1-3hit |
Guangna ZHANG Yuanyuan GAO Huadong LUO Xiaochen LIU Nan SHA Kui XU
In this paper, we explore the physical layer security of an Internet of Things (IoT) network comprised of multiple relay-user pairs in the presence of multiple malicious eavesdroppers and channel estimation error (CEE). In order to guarantee secure transmission with channel estimation error, we propose a channel estimation error oriented joint relay-user pair and friendly jammer selection (CEE-JRUPaFJS) scheme to improve the physical layer security of IoT networks. For the purpose of comparison, the channel estimation error oriented traditional round-robin (CEE-TRR) scheme and the channel estimation error oriented traditional pure relay-user pair selection (CEE-TPRUPS) scheme are considered as benchmark schemes. The exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the CEE-TRR and CEE-TPRUPS schemes as well as the CEE-JRUPaFJS scheme are derived over Rayleigh fading channels, which are employed to characterize network reliability and security, respectively. Moreover, the security-reliability tradeoff (SRT) is analyzed as a metric to evaluate the tradeoff performance of CEE-JRUPaFJS scheme. It is verified that the proposed CEE-JRUPaFJS scheme is superior to both the CEE-TRR and CEE-TPRUPS schemes in terms of SRT, which demonstrates our proposed CEE-JRUPaFJS scheme are capable of improving the security and reliability performance of IoT networks in the face of multiple eavesdroppers. Moreover, as the number of relay-user pairs increases, CEE-TPRUPS and CEE-JRUPaFJS schemes offer significant increases in SRT. Conversely, with an increasing number of eavesdroppers, the SRT of all these three schemes become worse.
Xiaochen LIU Yuanyuan GAO Nan SHA Guozhen ZANG Kui XU
In this letter, we investigate the secure transmission in radio frequency (RF) powered two-hop untrusted relay networks, where the source node and untrusted relay are both wireless powered by an RF power supplier. Specifically, considering the non-linear energy-harvesting (EH) model, the two-process communication protocol is proposed. The secrecy rate is maximized by jointly designing the beamforming vector at source and beamforming matrix at relay, under the constraints of transmit power at RF power supplier and destination. The secrecy rate maximization (SRM) is non-convex, hence we propose an alternative optimization (AO) based iterative algorithm. Numerical results demonstrate that the proposed scheme can significantly increase the secrecy rate compared to the baseline schemes.
Shijie WANG Yuanyuan GAO Xiaochen LIU Guangna ZHANG Nan SHA Mingxi GUO Kui XU
In this paper, we explore how to enhance the physical layer security performance in downlink cellular networks through cooperative jamming technology. Idle user equipments (UE) are used to cooperatively transmit jamming signal to confuse eavesdroppers (Eve). We propose a threshold-based jammer selection scheme to decide which idle UE should participate in the transmission of jamming signal. Threshold conditions are carefully designed to decrease interference to legitimate channel, while maintain the interference to the Eves. Moreover, fewer UE are activated, which is helpful for saving energy consumptions of cooperative UEs. Analytical expressions of the connection and secrecy performances are derived, which are validated through Monte Carlo simulations. Theoretical and simulation results reveal that our proposed scheme can improve connection performance, while approaches the secrecy performance of [12]. Furthermore, only 43% idle UEs of [12] are used for cooperative jamming, which helps to decrease energy consumption of network.