Next Article in Journal
Energy-Balancing Unequal Clustering Approach to Reduce the Blind Spot Problem in Wireless Sensor Networks (WSNs)
Next Article in Special Issue
A Self-Powered, Threshold-Based Wireless Sensor for the Detection of Floor Vibrations
Previous Article in Journal
Ultrasonic Transmission Tomography Sensor Design for Bubble Identification in Gas-Liquid Bubble Column Reactors
Previous Article in Special Issue
An Automation System for Controlling Streetlights and Monitoring Objects Using Arduino
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things

1
Information Engineering College, Henan University of Science and Technology, Luoyang 471023, China
2
Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Korea
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(12), 4257; https://doi.org/10.3390/s18124257
Submission received: 29 October 2018 / Revised: 20 November 2018 / Accepted: 28 November 2018 / Published: 4 December 2018
(This article belongs to the Special Issue Internet of Things for Smart Homes)

Abstract

:
Smart homes can improve the quality of life and be implemented by Internet of Things (IoT) technologies. However, security is a very important issue in smart homes. For this reason, we propose a secrecy transmission protocol for primary user (PU) by selecting friendly jammer in cognitive IoT model. In particular, a secondary transmitter (ST) is selected to transmit secondary signals by the PU’s frequency spectrum, while another ST is chosen to transmit artificial noise to protect the transmission confidentiality of the PU against eavesdropping. Moreover, two selection schemes are presented to confirm the former and the latter ST, and the goal is to optimize the secondary transmission performance and the primary security performance, respectively. For the non-security model and the proposed protocol, we derive the closed-form expressions of the intercept probability and the outage probability for the PU. We also obtain the closed-form expression of outage probability for the secondary user. The numerical results show that the security performance of the PU is significantly enhanced in our protocol compared to the non-security model. In addition, the outage performance of the secondary users is also improved in high secondary transmit SNR region.

1. Introduction

The Internet of Things (IoT) is an emerging wireless application [1] and has many applications [2,3]. Many techniques for IoT have arisen in recent years such as adaptive monitoring techniques [4,5,6]. Moreover, IoT technologies can implement smart homes, which can improve the quality of life. However, the security and privacy problems are very important in smart homes [7] and have received significant interest [8,9,10,11,12]. Furthermore, combining cognitive radio technique and IoT, Cognitive Internet of Things (CIoT) is proposed, which is an enhanced IoT paradigm. However, the available bandwidth for IoT is very limited. Thus, the spectrum efficiency is a key issue for IoT design [13,14]. To improve the utilization efficiency of radio spectrum, Cognitive Radio (CR) [15] is a promising technology [16]. In Cognitive Radio Networks (CRN), unlicensed users opportunistically access to the licensed spectrum band [17]. Furthermore, unlicensed users cannot harm the performance of primary users. However, since the spectrum access is dynamic and the communication mode is broadcast communication in wireless communication, any unlicensed users and eavesdroppers can have access to the shared spectrum. Therefore, the eavesdroppers readily overhear any active transmissions over wireless networks. However, cognitive radio technology also introduces some new security threats, e.g., using the shared spectrum by selfish behavior, reporting false sensing information, etc. Therefore, ensuring security is a key issue in CIoT.
To ensure security, physical-layer security technology is an effective confidentially protection mechanism [18,19,20,21,22]. In Ref. [23], when the wiretap channel condition between a source node and an eavesdropper node is worse than the channel condition between the source node and the destination node, the source node can successfully communicate with the destination node in perfect secrecy. Ref. [22] emphasized that both the primary users (PUs) and secondary users (SUs) must be defended from eavesdropping in cognitive networks. Specifically, it is legitimate that the SUs are allowed to access the primary spectrum by cooperating with the PUs, where the SUs act as a relay or a friendly jammer to elevate the PU’s secrecy [24]. Some studies [25,26] reveal that resource allocation is an efficient approach to ensure the PU’s security requirement while achieving good transmission performance for the SUs who cooperate with the PUs. In addition, both the secure communications for PUs and SUs are considered in Ref. [25]. In contrast, Refs. [27,28,29] studied some transmission schemes to maximize secrecy rate or to minimize secrecy outage probability for the SUs in the underlay cognitive models, respectively. In addition, the user selection in cooperative transmission is also an efficient method to enhance the security performance for communication systems due to the multiuser gain. The security enhanced technologies of the SUs is investigated with the user selection in Refs. [21,30,31]. However, transmission protocols for improving the secrecy performance of the PUs are barely known. How to design the transmission protocol for protecting the PU’s security requirement remains a crucial issue in cognitive Internet of things model, where home terminal-to-terminal communication coexists with uplink or downlink of the femtocell station.
To improve the primary secrecy performance and secondary outage performance, we employ cooperative jammer and multi-user diversity technology in this paper. Namely, artificial noise is transmitted by selecting a secondary transmitter (ST), which can improve the outage performance of the primary system. Moreover, an ST has access to the primary spectrum if it can improve the outage performance of the secondary performance and satisfy the interference threshold. To encourage the secondary transmitter to act as a friendly jammer, the interference threshold for secondary system is relaxed by primary system in this paper. The main contributions are summarized as follows:
  • We propose a ST cooperative transmission protocol by selecting jammer, which transmits an artificial noise to disturb the eavesdropper.
  • We propose a selection scheme to determine the friendly jammer and secondary signal transmitter. The ST, which can provide the smallest intercept probability, is chosen as the friendly jammer to transmit artificial noise.
  • We derive the closed-form expressions of the intercept probability and the outage probability for the primary system over Rayleigh fading channels, respectively. We also derive the outage probability of the secondary user over Rayleigh channels.
The remainder of the paper is organized as follows. The system model of cooperative jammer selection for primary systems is provided in Section 2. Section 3 analyzes the performances of transmission and security for our proposed protocol. Section 4 provides numerical simulations for the proposed protocol. Section 5 concludes this paper.
Notations: The channels coefficients over links PS PD , PS SR , PS E , ST i PD , ST i SR , ST o E , and ST i E are denoted by h P , h PS , h PE , h S i P , h S i , h S o E , and h S i E , respectively. R P denotes the minimum rate of transmission for primary systems. We also use R S to denote the minimum rate of transmission for secondary systems. The transmit power of ST and PT are denoted by P P and P S , respectively. The expectation of a variable X is denoted by E [ X ] . The probability of a variable X is denoted by Pr { X } .

