skip to main content
research-article

Reliability–Security Tradeoff Analysis in mmWave Ad Hoc–based CPS

Published: 09 January 2024 Publication History

Abstract

Cyber-physical systems (CPS) offer integrated resolutions for various applications by combining computer and physical components and enabling individual machines to work together for much more excellent benefits. The ad hoc–based CPS provides a promising architecture due to its decentralized nature and destructive-resistance. A growing number of information leakage events in CPSs and the following serious consequences have aroused ubiquitous concern about information security. In this article, we combine physical layer security solutions and millimeter-wave (mmWave) techniques to safeguard the ad hoc network and investigate the reliability-security tradeoff by taking user demands for the network into account, where eavesdroppers attempt to intercept messages. For the secrecy enhancements, we adopt an artificial noise (AN) assisted transmission scheme, in which AN is employed to create non-cancellable interference to eavesdroppers. The reliability and security are correspondingly characterized by the connection outage probability and secrecy outage probability, and their analytical expressions of them are attained through theoretical analysis for the purpose of the tradeoff issue discussion. Our results reveal that secrecy performance in mmWave ad hoc networks gains significant improvement through the use of AN. It also shows that given total transmit power, there exists a tradeoff between reliability and security to achieve optimal outage performance.

References

[1]
Jeffrey G. Andrews, Stefano Buzzi, Wan Choi, Stephen V. Hanly, Angel Lozano, Anthony C. K. Soong, and Jianzhong Charlie Zhang. 2014. What will 5G be? IEEE J. Select. Areas Commun. 32, 6 (2014), 1065–1082.
[2]
Tianyang Bai and Robert W. Heath. 2015. Coverage and rate analysis for millimeter-wave cellular networks. IEEE Trans. Wireless Commun. 14, 2 (2015), 1100–1114.
[3]
Marco Carvalho. 2008. Security in mobile ad hoc networks. IEEE Secur. Priv. 6, 2 (2008), 72–75.
[4]
Özge Cepheli, Guido Dartmann, Güneç Karabulut Kurt, and Gerd Ascheid. 2018. A joint optimization scheme for artificial noise and transmit filter for half and full duplex wireless cyber physical systems. IEEE Trans. Sust. Comput. 3, 2 (2018), 126–136.
[5]
Sumit Chakravarty, Andrew Hopkins, and Fangyu Li. 2021. LoRa wake-up radio relay with beaglebone black. In IEEE SoutheastCon (SoutheastCon’21). 1–8.
[6]
Mohammed E. Eltayeb, Junil Choi, Tareq Y. Al-Naffouri, and Robert W. Heath. 2017. Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems. IEEE Trans. Vehic. Technol. 66, 9 (2017), 8139–8151.
[7]
Amitava Ghosh, Timothy A. Thomas, Mark C. Cudak, Rapeepat Ratasuk, Prakash Moorut, Frederick W. Vook, Theodore S. Rappaport, George R. MacCartney, Shu Sun, and Shuai Nie. 2014. Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks. IEEE J. Select. Areas Commun. 32, 6 (2014), 1152–1163.
[8]
Zhaohui Guo, Zhen Gao, Qiang Liu, Chinmay Chakraborty, Qiaozhi Hua, Keping Yu, and Shaohua Wan. 2022. RNS-based adaptive compression scheme for the block data in the blockchain for IIoT. IEEE Trans. Industr. Inf. 18, 12 (2022), 9239–9249.
[9]
Martin Haenggi. 2012. Stochastic Geometry for Wireless Networks. Cambridge University Press.
[10]
Martin Haenggi, Jeffrey G. Andrews, Francois Baccelli, Olivier Dousse, and Massimo Franceschetti. 2009. Stochastic geometry and random graphs for the analysis and design of wireless networks. IEEE J. Select. Areas Commun. 27, 7 (2009), 1029–1046.
