Trans Ind Informat 12(2):780–787

    Article  Google Scholar 

  47. Barros J, Rodrigues MRD (2006) Secrecy capacity of wireless channels, Proc. IEEE Int. Symp. Inf. Theory, pp 356–360.

  48. Bhargav N, Cotton SL, Simmons DE (2016) Secrecy capacity analysis over κ-μ fading channels: Theory and applications. IEEE Trans Commun 64(7):1–26

    Article  Google Scholar 

  49. Toan HV, Bao VNQ, Le HN (2017) Cognitive two-way relay systems with multiple primary receivers: exact and asymptotic outage formulation. IET Commun 11(16):2490–2497

    Article  Google Scholar 

  50. Hine G (2017) Proof by mathematical induction: professional practice for secondary teachers. In: Australian Assoc. of Math. Teachers Biennial Conf., pp 1–8

Download references

Acknowledgements

This work was supported in part by the Thailand Research Fund, Thai Network Information Center Foundation, under Grant RSA6180067, in part by Khon Kaen University, and in part by the SSF Framework Grant Serendipity.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chakchai So-In.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix: Proofs for the PDF and the CDF of \(\gamma _{PS_{m}}\)

Appendix: Proofs for the PDF and the CDF of \(\gamma _{PS_{m}}\)

With the number of power transfer stations N = 2, we have

$$ {\gamma_{P{S_{m}}}} = {\gamma_{{P_{1}}{S_{m}}}} + {\gamma_{{P_{2}}{S_{m}}}}. $$
(62)

Accordingly, the PDF of \(\gamma _{P{S_{m}}}\) is formulated as follows:

$$\begin{array}{@{}rcl@{}} &&{\kern-16.4pt}{f_{{\gamma_{P{S_m}}}}}(z) = \int\limits_{- \infty }^{\infty} {\int\limits_{- \infty }^{z - y} {{f_{{\gamma_{{P_1}{S_m}}},{\gamma_{{P_2}{S_m}}}}}(x,y)\text{d}x\text{d}y} } \\ &=& \frac{1}{{{\lambda_{{P_1}{S_m}}} - {\lambda_{{P_2}{S_m}}}}}{e^{- \frac{z}{{{\lambda_{{P_1}{S_m}}}}}}} \left[ {{e^{\left( {\frac{{{\lambda_{{P_2}{S_m}}} - {\lambda_{{P_1}{S_m}}}}}{{{\lambda_{{P_2}{S_m}}}{\lambda_{{P_1}{S_m}}}}}} \right)z}} - 1} \right]\\ &=&\frac{{{\lambda_{{P_1}{S_m}}}}}{{{\lambda_{{P_1}{S_m}}} - {\lambda_{{P_2}{S_m}}}}}{f_{{\gamma_{{P_1}{S_m}}}}}(z) \\ &&+ \frac{{{\lambda_{{P_2}{S_m}}}}}{{{\lambda_{{P_2}{S_m}}} - {\lambda_{{P_1}{S_m}}}}}{f_{{\gamma_{{P_2}{S_m}}}}}(z) \end{array} $$
(63)
$$\begin{array}{@{}rcl@{}} &&\text{if}~\lambda_{{P_n}{S_m}} \neq \lambda_{{P_j}{S_m}}.\end{array} $$
(64)

Using the induction method [50], the PDF of \(\gamma _{P{S_{m}}}\) with N PTSs (i.e., the summary of N random variables having nonidentical exponential distributions) can be obtained as follows:

$$\begin{array}{@{}rcl@{}} &{f_{{\gamma_{P{S_{m}}}}}}\left( z \right) = \sum\limits_{n = 1}^{N} {\prod\limits_{\scriptstyle j = 1\hfill\atop \scriptstyle j \ne n\hfill}^{N} {\frac{{{\lambda_{{P_{n}}{S_{m}}}}}}{{{\lambda_{{P_{n}}{S_{m}}}} - {\lambda_{{P_{j}}{S_{m}}}}}}}} {f_{{\gamma_{{P_{n}}{S_{m}}}}}}\left( z \right)\\ &\text{ if } \lambda_{{P_{n}}{S_{m}}} \neq \lambda_{{P_{j}}{S_{m}}}. \end{array} $$
(65)

Similarly, the CDF of \(\gamma _{P{S_{m}}}\) with N PTSs can be derived:

$$\begin{array}{@{}rcl@{}} &{F_{{\gamma_{P{S_{m}}}}}}\left( z \right) = \sum\limits_{n = 1}^{N} {\prod\limits_{\scriptstyle j = 1\hfill\atop \scriptstyle j \ne n\hfill}^{N} {\frac{{{\lambda_{{P_{n}}{S_{m}}}}}}{{{\lambda_{{P_{n}}{S_{m}}}} - {\lambda_{{P_{j}}{S_{m}}}}}}}} {F_{{\gamma_{{P_{n}}{S_{m}}}}}}\left( z \right)\\ &\text{if } \lambda_{{P_{n}}{S_{m}}} \neq \lambda_{{P_{j}}{S_{m}}} \end{array} $$
(66)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vo, V.N., Nguyen, T.G., So-In, C. et al. Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. Mobile Netw Appl 25, 193–210 (2020). https://doi.org/10.1007/s11036-019-01217-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01217-7

Keywords

Navigation