2. The System Models and the Selection Schemes for STs

In this section, we propose a ST cooperative transmission protocol and a selection scheme to determine the friendly jammer and secondary transmitter. Figure 1b shows The system configuration of our protocols. The system model comprises a primary pair (PS-PD), an eavesdropper (E), a secondary receiver (SR) and K secondary transmitters ST i , where i I , I = { 1 , , K } . In this transmission models, one secondary user is selected as a friendly jammer to interfere with eavesdropping at first, which is denoted by ST o , o I . The other one has access to the licensed spectrum if the secondary transmission cannot cause an outage over link (PS→PD), which is denoted by ST i , i I and i o . However, the transmitted information of primary users can be overheard by the eavesdropper. To prevent eavesdropping, ST o transmits the artificial noise to interfere the eavesdropper. In the proposed model, PD and SR know the information of the artificial noise and the eavesdropper does not know the information. Therefore, PD and SR will not be affected by the artificial noise, which may disturb the eavesdropper. In the proposed protocol, on the one hand, ST o , which provides the most optimal security performance, is selected as a cooperative jammer. On the other hand, if the best outage performance of the secondary system is achieved by selecting a secondary user ST i , and the interference threshold of the primary system is satisfied for the secondary user ST i , then ST i has access to the licensed spectrum. Furthermore, we study two criterions, which are used to select the cooperative jammer and secondary information transmitter, respectively. In addition, we assume that h v CN ( 0 , σ v 2 ) , where v P , PS i , PE , S i P , S i , S o E , S i E . We also assume that noises are Additive White Gaussian Noise (AWGN) with zero mean and variance N 0 .

2.1. The System Model Based on the Security Enhancement Approach by Friendly Jammer Selection

To ensure the Quality of Service (QoS) of the primary system, the interference to primary users caused by secondary users must be less than a given threshold (i.e., the interference threshold is satisfied by secondary users). The secondary users have access to the licensed spectrum if they satisfy the above condition. A collection of the secondary transmitters is expressed as S, in which all STs can meet the interference threshold. The transmission process of the proposed protocol is illustrated as follows.
When S = Ø , the primary signals are transmitted by PS, the artificial noise is transmitted by ST o , but the secondary transmission is interrupted and SR does not work. PD can eliminate perfectly the artificial noise, which leads to a serious threat to the correct reception of the primary signals at E. Thus, the received signals at PD and E in this case are given by
y P S = Ø t = P P h P x P t + n P t ,
and
y E S = Ø t = P P h PE x P t + P S h S o E x n t + n E t ,
where x P t and x n t represent the primary signal and the artificial noise, respectively. Furthermore, normalizing, E [ | x P t | 2 ] = 1 and E [ | x n t | 2 ] = 1 . n P t and n E t denote the noises at PS and E, respectively. Hence, the instantaneous capacities of the channel PS PD and the channel PS E are given by
C P S = Ø = log 2 1 + P P | h P | 2 / N 0
and
C E S = Ø = log 2 1 + P P | h PE | 2 P S | h S o E | 2 + N 0 .
When S Ø , denoting S = S l and having S { Ø } S l , the primary signals, secondary signals and artificial noise are transmitted by PS, ST i and ST o , respectively, in the same spectrum band, where ST i S l , ST o S l and l = 1 , 2 , , 2 K 1 1 . In this case, mutual interferences are aroused between the primary and secondary users. The artificial noise is eliminated perfectly at PD and SR, but leads a serious threat to the correct reception of the primary signals at E. Thus, the received signals at PD, SR and E are given by
y P S = S l t = P P h P x P t + P S h S i P x S t + n P t ,
y S S = S l t = P S h S i x S t + P P h PS x P t + n S t ,
and
y E S = S l t = P P h PE x P t + P S h S o E x n t + P S h S i E x S t + n E t ,
where x S t is the secondary signal and n S t denotes the noise at SR. Moreover, we assume that E [ | x S t | 2 ] = 1 . Hence, the capacities of the channels PS PD , ST i SR , and PS E are given by
C P S = S l = log 2 1 + P P | h P | 2 P S | h S i P | 2 + N 0 ,
C S S = S l log 2 1 + P S | h S i | 2 P P | h PS | 2 + N 0 ,
and
C E S = S l = log 2 1 + P P | h PE | 2 P S | h S o E | 2 + P S | h S i E | 2 + N 0 ,
where o , i I and i o . The number of elements in set S l is denoted by L 1 . It is easy to know S l = { i | C P R P , i I , i o } , S ¯ l = { i | C P < R P , i I , i o } and S l S ¯ l = { ST i | i I , i o } . Hence, if C P > C E , then the physical-layer secrecy is obtained. If C P < C E , the secrecy intercept event happens. Its definition refers to [32]. Hence, in wireless systems, the physical-layer security is measured by its probability. Two selection criteria of ST o and ST i are described in detail in the next subsection.

