Next Article in Journal
Energy-Efficient Optimal Power Allocation in Integrated Wireless Sensor and Cognitive Satellite Terrestrial Networks
Previous Article in Journal
A Robust Deep-Learning-Based Detector for Real-Time Tomato Plant Diseases and Pests Recognition
Previous Article in Special Issue
A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications
Article Menu
Issue 9 (September) cover image

Export Article

Open AccessArticle
Sensors 2017, 17(9), 2023; doi:10.3390/s17092023

Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay

1
School of Electronic and Information Engineering, Xi’an Jiaotong University, No. 28 West Xianning Road, Xi’an 710049, China
2
Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC V6T1Z4, Canada
*
Author to whom correspondence should be addressed.
Received: 8 August 2017 / Revised: 31 August 2017 / Accepted: 1 September 2017 / Published: 4 September 2017
(This article belongs to the Special Issue Sensor Networks for Collaborative and Secure Internet of Things)
View Full-Text   |   Download PDF [1837 KB, uploaded 4 September 2017]   |  

Abstract

The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. View Full-Text
Keywords: physical layer security; CIoT networks; untrusted relay; destination-aided jamming; wireless energy harvesting physical layer security; CIoT networks; untrusted relay; destination-aided jamming; wireless energy harvesting
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Hu, H.; Gao, Z.; Liao, X.; Leung, V.C.M. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay. Sensors 2017, 17, 2023.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top