Format

Send to

Choose Destination
Sensors (Basel). 2016 Mar 7;16(3). pii: E339. doi: 10.3390/s16030339.

Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

Author information

1
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 10044, China. 12111041@bjtu.edu.cn.
2
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 10044, China. tjing@bjtu.edu.cn.
3
Department of Computer Science, Texas Christian University, Fort Worth, TX 76129, USA. l.ma@tcu.edu.
4
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 10044, China. yhuo@bjtu.edu.cn.
5
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 10044, China. 12111020@bjtu.edu.cn.

Abstract

The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be guaranteed. Simulation results demonstrate the good performance of the cooperative jamming scheme and the auction framework.

KEYWORDS:

CIoT networks; Vickrey auction; cooperative jamming; incentive mechanism; physical layer security

Supplemental Content

Full text links

Icon for Multidisciplinary Digital Publishing Institute (MDPI) Icon for PubMed Central
Loading ...
Support Center