2.2. The Selection Schemes for S T o and S T i

In the multi-users underlay cognitive model, the primary security performance, and the primary and secondary transmission performances are the three most important indicators in system performance analysis. Moreover, the security performance of primary users can be improved effectively since a secondary user acts as a friendly jammer to interfere eavesdropping. By choosing a suitable user as the friendly jammer will further enhance the primary security performance. To optimize the primary physical-layer security performance, a secondary transmitter is selected to serve as a cooperative jammer, we use ST o to denote the secondary transmitter, which can provide the most optimal security for the primary. Thus, the selection criteria of ST o can be written as
J = arg min j { 1 , , K } Pr C P S = Ø < C E S = Ø = arg max j { 1 , , K } | h S j E | 2 ,
where C P S = Ø and C E S = Ø are calculated by Equations (3) and (4), respectively. In addition, the secondary transmission performance is significantly improved by cooperative rewards that some primary spectrum is released or the value of interference threshold is relaxed for secondary transmission. However, different secondary transmitters have different transmission efficiencies. To maximize the secondary transmission performance, a secondary transmitter is denoted by ST i that satisfies the interference threshold. Moreover, ST i has access to the licensed spectrum if the optimal outage performance of the secondary system is obtained by ST i . The selection criteria for ST i can be written as
ST i = arg min ST i S l Pr C S S = S l < R S = arg max ST i S l C S S = S l ,
where C S S = S l is calculated by Equation (9). Therefore, we focus on the selection of the secondary, which can have access to the primary spectrum and can be the cooperative jammer.

2.3. The Conventional Non-Security Model

As shown in Figure 1a, the system model of the conventional non-security management protocol comprise of a primary pair (PS-PD), an eavesdropper (E), a secondary receiver (SR) and K secondary transmitters ST i ( 1 , , K ). This conventional model is a typical cognitive underlay system, where STs can have access to the primary spectrum and need to satisfy the interference threshold settled by primary system. Compared with the conventional model, we can see that the received signals at PD and SR and the corresponding instantaneous capacities are identical. In contrast, the received signals at E and the corresponding instantaneous capacities are different. Thus, if S C = Ø , the received signals at E and the corresponding instantaneous capacities are given by
y E C t = P P h PE x P t + n E t
and
C E C t = log 2 1 + P P | h PE | 2 / N 0 .
If the secondary signal is transmitted over primary spectrum (namely, S C = Ø ), the received signals at E and the corresponding instantaneous capacities are given by
y E C t = P P h PE x P t + P S h S i E x S t + n E t
and
C E C = log 2 1 + P P | h PE | 2 P S | h S i E | 2 + N 0 .

3. Performance Analysis

3.1. The Primary Outage Probability for the Proposed Protocols

We use Ω P to denote an event, which represents an occurrence of outage of the channel PS PD . Hence, if C P S = Ø < R P or C P S Ø < R P , the event Ω P occurs. Obviously, the secondary transmission may make the event happen when S Ø . Thus, we obtain
P out = Pr S = Ø Pr Ω P | S = Ø + l = 1 2 K 1 1 Pr S = S l Pr Ω P | S = S l
and
Pr S = Ø = i = 1 , i o K Pr C P < R P = i = 1 , i o K Pr P P | h P | 2 P S | h S i P | 2 + N 0 < 2 R P 1 ,
where C P S = Ø is given by Equation (3). Since | h P | 2 and | h S i P | 2 are i.i.d. exponential distribution with parameters 1 / σ P 2 and 1 / σ S i P 2 , respectively, letting X 1 = | h P | 2 and X 2 = | h S i P | 2 , Equation (18) can be rewritten as
Pr S = Ø = i = 1 , i o K Pr C P < R P = i = 1 , i o K Pr P P X 1 P S X 2 + N 0 = i = 1 , i o K 0 1 σ S i P 2 e x 2 σ S i P 2 0 ρ P P S x 2 + N 0 / P P 1 σ P 2 e x 1 σ P 2 d x 1 d x 2 = i = 1 , i o K 1 σ P 2 P P e ρ P N 0 P P σ P 2 σ P 2 P P + ρ P P S σ S i P 2 .
Furthermore, Pr { Ω P | S = Ø } and Pr { S = S l } can be calculated as follows:
Pr { Ω P | S = Ø } = Pr log 2 1 + P P | h P | 2 < R P = 1 e ρ P N 0 P P σ P 2
and
Pr S = S l = i S ¯ l Pr C P < R P j S l Pr C P R P = i S ¯ l 1 σ P 2 P P σ P 2 P P + ρ P P S σ S i P 2 e ρ P N 0 P P σ P 2 j S l σ P 2 P P σ P 2 P P + ρ P P S σ S i P 2 e ρ P N 0 P P σ P 2 ,
where ρ P = 2 R P 1 . According to the definition of the set S l , we can see that Pr { Ω P | S = S l } equals to zero in OSTS and OCJS. Thus, the expression of the outage probability for the primary system is obtained by substituting Equations (19)–(21) and Pr { Ω P | S = S l } = 0 into Equation (17).

3.2. The Outage Probability of the Secondary System

We use Ω S to denote an event, which represents an occurrence of outage of the channel ST SR . If C S S = S l < R S , then the event Ω S occurs. Therefore, we have
S out = Pr S = Ø Pr Ω S | S = Ø + l = 1 2 K 1 1 Pr S = S l Pr Ω S | S = S l
and
Pr Ω S | S = S l = min ST i S l Pr C S S = S l < R S = Pr max ST i S l P S | h S i | 2 P P | h PS | 2 + N 0 < 2 R S 1 = i = 1 L 1 Pr P S | h S i | 2 P P | h PS | 2 + N 0 < 2 R S 1 .
Furthermore, | h S i | 2 and | h PS | 2 are i.i.d. exponential distribution with parameters 1 / σ S i 2 and 1 / σ PS 2 , respectively. Let Z 1 = | h S i | 2 and Z 2 = | h PS | 2 , thus Equation (23) can be rewritten as
Pr Ω S | S = S l = i = 1 L 1 Pr P S Z 1 P P Z 2 + N 0 < ρ S = i = 1 L 1 0 1 σ PS i 2 e z 2 σ PS i 2 0 ρ S P P z 1 + N 0 / P S 1 σ S i 2 e z 1 σ S i 2 d z 1 d z 2 = i = 1 L 1 1 σ S i 2 P S e ρ S N 0 P S σ S i 2 σ S i 2 P S + ρ S P P σ PS i 2 ,
where ρ S = 2 R S - 1 . We can see that Pr { Ω S | S = Ø } = 1 . Thus, the expression of the outage probability of the secondary system is obtained by substituting Equations (19), (21), (24) and Pr { Ω S | S = Ø } = 1 into Equation (22).

