首页    期刊浏览 2024年07月08日 星期一
登录注册

文章基本信息

  • 标题:Cooperative secure transmission against collusive eavesdroppers in Internet of Things
  • 本地全文:下载
  • 作者:Xin Fan ; Yan Huo
  • 期刊名称:International Journal of Distributed Sensor Networks
  • 印刷版ISSN:1550-1329
  • 电子版ISSN:1550-1477
  • 出版年度:2020
  • 卷号:16
  • 期号:6
  • 页码:1
  • DOI:10.1177/1550147720933464
  • 出版社:Hindawi Publishing Corporation
  • 摘要:As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.
  • 关键词:Internet of Things; collusive eavesdroppers; cooperative jamming; asymptote; secrecy outage probability; power allocation algorithm
国家哲学社会科学文献中心版权所有