[11]
Martin Haenggi and Radha Krishna Ganti. 2009. Interference in Large Wireless Networks. Now Publishers Inc.
[12]
Jehad M. Hamamreh, Haji M. Furqan, and Huseyin Arslan. 2019. Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Commun. Surv. Tutor. 21, 2 (2019), 1773–1828.
[13]
Te Sun Han, Hiroyuki Endo, and Masahide Sasaki. 2014. Reliability and secrecy functions of the wiretap channel under cost constraint. IEEE Trans. Inf. Theory 60, 11 (2014), 6819–6843.
[14]
Ibrahim A. Hemadeh, Katla Satyanarayana, Mohammed El-Hajjar, and Lajos Hanzo. 2018. Millimeter-wave communications: Physical channel models, design considerations, antenna constructions, and link-budget. IEEE Commun. Surv. Tutor. 20, 2 (2018), 870–913.
[15]
Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security—A survey. IEEE IoT J. 4, 6 (2017), 1802–1831.
[16]
Ish Kumar Jain, Rajeev Kumar, and Shivendra S. Panwar. 2019. The impact of mobile blockers on millimeter wave cellular systems. IEEE J. Select. Areas. Commun. 37, 4 (2019), 854–868.
[17]
Ying Ju, Hui-Ming Wang, Tong-Xing Zheng, and Qinye Yin. 2017. Secure transmissions in millimeter wave systems. IEEE Trans. Commun. 65, 5 (2017), 2114–2127.
[18]
Ying Ju, Yanzi Zhu, Hui-Ming Wang, Qingqi Pei, and Haitao Zheng. 2020. Artificial noise hopping: A practical secure transmission technique with experimental analysis for millimeter wave systems. IEEE Syst. J. 14, 4 (2020), 5121–5132.
[19]
Ch. Krishna Keerthi, M. A. Jabbar, and B. Seetharamulu. 2017. Cyber physical systems (CPS): Security issues, challenges and solutions. In Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC’17). 1–4.
[20]
Qi Li, Jinan Zhang, Junbo Zhao, Jin Ye, Wenzhan Song, and Fangyu Li. 2022. Adaptive hierarchical cyber attack detection and localization in active distribution systems. IEEE Trans. Smart Grid 13, 3 (2022), 2369–2380.
[21]
Lei Liu, Ming Zhao, Miao Yu, Mian Ahmad Jan, Dapeng Lan, and Amirhosein Taherkordi. 2023. Mobility-aware multi-hop task offloading for autonomous driving in vehicular edge computing and networks. IEEE Trans. Intell. Transport. Syst. 24, 2 (2023), 2169–2182.
[22]
Chuan Ma, Jiaqi Liu, Xiaohua Tian, Hui Yu, Ying Cui, and Xinbing Wang. 2015. Interference exploitation in D2D-enabled cellular networks: A secrecy perspective. IEEE Trans. Commun. 63, 1 (2015), 229–242.
[23]
George R. MacCartney, Junhong Zhang, Shuai Nie, and Theodore S. Rappaport. 2013. Path loss models for 5G millimeter wave propagation channels in urban microcells. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’13). 3948–3953.
[24]
Sarabjot Singh, Mandar N. Kulkarni, Amitava Ghosh, and Jeffrey G. Andrews. 2015. Tractable model for rate in self-backhauled millimeter wave cellular networks. IEEE J. Select. Areas Commun. 33, 10 (2015), 2196–2211.
[25]
Dietrich Stoyan, Wilfrid S. Kendall, Sung Nok Chiu, and Joseph Mecke. 2013. Stochastic Geometry and Its Applications. John Wiley & Sons.
[26]
Andrew Thangaraj, Souvik Dihidar, A. R. Calderbank, Steven W. McLaughlin, and Jean-Marc Merolla. 2007. Applications of LDPC codes to the wiretap channel. IEEE Trans. Inf. Theory 53, 8 (2007), 2933–2945.
[27]
Andrew Thornburg, Tianyang Bai, and Robert W. Heath. 2016. Performance analysis of outdoor mmWave ad hoc networks. IEEE Trans. Sign. Process. 64, 15 (2016), 4065–4079.
[28]