3.3. The Intercept Probability of the Primary Transmission

The secrecy intercept event for the primary system is denoted by Ω int . Hence, the intercept probability of the primary transmission is equal to the probability of the event Ω int occurrence [33]. In addition, the secrecy intercept event occurs when C P S = Ø < C E S = Ø or C P S Ø < C E S Ø . Obviously, the event Ω int occurs only when S Ø . Therefore, we obtain
P int = Pr S = Ø Pr Ω int | S = Ø + l = 1 2 K 1 1 Pr S = S l Pr Ω int | S = S l .
Moreover, | h PE | 2 , | h S i E | 2 and | h S o E | 2 are exponential variables with parameters 1 / σ PE 2 , 1 / σ S i E 2 and 1 / σ S o E 2 , respectively. Let X ^ 3 = | h S i E | 2 , X 3 = | h S o E | 2 and X 4 = | h PE | 2 . Thus, when S = Ø , the conditional intercept probability Pr { Ω int | S = Ø } and Pr { Ω int | S = S l } can be derived as
Pr { Ω int | S = Ø } = Pr P P | h P | 2 N 0 < P P | h PE | 2 P S · max o { 1 , , K } | h S o E | 2 + N 0 = o { 1 , , K } Pr | h P | 2 < N 0 P S | h PE | 2 | h S o E | 2 + N 0 / P S = o { 1 , , K } Pr X 1 < N 0 P S X 4 X 3 + N 0 / P S
and
Pr { Ω int | S = S l } = min o { 1 , , K } Pr C P S = S l < C E S = S l = Pr C P S = S l < min o { 1 , , K } C E S = S l = o = 1 K Pr C P S = S l < C E S = S l = o = 1 K Pr P P | h P | 2 P S | h S i P | 2 + N 0 < P P | h PE | 2 P S | h S i E | 2 + P S | h S o E | 2 + N 0 = o = 1 K Pr X 1 X 2 + N 0 / P S < X 4 X 3 + X ^ 3 + N 0 / P S .
Let X ˜ 2 = X 2 + N 0 / P S , X ˜ 3 = X 3 + X ^ 3 + N 0 / P S , Y 1 = X 1 / X ˜ 2 , Y 2 = X 4 / X ˜ 3 , and Y 3 = X 4 / ( X 3 + N 0 / P S ) . Following Equations (A1) and (A9) in Appendix A, the probability density of random variables Y 1 , Y 2 and Y 3 can be written as follows:
f Y 1 y 1 = σ P 2 / σ S i P 2 σ P 2 / σ S i P 2 + y 1 2 + N 0 / P S σ S i P 2 σ P 2 / σ S i P 2 + y 1 e N 0 y 1 P S σ P 2 = a 1 a 1 + y 1 2 + a 1 b 1 a 1 + b 1 e b 1 y 1 ,
f Y 2 y 2 = 1 σ PE 2 / σ S o E 2 + y 2 2 + N 0 / P S σ PE 2 σ PE 2 / σ S o E 2 + y 2 · σ PE 2 e N 0 y 2 P S σ PE 2 σ S o E 2 σ S i E 2 = c 1 a 2 + y 2 2 + b 2 a 2 + y 2 e b 2 y 2 ,
and
f Y 3 y 3 = σ PE 2 / σ S o E 2 σ PE 2 / σ S o E 2 + y 3 2 + N 0 / P S σ S o E 2 σ PE 2 / σ S o E 2 + y 3 e N 0 y 3 P S σ PE 2 = a 3 a 3 + y 3 2 + a 3 b 3 a 3 + b 3 e b 3 y 3 ,
where a 1 = σ P 2 / σ S i P 2 , b 1 = N 0 / P S σ P 2 , a 2 = a 3 = σ PE 2 / σ S o E 2 , b 2 = b 3 = N 0 / P S σ PE 2 , c = σ S o E 2 / ( σ S o E 2 - σ S i E 2 ) . By using the equalities in Equations (28)–(30), Equations (26) and (27) can be rewritten, respectively, as follows:
Pr Ω int | S = Ø = o 1 , , K Pr X 1 < N 0 / P S Y 3 = o 1 , , K 0 a 3 a 3 + y 3 2 + a 3 b 3 a 3 + b 3 e b 3 y 3 0 N 0 P S 1 σ P 2 e x 1 σ P 2 d x 1 d y 3 = o 1 , , K a 3 b 1 e a 3 b 1 + b 3 Ei a 3 b 1 + b 3
and
Pr Ω int | S = S l = o = 1 K Pr Y 1 < Y 2 = o = 1 K 0 c + c b 2 y 2 + a 2 y 2 + a 2 2 e b 2 y 2 0 y 2 a 1 + a 1 b 1 y 1 + a 1 y 1 + a 1 2 e b 1 y 1 d y 1 d y 2 = o = 1 K c a 1 a 2 c 1 + a 1 b 1 a 2 b 1 a 1 a 2 2 e a 2 b 1 + b 2 Ei a 2 b 1 + b 2 a 1 a 2 c 1 + a 2 b 2 a 1 b 2 a 1 a 2 2 a 1 a 2 c 1 + a 2 b 2 a 1 b 2 a 1 a 2 2 + a 1 a 2 c 1 + a 2 b 2 a 1 b 2 a 1 a 2 2 e a 1 b 1 + b 2 Ei a 1 b 1 + b 2 a 1 c a 1 a 2 ,
where Ei ( x ) = x 1 x e x d x = r + ln ( x ) + k = 1 x k k · k ! , x < 0 , r is the Euler’s constant. Therefore, the intercept probability of the primary system in proposed protocol is obtained by substituting Equations (19), (21), (31) and (32) into Equation (25).

