scholarly journals A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Yuandong Wu ◽  
Yan Huo

Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.

2020 ◽  
Vol 16 (6) ◽  
pp. 155014772093346
Author(s):  
Xin Fan ◽  
Yan Huo

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.


Author(s):  
Eberhard Stickel

Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).


2018 ◽  
Vol 7 (2.32) ◽  
pp. 100
Author(s):  
Dr K.Ravindranath ◽  
N Raghupriya ◽  
P Krishna Vamsi ◽  
D Sharath Kumar

In Today's world information been produced in huge sum, which requires data recovery assistance. The cloud service providers give security to the client  regardless  of  the  possibility  that systems are down, because of disaster. A lot of private information is produced which is put away in cloud. In this manner, the need for recovery of data services are developing in an order and needs an advancement of an well-organized powerful data rescue strategies, when  information is lost in a disaster. The motivation behind recovery strategy to support client from gathering data from any alternate server whenever that server lost information and incapable to provide information to the client. On the way to accomplish the reason, numerous diverse procedures have been proposed. In circumstances like Flood, Fire, seismic tremors or any equipment glitch or any accidental deletion of information may never again remain accessible. The target of this recovery is to condense the intense data recovery procedures that are utilized as a part of cloud computing area. It additionally describes the cloud-based disaster recovery stages and recognize open issues identified with disaster recovery. 


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Jian Xie ◽  
Bin Qiu ◽  
Qiuping Wang ◽  
Jiaqing Qu

Frequency diverse array- (FDA-) based directional modulation (DM) is a promising technique for physical layer security, due to its angle-range dependent transmit beampattern. However, the existing schemes are not suitable for the broadcasting scenario, where there are multiple legitimate users (LUs) to receive the confidential message. In this paper, we propose a novel random frequency diverse array- (RFDA-) based DM scheme to realize the point to multi-point broadcasting secure transmission in both angle and range dimension. In the first stage, the beamforming vector is designed to maximize the artificial noise (AN) power, while satisfying the power requirement of LUs for transmitting the confidential message simultaneously. In the second stage, the AN projection matrix is obtained by maximizing signal-to-interference-plus-noise ratio (SINR) at the LUs. The proposed scheme only broadcasts the confidential message to the locations of LUs while the other regions are covered by AN, which promotes the security of the wireless broadcasting system. Moreover, it is energy efficient since the power of each LU is under accurate control. Numerical simulations are presented to validate the performance of the proposed scheme.


2020 ◽  
Vol 10 (1) ◽  
pp. 327
Author(s):  
Francisco Vázquez-Gallego ◽  
Pere Tuset-Peiró ◽  
Luis Alonso ◽  
Jesus Alonso-Zarate

This paper models and evaluates three FSA-based (Frame Slotted ALOHA) MAC (Medium Access Control) protocols, namely, FSA-ACK (FSA with ACKnowledgements), FSA-FBP (FSA with FeedBack Packets) and DFSA (Dynamic FSA). The protocols are modeled using an AMC (Absorbing Markov Chain), which allows to derive analytic expressions for the average packet delay, as well as the energy consumption of both the network coordinator and the end-devices. The results, based on computer simulations, show that the analytic model is accurate and outline the benefits of DFSA. In terms of delay, DFSA provides a reduction of 17% (FSA-FBP) and 32% (FSA-ACK), whereas in terms of energy consumption DFSA provides savings of 23% (FSA-FBP) and 28% (FSA-ACK) for the coordinator and savings of 50% (FSA-FBP) and 24% (FSA-ACK) for end-devices. Finally, the paper provides insights on how to configure each FSA variant depending on the network parameters, i.e., depending on the number of end-devices, to minimize delay and energy expenditure. This is specially interesting for massive data collection in IoT (Internet-of-Things) scenarios, which typically rely on FSA-based protocols and where the operation has to be optimized to support a large number of devices with stringent energy consumption requirements.


Sign in / Sign up

Export Citation Format

Share Document