Ozan Alp Topal, Mehmet Ozgun Demir, Zekai Liang, Ali Emre Pusane, Guido Dartmann, Gerd Ascheid, and Gunes Karabulut Kur. 2020. A physical layer security framework for cognitive cyber-physical systems. IEEE Wireless Commun. 27, 4 (2020), 32–39.
[29]
Kiran Venugopal, Matthew C. Valenti, and Robert W. Heath. 2015. Interference in finite-sized highly dense millimeter wave networks. In Proceedings of the Information Theory and Applications Workshop (ITA’15). 175–180.
[30]
Chao Wang and Hui-Ming Wang. 2016. Physical layer security in millimeter wave cellular networks. IEEE Trans. Wireless Commun. 15, 8 (2016), 5569–5585.
[31]
Xianhe Wang, Xu Zhang, Yuewu Dong, and Xiaobo Li. 2011. Research and application of the architecture of ad hoc based CPS. In Proceedings of the International Conference on Advanced Intelligence and Awareness Internet (AIAI’11). 309–312.
[32]
Lili Wei, Rose Qingyang Hu, Yi Qian, and Geng Wu. 2014. Key elements to enable millimeter wave communications for 5G wireless systems. IEEE Wireless Commun. 21, 6 (2014), 136–143.
[33]
Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, and Xiqi Gao. 2018. A survey of physical layer security techniques for 5g wireless networks and challenges ahead. IEEE J. Select. Areas Commun. 36, 4 (2018), 679–695.
[34]
Li Xiaobo and Zhang Xu. 2011. The design of simulation platform for ad hoc based cyber-physical system. In Proceedings of the 7th Int. Conf. Mobile Ad-hoc Sens. Netw. 350–353.
[35]
Dongyang Xu, Keping Yu, and James A. Ritcey. 2022. Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0. IEEE Trans. Industr. Inf. 18, 9 (2022), 6368–6378.
[36]
Nan Yang, Lifeng Wang, Giovanni Geraci, Maged Elkashlan, Jinhong Yuan, and Marco Di Renzo. 2015. Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun. Mag. 53, 4 (2015), 20–27.
[37]
Jin Ye, Lulu Guo, Bowen Yang, Fangyu Li, Liang Du, Le Guan, and Wenzhan Song. 2021. Cyber—physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions. IEEE J. Emerg. Select. Top. Power Electr. 9, 4 (2021), 4639–4657.
[38]
Keping Yu, Liang Tan, Shahid Mumtaz, Saba Al-Rubaye, Anwer Al-Dulaimi, Ali Kashif Bashir, and Farrukh Aslam Khan. 2021. Securing critical infrastructures: deep-learning-based threat detection in IIoT. IEEE Commun. Mag. 59, 10 (2021), 76–82.
[39]
Keping Yu, Liang Tan, Caixia Yang, Kim-Kwang Raymond Choo, Ali Kashif Bashir, Joel J. P. C. Rodrigues, and Takuro Sato. 2022. A blockchain-based Shamir’s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE IoT J. 9, 11 (2022), 8154–8167.
[40]
Xi Zhang, Xiangyun Zhou, and Matthew R. McKay. 2013. Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks. IEEE Trans. Inf. Forens. Secur. 8, 11 (2013), 1802–1814.
[41]
Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, and Shoji Kasahara. 2022. Secure millimeter-wave ad hoc communications using physical layer security. IEEE Trans. Inf. Forens. Secur. 17 (2022), 99–114.
[42]
Liang Zhao, Jiaming Li, Qi Li, and Fangyu Li. 2022. A federated learning framework for detecting false data injection attacks in solar farms. IEEE Trans. Power Electr. 37, 3 (2022), 2496–2501.
[43]
Tong-Xing Zheng and Hui-Ming Wang. 2016. Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers. IEEE Trans. Vehic. Technol. 65, 10 (2016), 8812–8817.
[44]
Yongxu Zhu, Lifeng Wang, Kai-Kit Wong, and Robert W. Heath. 2017. Secure communications in millimeter wave ad hoc networks. IEEE Trans. Wireless Commun. 16, 5 (2017), 3205–3217.
[45]
Yulong Zou, Jia Zhu, Xianbin Wang, and Lajos Hanzo. 2016. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 104, 9 (2016), 1727–1765.