3.4. The Outage and Intercept Probability for the Conventional No-Security Protocol

Similar to the performance analysis for the proposed protocols, the primary and secondary outage probability and the primary intercept probability are calculated, respectively, as follows:
P out C = Pr S C = Ø Pr Ω P | S C = Ø + l = 1 2 K 1 Pr S C = S l Pr Ω P | S C = S l ,
S out C = Pr S C = Ø Pr Ω S | S C = Ø + l = 1 2 K 1 Pr S C = S l Pr Ω S | S C = S l ,
and
P int C = Pr S C = Ø Pr Ω int | S C = Ø + l = 1 2 K 1 Pr S C = S l Pr Ω int | S C = S l .
We can see that Pr { Ω S | S C = Ø } = 1 , Pr { Ω P | S C = S l } = 1 . To encourage STs to aid the transmission of artificial noise, we set R P 0 R P . Therefore, we also have
Pr S C = Ø = i = 1 K Pr C P C < R P 0 = i = 1 K 1 σ P 2 P P σ P 2 P P + ρ P 0 P S σ S i P 2 e ρ P 0 N 0 P P σ P 2 ,
Pr S C = S l = i S ¯ l Pr C P C < R P 0 j S l Pr C P C R P 0 = i S ¯ l 1 σ P 2 P P σ P 2 P P + β ρ P 0 P S σ S i P 2 e ρ P 0 N 0 P P σ P 2 × j S l 1 σ P 2 P P σ P 2 P P + β ρ P 0 P S σ S j P 2 e ρ P 0 N 0 P P σ P 2 ,
Pr Ω P | S C = Ø = Pr log 2 1 + P P | h P | 2 / N 0 < R P 0 = 1 e ρ P 0 N 0 P P σ P 2 ,
Pr Ω S | S C = S l = i = 1 L Pr C S C < R S = i = 1 L 1 σ S i 2 P S σ S i 2 P P + ρ S P P σ PS i 2 e ρ S N 0 P S σ S i 2 ,
Pr Ω int | S C = Ø = Pr P P | h P | 2 / N 0 < P P | h PE | 2 / N 0 = Pr X 1 < X 4 = 0 1 σ PE 2 e x 4 σ PE 2 0 x 4 1 σ P 2 e x 1 σ P 2 d x 1 d x 4 = 1 σ P 2 σ P 2 + σ PE 2 ,
Pr Ω int | S C = S l = Pr C P C < C E C = Pr P P | h P | 2 P S | h S o P | 2 + N 0 < P PE | h P | 2 P S | h S o E | 2 + N 0 = 1 a 1 a 1 a ˜ 2 + c 1 Ei a 1 b 1 + b 2 + c 2 Ei a ˜ 2 b 1 + b 2 e a ˜ 2 b 1 + b 2 ,
where ρ P 0 = 2 R P 0 1 , a ˜ 2 = σ PE 2 / σ S i E 2 , c 1 = β a 1 a ˜ 2 ( 1 + a ˜ 2 b 2 β a 1 b 2 ) / ( a ˜ 2 β a 1 ) 2 and c 2 = β a 1 a ˜ 2 ( a ˜ 2 b 1 β a 1 b 1 1 ) / ( a ˜ 2 β a 1 ) 2 .

4. Numerical Results

The simulation results of the proposed protocols are provided in this section. The systems comprise a primary pair (PS-PD), an eavesdropper (E), a secondary receiver (SR) and K secondary transmitters ST i ( i = 1 , , K ). Since the secondary user can serve as cooperative jammer, the primary user relaxes the interference threshold in return, which decreases the minimum achievable rate of primary user R P . Thus, we set R P = 1.5 Bit/s/Hz and R P = 1 Bit/s/Hz in the conventional model and the proposed model, respectively. If the parameters are not specified, the simulation parameters are settled as follow: R S = 1 Bit/s/Hz; r 1 = 10 lg ( P P / N 0 ) = 10 dB is the average transmit SNR of the primary user. In addition, σ P 2 = σ SP 2 = σ PS 2 = σ PE 2 = 1 , σ S o E 2 = 3 , σ S i E 2 = 1 / 5 and σ S 2 = 4 .
The outage probabilities of the primary user versus r 2 in the conventional model and the proposed model are shown as Figure 2, where r 2 = 10 lg ( P S / N 0 ) . The special parameter is the number of STs, which is fixed as K = 3 ; 4 ; 9 . In Figure 2, the outage probability of primary system increases with increase of the secondary SNR. In the same protocol, the primary outage probability decreases with increase of the number of secondary users. This is because the diversity gain increases with increase of the number of secondary users. Furthermore, the outage probability of primary system in our proposed protocol is less than the conventional protocol, which is because that the secondary user is encouraged to serve as friendly jammer, which decreases the interference threshold.
The outage probabilities of the secondary user versus r 2 are shown in Figure 3, which is generated by using the same parameters as those in Figure 2. In Figure 3, in the same protocol, the secondary outage performances are improved when the number of STs becomes larger. Moreover, the outage probabilities of secondary decrease firstly, and increase with the increase of the average SNR for secondary in the two protocols. Furthermore, the increasing trend is due to that the interference threshold is always not satisfied by secondary user when the SNR of the secondary user is too large. In the small secondary average SNR range, the outage performance of secondary users in the conventional model is better than the performance in the proposed protocol. This performance is mainly determined by the multi-user diversity gain. In this case, the proposed protocol has a lower multi-user diversity gain than the conventional model due to one secondary transmitter acting as the cooperative jammer. In contrast, the proposed protocol can provide a better secondary outage performance in the high secondary average SNR range because the primary user relaxes the interference threshold.
Figure 4 is generated using the same parameters as those in Figure 2, which shows the intercept probabilities of the primary versus r 2 with different number of STs. In Figure 4, the primary security performance is improved significantly in the proposed protocol and is improved slightly in the conventional model as the number of STs becomes larger due to the multi-user diversity gain. Moreover, compared with the conventional protocol, our protocol can provide better primary security performance. The intercept probabilities of the primary system decrease with the increase of r 2 in the proposed protocol because the interference from ST to eavesdropper increases with the increase of r 2 . However, the intercept probabilities of the primary system decrease firstly and increase with the increase of r 2 in the conventional protocol. In the small value range of r 2 , the interference threshold is always satisfied, but the interference from ST to eavesdropper increases with the increase of r 2 , which causes the decreasing phenomenon. In the large value range of r 2 , the interference threshold is hard to satisfy. Thus, the access probability of the secondary transmission decreases and the interference from ST to eavesdropper is reduced with the increase of r 2 . This is the cause of the latter increasing phenomenon. These numerical results can also be found in Figure 5, Figure 6 and Figure 7.
The intercept probabilities of primary users versus r 2 with different values of σ SE 2 are shown in Figure 5. Namely, the special parameter is the channel coefficient σ SE 2 , which equals 3, 3.5 or 4. As described in Figure 5, the primary security performance is improved significantly in the proposed protocol and is improved slightly in the conventional model as the value of σ SE 2 becomes larger. Compared with the conventional protocol, our protocol can provide the better primary security performance because the larger value of σ S o E 2 represents the better channel conditions for links ST o E . In other words, the interference from ST o to eavesdropper increases with the increase of σ S o E 2 . In addition, the interference to eavesdropper from ST o is greater than that from ST i . In proposed protocol, both ST o and ST i interfere with the eavesdropping. However, the interference to eavesdropper just comes from ST i in the conventional model and the probability that i is equal to o is 1 / K .
The intercept probabilities of primary users versus r 2 with different values of σ PE 2 as shown in Figure 6. Namely, the special parameter is the channel coefficient σ PE 2 , which equals to 1.2, 1 or 0.8. In Figure 6, a smaller value of σ PE 2 can lead to a good primary security performance in the same protocol because a larger value of σ PE 2 represents the better channel conditions for links PS E . In other words, the instantaneous capacity of PS E increases with the increase of σ PE 2 . In the proposed protocol with the larger values of σ PE 2 , the primary security performance is enhanced significantly in small value range of r 2 and is enhanced slightly in large value range of r 2 . Compared to the conventional protocol, the proposed protocol can provide the better primary security performance. These numerical results are consistent with those in Figure 4 and Figure 5.
The intercept probabilities of primary users versus r 2 with different values of r 1 are shown in Figure 7. Namely, the special parameter is the average SNR of the primary user, which is set as r 1 = 10 lg ( P P / N 0 ) = 5 , 10 or 15 dB. In Figure 7, the primary security performance in the proposed protocol is improved as the value of r 1 becomes larger. On the contrary, the primary security performance in the conventional model is reduced as the value of r 1 becomes larger. The valid primary information received by eavesdropper and the interference to eavesdropper are the two main factors related to the security performance of primary system. The more valid primary information is received by the eavesdropper, the worse is primary security performance achieved, and the more interference to he eavesdropper, the greater is primary security performance achieved. In the proposed protocol, the smaller value of r 1 causes the less valid primary information received at eavesdropper, so the smaller intercept probability of the primary system is obtained. In the conventional model, the interference threshold is hard to satisfy with the smaller r 1 and the interference caused by ST i to eavesdropper is very little, so the larger intercept probability of the primary system is obtained. All of the above numerical results are consistent with the theoretical results in Section 3.

