Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays
In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes...
Gespeichert in:
Veröffentlicht in: | IEEE access 2018-01, Vol.6, p.48247-48258 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 48258 |
---|---|
container_issue | |
container_start_page | 48247 |
container_title | IEEE access |
container_volume | 6 |
creator | Nhan Vo, Van Tran, Duc-Dung So-In, Chakchai Tran, Hung |
description | In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST. |
doi_str_mv | 10.1109/ACCESS.2018.2867500 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2018_2867500</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8449282</ieee_id><doaj_id>oai_doaj_org_article_78b833dff07841a3b10002ad74bf38e5</doaj_id><sourcerecordid>2455928597</sourcerecordid><originalsourceid>FETCH-LOGICAL-c445t-3f8a52376cc7a6acf0ef5af47190ad9091acb68e5248d908adb602ac65f311703</originalsourceid><addsrcrecordid>eNpVkV9r2zAUxc3YYKXrJ-iLYK9Lpr-W_BiytA0UVpZ2exTX8lWi4NiZ5HTzt59al9LpRdLh3N-Fc4riktE5Y7T6ulguV5vNnFNm5tyUWlH6rjjjrKxmQony_Zv3x-IipT3Nx2RJ6bOi3aCL6EZyh9H38QCdQ7LooB1TSCQr5Cr8xWZ2DaEjqw7jdiQ3EB8xDaHbkixCR9bdgLHDgfSe3O-ynsivMOzIQzfEUxqwIT-whTF9Kj54aBNevNznxcPV6n55M7v9fr1eLm5nTko1zIQ3oLjQpXMaSnCeolfgpWYVhaaiFQNXlwYVlyZ_DTR1STm4UnnBmKbivFhP3KaHvT3GcIA42h6CfRb6uLUQh-BatNrURojGe6qNZCBqlsPh0GhZe5FXZNaXiZX-4PFU_0f7Fn4unmmHZmclY0pm--fJfoz971NOye77U8x5JsulUhU3qtLZJSaXi31KEf0rllH7VKqdSrVPpdqXUvPU5TQVEPF1wkiZqVz8A9yXnac</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455928597</pqid></control><display><type>article</type><title>Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>SWEPUB Freely available online</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Nhan Vo, Van ; Tran, Duc-Dung ; So-In, Chakchai ; Tran, Hung</creator><creatorcontrib>Nhan Vo, Van ; Tran, Duc-Dung ; So-In, Chakchai ; Tran, Hung</creatorcontrib><description>In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2018.2867500</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Communication system security ; Controllers ; Energy harvesting ; Internet of Things ; Internet of Things sensor networks ; Optimization ; Performance evaluation ; physical layer security ; Power transfer ; Protocols ; Radio frequency ; Relay ; Relays ; Sensors ; Transfer stations ; untrusted relay ; Wireless communication</subject><ispartof>IEEE access, 2018-01, Vol.6, p.48247-48258</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c445t-3f8a52376cc7a6acf0ef5af47190ad9091acb68e5248d908adb602ac65f311703</citedby><cites>FETCH-LOGICAL-c445t-3f8a52376cc7a6acf0ef5af47190ad9091acb68e5248d908adb602ac65f311703</cites><orcidid>0000-0003-0753-5203 ; 0000-0003-1026-191X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8449282$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>230,314,552,780,784,864,885,2102,27633,27924,27925,54933</link.rule.ids><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-41154$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Nhan Vo, Van</creatorcontrib><creatorcontrib>Tran, Duc-Dung</creatorcontrib><creatorcontrib>So-In, Chakchai</creatorcontrib><creatorcontrib>Tran, Hung</creatorcontrib><title>Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays</title><title>IEEE access</title><addtitle>Access</addtitle><description>In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.</description><subject>Algorithms</subject><subject>Communication system security</subject><subject>Controllers</subject><subject>Energy harvesting</subject><subject>Internet of Things</subject><subject>Internet of Things sensor networks</subject><subject>Optimization</subject><subject>Performance evaluation</subject><subject>physical layer security</subject><subject>Power transfer</subject><subject>Protocols</subject><subject>Radio frequency</subject><subject>Relay</subject><subject>Relays</subject><subject>Sensors</subject><subject>Transfer stations</subject><subject>untrusted relay</subject><subject>Wireless