Cited By

View all
  • (2025)Physical Layer Security in Terahertz Indoor Communication NetworksIEEE Transactions on Wireless Communications10.1109/TWC.2024.350243524:1(825-841)Online publication date: 1-Jan-2025
  • (2024)Maximum likelihood-based identification for FIR systems with binary observations and data tampering attacksElectronic Research Archive10.3934/era.202418832:6(4181-4198)Online publication date: 2024
  • (2024)Vertical Switching Algorithm for Unmanned Aerial Vehicle in Power Grid Heterogeneous Communication NetworksElectronics10.3390/electronics1313261213:13(2612)Online publication date: 3-Jul-2024
  • Show More Cited By

Index Terms

  1. Reliability–Security Tradeoff Analysis in mmWave Ad Hoc–based CPS

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks  Volume 20, Issue 2
    March 2024
    572 pages
    EISSN:1550-4867
    DOI:10.1145/3618080
    • Editor:
    • Wen Hu
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 09 January 2024
    Online AM: 01 February 2023
    Accepted: 17 January 2023
    Revised: 29 December 2022
    Received: 13 August 2022
    Published in TOSN Volume 20, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cyber-physical system
    2. ad hoc
    3. mmWave
    4. tradeoff
    5. secrecy outage probability

    Qualifiers

    • Research-article

    Funding Sources

    • National Key Research and Development Program of China
    • National Natural Science Foundation of China
    • Guangdong Basic and Applied Basic Research Foundation
    • Key Research and Development Programs of Shaanxi
    • Japan Society for the Promotion of Science (JSPS)

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)342
    • Downloads (Last 6 weeks)34
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Physical Layer Security in Terahertz Indoor Communication NetworksIEEE Transactions on Wireless Communications10.1109/TWC.2024.350243524:1(825-841)Online publication date: 1-Jan-2025
    • (2024)Maximum likelihood-based identification for FIR systems with binary observations and data tampering attacksElectronic Research Archive10.3934/era.202418832:6(4181-4198)Online publication date: 2024
    • (2024)Vertical Switching Algorithm for Unmanned Aerial Vehicle in Power Grid Heterogeneous Communication NetworksElectronics10.3390/electronics1313261213:13(2612)Online publication date: 3-Jul-2024
    • (2024)Analysing the Performance of a Trust-Based AODV in the Presence of a Flooding AttackApplied Sciences10.3390/app1407287414:7(2874)Online publication date: 29-Mar-2024
    • (2024)Improved PBFT-Based High Security and Large Throughput Data Resource Sharing for Distribution Power GridIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2023EAP1150E107.A:8(1085-1097)Online publication date: 1-Aug-2024
    • (2024)TM-Informer-Based Prediction for Railway Ground Surface SettlementJournal of Circuits, Systems and Computers10.1142/S021812662450316X33:17Online publication date: 4-Sep-2024
    • (2024)An Analytical GPU-Enabled Framework for the Stacked 3D IC LayoutsJournal of Circuits, Systems and Computers10.1142/S021812662450281533:16Online publication date: 10-Jun-2024
    • (2024)A Hybrid Neural Network-Based Fast Financial Fraud Detection ModelJournal of Circuits, Systems and Computers10.1142/S021812662450277333:15Online publication date: 1-Jun-2024
    • (2024)A Binary Artificial Rabbit Optimization Algorithm for Improved Cognitive Radio Spectrum AllocationJournal of Circuits, Systems and Computers10.1142/S021812662450270033:15Online publication date: 1-Jun-2024
    • (2024)Optimization of Ultra-Wideband MIMO Antenna Design Using a Novel Convolutional Neural Network ApproachJournal of Circuits, Systems and Computers10.1142/S021812662450268233:15Online publication date: 25-May-2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media