Next Article in Journal
Deriving the Characteristic Scale for Effectively Monitoring Heavy Metal Stress in Rice by Assimilation of GF-1 Data with the WOFOST Model
Next Article in Special Issue
LS Channel Estimation and Signal Separation for UHF RFID Tag Collision Recovery on the Physical Layer
Previous Article in Journal
An Anchor-Based Pedestrian Navigation Approach Using Only Inertial Sensors
Previous Article in Special Issue
Device Data Ingestion for Industrial Big Data Platforms with a Case Study
Article Menu

Export Article

Open AccessArticle
Sensors 2016, 16(3), 339;

Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 10044, China
Department of Computer Science, Texas Christian University, Fort Worth, TX 76129, USA
Author to whom correspondence should be addressed.
Academic Editors: Yunchuan Sun, Antonio Jara and Shengling Wang
Received: 18 December 2015 / Revised: 25 February 2016 / Accepted: 29 February 2016 / Published: 7 March 2016
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Full-Text   |   PDF [888 KB, uploaded 7 March 2016]   |  


The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be achieved. Simulation results demonstrate the effective performance of the cooperative jamming scheme and the auction framework. View Full-Text
Keywords: CIoT networks; physical layer security; cooperative jamming; incentive mechanism; Vickrey auction CIoT networks; physical layer security; cooperative jamming; incentive mechanism; Vickrey auction

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Li, Z.; Jing, T.; Ma, L.; Huo, Y.; Qian, J. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks. Sensors 2016, 16, 339.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top