5. Conclusions

In this paper, we have investigated the physical-layer security for a cognitive Internet of things model, which is composed of a primary pair (PS-PD), a secondary receiver (SR), K secondary transmitters and an eavesdropper. To protect the information of primary users against eavesdropping, we have proposed the ST cooperative jammer selection transmission protocol. In return, for the cooperation of ST o , interference threshold for secondary user is relaxed by the primary system compared with the non-security management model. When this interference threshold is satisfied and the best outage performance of secondary users is obtained by selecting ST i , then the secondary user ST i has access to the licensed spectrum. Due to the cooperation of ST o , the security performance of primary users are enhanced. Due to the cooperation of ST o and the selection of ST i , the outage performance of secondary users are enhanced in high secondary transmit SNR region. Furthermore, the intercept probability and outage probability of the primary system have been derived. The outage probability of the secondary system has also been obtained. For comparison purposes, the conventional non-security management was also investigated as a baseline. The numerical results have shown that our protocol has better primary secrecy performance than the non-security management model. In addition, the proposed protocol also has better secondary and primary transmission performance than the conventional model.

Author Contributions

Conceptualization, P.X., L.X., H.W., and I.Y. Formal analysis: P.X. and L.X. Funding acquisition: P.X. and I.Y. Investigation: P.X., L.X., J.T.S., and I.Y. Methodology: P.X., L.X., and I.Y. Performance evaluation: P.X., H.W., and J.T.S. Case study: H.W. and J.T.S. Supervision: P.X. and I.Y. Validation: P.X., L.X., H.W., J.T.S., and I.Y. Visualization: P.X. and L.X. Writing, original draft: P.X., L.X., H.W., J.T.S., and I.Y. Writing, review and editing: P.X., L.X., J.T.S., and I.Y.

