Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays

In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2018-01, Vol.6, p.48247-48258
Hauptverfasser: Nhan Vo, Van, Tran, Duc-Dung, So-In, Chakchai, Tran, Hung
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 48258
container_issue
container_start_page 48247
container_title IEEE access
container_volume 6
creator Nhan Vo, Van
Tran, Duc-Dung
So-In, Chakchai
Tran, Hung
description In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.
doi_str_mv 10.1109/ACCESS.2018.2867500
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2018_2867500</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8449282</ieee_id><doaj_id>oai_doaj_org_article_78b833dff07841a3b10002ad74bf38e5</doaj_id><sourcerecordid>2455928597</sourcerecordid><originalsourceid>FETCH-LOGICAL-c445t-3f8a52376cc7a6acf0ef5af47190ad9091acb68e5248d908adb602ac65f311703</originalsourceid><addsrcrecordid>eNpVkV9r2zAUxc3YYKXrJ-iLYK9Lpr-W_BiytA0UVpZ2exTX8lWi4NiZ5HTzt59al9LpRdLh3N-Fc4riktE5Y7T6ulguV5vNnFNm5tyUWlH6rjjjrKxmQony_Zv3x-IipT3Nx2RJ6bOi3aCL6EZyh9H38QCdQ7LooB1TSCQr5Cr8xWZ2DaEjqw7jdiQ3EB8xDaHbkixCR9bdgLHDgfSe3O-ynsivMOzIQzfEUxqwIT-whTF9Kj54aBNevNznxcPV6n55M7v9fr1eLm5nTko1zIQ3oLjQpXMaSnCeolfgpWYVhaaiFQNXlwYVlyZ_DTR1STm4UnnBmKbivFhP3KaHvT3GcIA42h6CfRb6uLUQh-BatNrURojGe6qNZCBqlsPh0GhZe5FXZNaXiZX-4PFU_0f7Fn4unmmHZmclY0pm--fJfoz971NOye77U8x5JsulUhU3qtLZJSaXi31KEf0rllH7VKqdSrVPpdqXUvPU5TQVEPF1wkiZqVz8A9yXnac</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455928597</pqid></control><display><type>article</type><title>Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>SWEPUB Freely available online</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Nhan Vo, Van ; Tran, Duc-Dung ; So-In, Chakchai ; Tran, Hung</creator><creatorcontrib>Nhan Vo, Van ; Tran, Duc-Dung ; So-In, Chakchai ; Tran, Hung</creatorcontrib><description>In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2867500</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Communication system security ; Controllers ; Energy harvesting ; Internet of Things ; Internet of Things sensor networks ; Optimization ; Performance evaluation ; physical layer security ; Power transfer ; Protocols ; Radio frequency ; Relay ; Relays ; Sensors ; Transfer stations ; untrusted relay ; Wireless communication</subject><ispartof>IEEE access, 2018-01, Vol.6, p.48247-48258</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c445t-3f8a52376cc7a6acf0ef5af47190ad9091acb68e5248d908adb602ac65f311703</citedby><cites>FETCH-LOGICAL-c445t-3f8a52376cc7a6acf0ef5af47190ad9091acb68e5248d908adb602ac65f311703</cites><orcidid>0000-0003-0753-5203 ; 0000-0003-1026-191X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8449282$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>230,314,552,780,784,864,885,2102,27633,27924,27925,54933</link.rule.ids><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-41154$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Nhan Vo, Van</creatorcontrib><creatorcontrib>Tran, Duc-Dung</creatorcontrib><creatorcontrib>So-In, Chakchai</creatorcontrib><creatorcontrib>Tran, Hung</creatorcontrib><title>Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays</title><title>IEEE access</title><addtitle>Access</addtitle><description>In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.</description><subject>Algorithms</subject><subject>Communication system security</subject><subject>Controllers</subject><subject>Energy harvesting</subject><subject>Internet of Things</subject><subject>Internet of Things sensor networks</subject><subject>Optimization</subject><subject>Performance evaluation</subject><subject>physical layer security</subject><subject>Power transfer</subject><subject>Protocols</subject><subject>Radio frequency</subject><subject>Relay</subject><subject>Relays</subject><subject>Sensors</subject><subject>Transfer stations</subject><subject>untrusted relay</subject><subject>Wireless communication</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>D8T</sourceid><sourceid>DOA</sourceid><recordid>eNpVkV9r2zAUxc3YYKXrJ-iLYK9Lpr-W_BiytA0UVpZ2exTX8lWi4NiZ5HTzt59al9LpRdLh3N-Fc4riktE5Y7T6ulguV5vNnFNm5tyUWlH6rjjjrKxmQony_Zv3x-IipT3Nx2RJ6bOi3aCL6EZyh9H38QCdQ7LooB1TSCQr5Cr8xWZ2DaEjqw7jdiQ3EB8xDaHbkixCR9bdgLHDgfSe3O-ynsivMOzIQzfEUxqwIT-whTF9Kj54aBNevNznxcPV6n55M7v9fr1eLm5nTko1zIQ3oLjQpXMaSnCeolfgpWYVhaaiFQNXlwYVlyZ_DTR1STm4UnnBmKbivFhP3KaHvT3GcIA42h6CfRb6uLUQh-BatNrURojGe6qNZCBqlsPh0GhZe5FXZNaXiZX-4PFU_0f7Fn4unmmHZmclY0pm--fJfoz971NOye77U8x5JsulUhU3qtLZJSaXi31KEf0rllH7VKqdSrVPpdqXUvPU5TQVEPF1wkiZqVz8A9yXnac</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Nhan Vo, Van</creator><creator>Tran, Duc-Dung</creator><creator>So-In, Chakchai</creator><creator>Tran, Hung</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>ABGEM</scope><scope>ADTPV</scope><scope>AOWAS</scope><scope>D8T</scope><scope>DF7</scope><scope>ZZAVC</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-0753-5203</orcidid><orcidid>https://orcid.org/0000-0003-1026-191X</orcidid></search><sort><creationdate>20180101</creationdate><title>Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays</title><author>Nhan Vo, Van ; Tran, Duc-Dung ; So-In, Chakchai ; Tran, Hung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c445t-3f8a52376cc7a6acf0ef5af47190ad9091acb68e5248d908adb602ac65f311703</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Communication system security</topic><topic>Controllers</topic><topic>Energy harvesting</topic><topic>Internet of Things</topic><topic>Internet of Things sensor networks</topic><topic>Optimization</topic><topic>Performance evaluation</topic><topic>physical layer security</topic><topic>Power transfer</topic><topic>Protocols</topic><topic>Radio frequency</topic><topic>Relay</topic><topic>Relays</topic><topic>Sensors</topic><topic>Transfer stations</topic><topic>untrusted relay</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nhan Vo, Van</creatorcontrib><creatorcontrib>Tran, Duc-Dung</creatorcontrib><creatorcontrib>So-In, Chakchai</creatorcontrib><creatorcontrib>Tran, Hung</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>SWEPUB Mälardalens högskola full text</collection><collection>SwePub</collection><collection>SwePub Articles</collection><collection>SWEPUB Freely available online</collection><collection>SWEPUB Mälardalens högskola</collection><collection>SwePub Articles full text</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nhan Vo, Van</au><au>Tran, Duc-Dung</au><au>So-In, Chakchai</au><au>Tran, Hung</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><spage>48247</spage><epage>48258</epage><pages>48247-48258</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2867500</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-0753-5203</orcidid><orcidid>https://orcid.org/0000-0003-1026-191X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2018-01, Vol.6, p.48247-48258
issn 2169-3536
2169-3536
language eng
recordid cdi_crossref_primary_10_1109_ACCESS_2018_2867500
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; SWEPUB Freely available online; EZB-FREE-00999 freely available EZB journals
subjects Algorithms
Communication system security
Controllers
Energy harvesting
Internet of Things
Internet of Things sensor networks
Optimization
Performance evaluation
physical layer security
Power transfer
Protocols
Radio frequency
Relay
Relays
Sensors
Transfer stations
untrusted relay
Wireless communication
title Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T04%3A29%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Performance%20Analysis%20for%20Fixed-Gain%20Energy%20Harvesting%20in%20an%20Internet%20of%20Things%20With%20Untrusted%20Relays&rft.jtitle=IEEE%20access&rft.au=Nhan%20Vo,%20Van&rft.date=2018-01-01&rft.volume=6&rft.spage=48247&rft.epage=48258&rft.pages=48247-48258&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2867500&rft_dat=%3Cproquest_cross%3E2455928597%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455928597&rft_id=info:pmid/&rft_ieee_id=8449282&rft_doaj_id=oai_doaj_org_article_78b833dff07841a3b10002ad74bf38e5&rfr_iscdi=true