communication</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>D8T</sourceid><sourceid>DOA</sourceid><recordid>eNpVkV9r2zAUxc3YYKXrJ-iLYK9Lpr-W_BiytA0UVpZ2exTX8lWi4NiZ5HTzt59al9LpRdLh3N-Fc4riktE5Y7T6ulguV5vNnFNm5tyUWlH6rjjjrKxmQony_Zv3x-IipT3Nx2RJ6bOi3aCL6EZyh9H38QCdQ7LooB1TSCQr5Cr8xWZ2DaEjqw7jdiQ3EB8xDaHbkixCR9bdgLHDgfSe3O-ynsivMOzIQzfEUxqwIT-whTF9Kj54aBNevNznxcPV6n55M7v9fr1eLm5nTko1zIQ3oLjQpXMaSnCeolfgpWYVhaaiFQNXlwYVlyZ_DTR1STm4UnnBmKbivFhP3KaHvT3GcIA42h6CfRb6uLUQh-BatNrURojGe6qNZCBqlsPh0GhZe5FXZNaXiZX-4PFU_0f7Fn4unmmHZmclY0pm--fJfoz971NOye77U8x5JsulUhU3qtLZJSaXi31KEf0rllH7VKqdSrVPpdqXUvPU5TQVEPF1wkiZqVz8A9yXnac</recordid><startdate>20180101</startdate><enddate>20180101</enddate><creator>Nhan Vo, Van</creator><creator>Tran, Duc-Dung</creator><creator>So-In, Chakchai</creator><creator>Tran, Hung</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>ABGEM</scope><scope>ADTPV</scope><scope>AOWAS</scope><scope>D8T</scope><scope>DF7</scope><scope>ZZAVC</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-0753-5203</orcidid><orcidid>https://orcid.org/0000-0003-1026-191X</orcidid></search><sort><creationdate>20180101</creationdate><title>Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays</title><author>Nhan Vo, Van ; Tran, Duc-Dung ; So-In, Chakchai ; Tran, Hung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c445t-3f8a52376cc7a6acf0ef5af47190ad9091acb68e5248d908adb602ac65f311703</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Communication system security</topic><topic>Controllers</topic><topic>Energy harvesting</topic><topic>Internet of Things</topic><topic>Internet of Things sensor networks</topic><topic>Optimization</topic><topic>Performance evaluation</topic><topic>physical layer security</topic><topic>Power transfer</topic><topic>Protocols</topic><topic>Radio frequency</topic><topic>Relay</topic><topic>Relays</topic><topic>Sensors</topic><topic>Transfer stations</topic><topic>untrusted relay</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nhan Vo, Van</creatorcontrib><creatorcontrib>Tran, Duc-Dung</creatorcontrib><creatorcontrib>So-In, Chakchai</creatorcontrib><creatorcontrib>Tran, Hung</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>SWEPUB Mälardalens högskola full text</collection><collection>SwePub</collection><collection>SwePub Articles</collection><collection>SWEPUB Freely available online</collection><collection>SWEPUB Mälardalens högskola</collection><collection>SwePub Articles full text</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nhan Vo, Van</au><au>Tran, Duc-Dung</au><au>So-In, Chakchai</au><au>Tran, Hung</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2018-01-01</date><risdate>2018</risdate><volume>6</volume><spage>48247</spage><epage>48258</epage><pages>48247-48258</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2018.2867500</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-0753-5203</orcidid><orcidid>https://orcid.org/0000-0003-1026-191X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2018-01, Vol.6, p.48247-48258 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_crossref_primary_10_1109_ACCESS_2018_2867500 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; SWEPUB Freely available online; EZB-FREE-00999 freely available EZB journals |
subjects | Algorithms Communication system security Controllers Energy harvesting Internet of Things Internet of Things sensor networks Optimization Performance evaluation physical layer security Power transfer Protocols Radio frequency Relay Relays Sensors Transfer stations untrusted relay Wireless communication |
title | Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T04%3A29%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Performance%20Analysis%20for%20Fixed-Gain%20Energy%20Harvesting%20in%20an%20Internet%20of%20Things%20With%20Untrusted%20Relays&rft.jtitle=IEEE%20access&rft.au=Nhan%20Vo,%20Van&rft.date=2018-01-01&rft.volume=6&rft.spage=48247&rft.epage=48258&rft.pages=48247-48258&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2018.2867500&rft_dat=%3Cproquest_cross%3E2455928597%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455928597&rft_id=info:pmid/&rft_ieee_id=8449282&rft_doaj_id=oai_doaj_org_article_78b833dff07841a3b10002ad74bf38e5&rfr_iscdi=true |