Funding

This work was supported by the National Natural Science Foundation of China (NSFC) under Grants No. 61801171 and the Soonchunhyang University Research Fund.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Let X 1 , X 2 , X ^ 3 and X 4 be exponentially variables with parameters 1 / σ P 2 , 1 / σ S i P 2 , 1 / σ S o E 2 , 1 / σ S i E 2 and 1 / σ PE 2 , respectively. Let X ˜ 2 = X 2 + N 0 / P S , X ˜ 3 = X 3 + X ^ 3 + N 0 / P S , Y 1 = X 1 / X ˜ 2 , Y 2 = X 4 / X ˜ 3 , and Y 3 = X 4 / ( X 3 + N 0 / P S ) . Since
F X ˜ 2 x ˜ 2 = Pr X ˜ 2 < x ˜ 2 = Pr X 2 < x ˜ 2 N 0 / P S = 0 x ˜ 2 N 0 / P S 1 σ S i P 2 e x 2 σ S i P 2 d x 2 = 1 e N 0 P S σ S i P 2 x ˜ 2 σ S i P 2 ,
we have
f X ˜ 2 x ˜ 2 = 1 σ S i P 2 e N 0 P S σ S i P 2 x ˜ 2 σ S i P 2 .
From Equation (34), we have
F Y 1 y 1 = Pr X 1 / X ˜ 2 < y 1 = Pr X 1 < x ˜ 2 y 1 = N 0 / P S 1 σ S i P 2 e N 0 P S σ S i P 2 e x ˜ 2 σ S i P 2 0 x ˜ 2 y 1 1 σ P 2 e x 1 σ P 2 d x 1 d x ˜ 2 = 1 σ P 2 σ S i P 2 y 1 + σ P 2 e N 0 P S σ P 2 y 1 .
Therefore, we obtain
f Y 1 y 1 = σ S i P 2 σ P 2 σ P 2 + σ S i P 2 y 1 2 + N 0 / P S σ P 2 + σ S i P 2 y 1 e N 0 y 1 P S σ P 2 .
Similar to the derivation of the probability density of Y 1 , the probability density of random variables Y 3 can obtained by
f Y 3 y 3 = σ S o E 2 σ PE 2 σ PE 2 + σ S o E 2 y 3 2 + N 0 / P S σ PE 2 + σ S o E 2 y 3 e N 0 y 3 P S σ PE 2 .
In addition, since
F X ˜ 3 x ˜ 3 = Pr X 3 < x ˜ 3 x ^ 3 N 0 / P S = 0 1 σ S i E 2 e x ^ 3 σ S i E 2 0 x ˜ 3 x ^ 3 N 0 / P S 1 σ S o P 2 e x 3 σ S o P 2 d x 3 d x ^ 3 = 1 σ S o E 2 σ S o E 2 σ S i E 2 e N 0 P S σ S o E 2 x ˜ 3 σ S o E 2 ,
we have
f X ˜ 3 x ˜ 3 = 1 σ S o E 2 σ S i E 2 e N 0 P S σ S o E 2 x ˜ 3 σ S o E 2 .
From Equation (A7), we have
F Y 2 y 2 = Pr X 4 / X ˜ 3 < y 2 = Pr X 4 < x ˜ 3 y 2 = N 0 / P S 1 σ S o E 2 σ S i E 2 e N 0 P S σ S o E 2 e x ˜ 3 σ S o E 2 0 x ˜ 3 y 2 1 σ PE 2 e x 4 σ P E 2 d x 4 d x ˜ 3 = σ S o E 2 σ S o E 2 σ S i E 2 1 σ PE 2 σ S o E 2 y 2 + σ PE 2 e N 0 P S σ PE 2 y 2 .
Thus, we obtain
f Y 2 y 2 = e N 0 y 2 P S σ PE 2 σ S o E 2 σ S i E 2 σ PE 2 σ PE 2 / σ S o E 2 + y 2 2 + σ S o E 2 N 0 / P S σ PE 2 / σ S o E 2 + y 2 .

References

  1. Wu, Q.; Ding, G.; Xu, Y.; Feng, S.; Du, Z.; Wang, J.; Long, K. Cognitive Internet of Things: A New Paradigm Beyond Connection. IEEE Internet Things J. 2014, 1, 129–142. [Google Scholar] [CrossRef]
  2. Song, F.; Ai, Z.; Li, J.; Pau, G.; Collotta, M.; You, I.; Zhang, H. Smart collaborative caching for Information-centric IoT in fog computing. Sensors 2017, 17, 2512. [Google Scholar] [CrossRef] [PubMed]
  3. Ai, Z.; Liu, Y.; Song, F.; Zhang, H. A smart collaborative charging algorithm for mobile power distribution in 5G networks. IEEE Access 2018, 6, 28668–28679. [Google Scholar] [CrossRef]
  4. Trihinas, D.; Pallis, G.; Dikaiakos, M. Low-Cost Adaptive Monitoring Techniques for the Internet of Things. IEEE Trans. Serv. Comput. 2018, 99, 1. [Google Scholar] [CrossRef]
  5. Trihinas, D.; Pallis, G.; Dikaiakos, M. ADMin: Adaptive Monitoring Dissemination for the Internet of Things. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017. [Google Scholar]
  6. Tata, S.; Mohamed, M.; Megahed, A. An Optimization Approach for Adaptive Monitoring in IoT Environments. In Proceedings of the 2017 IEEE International Conference on Services Computing (SCC), Honolulu, HI, USA, 25–30 June 2017; pp. 378–385. [Google Scholar]
  7. Lee, Y.-T.; Hsiao, W.-H.; Lin, Y.-S.; Chou, S.-C.T. Privacy-Preserving Data Analytics in Cloud-Based Smart Home with Community Hierarchy. IEEE Trans. Consum. Electron. 2017, 63, 200–207. [Google Scholar] [CrossRef]
  8. Song, F.; Zhou, Y.; Wang, Y.; Zhao, T.; You, I.; Zhang, H. Smart Collaborative Distribution for Privacy Enhancement in Moving Target Defense. Inf. Sci. 2018. [Google Scholar] [CrossRef]
  9. Ai, Z.; Zhou, Y.; Song, F. A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT. Sensors 2017, 18, 1926. [Google Scholar] [CrossRef]
  10. Uchida, N.; Takeuchi, S.; Ishida, T.; Shibata, Y. Mobile traffic accident prevention system based on chronological changes of wireless signals and sensors. J. Wirel. Netw. Ubiquitous Comput. Dependable Appl. 2017, 8, 57–66. [Google Scholar]
  11. Kotenko, I.; Saenko, I.; Branitskiy, A. Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring. J. Internet Serv. Inf. Secur. 2017, 8, 54–63. [Google Scholar]
  12. Kotenko, I.; Saenko, I.; Kushnerevich, A. Parallel big data processing for security monitoring in Internet of Things networks. J. Wirel. Netw. Ubiquitous Comput. Dependable Appl. 2018, 8, 60–74. [Google Scholar]
  13. Afza, A.; Zaidi, S.A.R.; Shakir, M.Z.; Imran, M.A.; Ghogho, M. The Cognitive Internet of Things: A Unified Perspective. IEEE Mob. Netw. Appl. 2015, 20, 72–85. [Google Scholar] [CrossRef] [Green Version]
  14. Jackson, D.; Zang, W.; Gu, Q.; Yu, M. Robust detection of rogue signals in cooperative spectrum sensing. J. Internet Serv. Inf. Secur. 2015, 5, 4–23. [Google Scholar]
  15. Mitola, J. Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio. Ph.D. Thesis, KTH Royal Institute of Technol, Stockholm, Sweden, December 2000. [Google Scholar]
  16. Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
  17. Goldsmith, A.; Jafar, S.; Maric, I.; Srinivasa, S. Breaking spectrum gridlock with cognitive radios: An information theoretic perspective. Proc. IEEE 2009, 97, 894–914. [Google Scholar] [CrossRef]
  18. Rajesh, K.S.; Danda, B.R. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey. IEEE Commun. Surv. Tutor. 2015, 17, 1023–1043. [Google Scholar]
  19. Li, J.; Feng, Z.; Feng, Z.; Zhang, P. A Survey of Security Issues in Cognitive Radio Networks. IEEE J. Mag. China Commun. 2015, 12, 132–150. [Google Scholar] [CrossRef]
  20. Nguyen, V.D.; Hoang, T.M.; Shin, O.S. Secrecy capacity of the primary system in a cognitive radio network. IEEE Trans. Veh. Technol. 2015, 64, 3834–38435. [Google Scholar] [CrossRef]
  21. Yulong, Z.; Xianbin, W.; Weiming, S. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks. IEEE Trans. Commun. 2013, 61, 5103–5113. [Google Scholar] [Green Version]
  22. Zhihui, S.; Yi, Q.; Song, C. On physical layer security for cognitive radio networks. IEEE Netw. 2013, 27, 28–33. [Google Scholar] [CrossRef]
  23. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  24. Zhang, N.; Lu, N.; Cheng, N.; Mark, J.W.; Shen, X.S. Cooperative spectrum access towards secure information transfer for CRNs. IEEE J. Sel. Areas Commun. 2013, 31, 2453–2464. [Google Scholar] [CrossRef]
  25. Mokari, N.; Parsaeefard, S.; Saeedi, H.; Azmi, P. Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users. IEEE Trans. Wirel. Commun. 2014, 13, 1058–1073. [Google Scholar] [CrossRef]
  26. Xu, D.; Li, Q. Resource allocation for cognitive radio with primary user secrecy outage constraint. IEEE Syst. J. 2018, 12, 893–904. [Google Scholar] [CrossRef]
  27. Wang, C.; Wang, H.-M. On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1814–1827. [Google Scholar] [CrossRef]
  28. Nguyen, V.-D.; Duong, T.Q.; Dobre, O.A.; Shin, O.-S. Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2609–2623. [Google Scholar] [CrossRef]
  29. Elkashlan, M.; Wang, L.; Duong, T.Q.; Karagiannidis, G.K.; Nallanathan, A. On the security of cognitive radio networks. IEEE Trans. Veh. Technol. 2015, 64, 3790–3795. [Google Scholar] [CrossRef]
  30. Yang, L.; Jiang, H.; Vorobyov, S.A.; Chen, J.; Zhang, H. Secure communications in underlay cognitive radio networks: User scheduling and performance analysis. IEEE Commun. Lett. 2016, 20, 1191–1194. [Google Scholar] [CrossRef]
  31. Zou, Y. Physical-layer security for spectrum sharing systems. IEEE Trans. Wirel. Commun. 2017, 16, 1319–1329. [Google Scholar] [CrossRef]
  32. Pei, Y.; Liang, Y.-C.; Teh, K.C.; Li, K. Secure communication in multiantenna cognitive radio networks with imperfect channel state information. IEEE Trans. Signal Process. 2011, 59, 1683–1693. [Google Scholar] [CrossRef]
  33. Wang, Z.; Xiao, M.; Skoglund, M.; Poor, H.V. Secure degrees of freedom of wireless networks using artificial noise alignment. IEEE Trans. Commun. 2015, 63, 2632–2646. [Google Scholar] [CrossRef]
Figure 1. The system models.
Figure 1. The system models.
Sensors 18 04257 g001
Figure 2. The outage probabilities of primary users versus r 2 with different K values.
Figure 2. The outage probabilities of primary users versus r 2 with different K values.
Sensors 18 04257 g002
Figure 3. The outage probability of secondary system versus r 2 in the two protocols with different K values.
Figure 3. The outage probability of secondary system versus r 2 in the two protocols with different K values.
Sensors 18 04257 g003
Figure 4. The intercept probabilities of primary users versus r 2 with different K values.
Figure 4. The intercept probabilities of primary users versus r 2 with different K values.
Sensors 18 04257 g004
Figure 5. The intercept probabilities of primary users versus r 2 with different σ SE 2 values.
Figure 5. The intercept probabilities of primary users versus r 2 with different σ SE 2 values.
Sensors 18 04257 g005
Figure 6. The intercept probabilities of primary users versus r 2 with different σ PE 2 values.
Figure 6. The intercept probabilities of primary users versus r 2 with different σ PE 2 values.
Sensors 18 04257 g006
Figure 7. The intercept probabilities of primary users versus r 2 with different r 1 values.
Figure 7. The intercept probabilities of primary users versus r 2 with different r 1 values.
Sensors 18 04257 g007

Share and Cite

MDPI and ACS Style

Xie, P.; Xing, L.; Wu, H.; Seo, J.T.; You, I. Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things. Sensors 2018, 18, 4257. https://doi.org/10.3390/s18124257

AMA Style

Xie P, Xing L, Wu H, Seo JT, You I. Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things. Sensors. 2018; 18(12):4257. https://doi.org/10.3390/s18124257

Chicago/Turabian Style

Xie, Ping, Ling Xing, Honghai Wu, Jung Taek Seo, and Ilsun You. 2018. "Cooperative Jammer Selection for Secrecy Improvement in Cognitive Internet of Things" Sensors 18, no. 12: 4257. https://doi.org/10.3390/s18124257

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop