• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

具有无线能量收集不可信中继的CIoT网络中的安全通信

Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.

作者信息

Hu Hequn, Gao Zhenzhen, Liao Xuewen, Leung Victor C M

机构信息

School of Electronic and Information Engineering, Xi'an Jiaotong University, No. 28 West Xianning Road, Xi'an 710049, China.

Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC V6T1Z4, Canada.

出版信息

Sensors (Basel). 2017 Sep 4;17(9):2023. doi: 10.3390/s17092023.

DOI:10.3390/s17092023
PMID:28869540
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5621061/
Abstract

The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device's messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission ( P S S T ), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. P S S T is analyzed for the proposed secure schemes, and the closed form expressions of P S S T for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better P S S T than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar P S S T , the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations.

摘要

物联网(IoT)展现出一个光明的前景,即各种普通电器能够相互连接,并且与互联网的其他部分相连,从而极大地改善我们的生活。物联网设备的硬件受限、复杂度低以及能源约束严峻,带来了独特的通信和安全挑战。此外,大量物联网设备的使用还引发了严重的频谱稀缺问题。在本文中,考虑认知物联网(CIoT),其中物联网网络作为使用底层频谱共享的次级系统。一个无线能量收集(EH)节点被用作中继来提高物联网设备的覆盖范围。然而,该中继可能是一个潜在的窃听者,会拦截物联网设备的消息。本文考虑通过无线能量收集不可信中继实现物联网设备(如传感器)与目的地(如控制器)之间安全通信的问题。由于目的地可以配备充足的能量供应,基于功率分割(PS)和时间分割(TS)策略提出了基于目的地辅助干扰的安全方案,分别称为基于PS的直观安全方案(Int-PS)、基于PS的预编码安全方案(Pre-PS)、基于TS的直观安全方案(Int-TS)和基于TS的预编码安全方案(Pre-TS)。通过成功安全传输概率(P_SST)这一指标评估所提方案的安全性能,P_SST表示主用户的干扰约束得到满足且保密率为正的概率。对所提安全方案的P_SST进行了分析,推导了Pre-PS和Pre-TS的P_SST的闭式表达式,并通过仿真结果进行了验证。数值结果表明,在相似功耗下,预编码安全方案的P_SST优于直观安全方案。当基于PS和TS策略的安全方案具有相似的P_SST时,基于TS的安全方案的平均发射功耗更低。还通过仿真讨论了功率分割和时间分割比率的影响。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/9637275bc20a/sensors-17-02023-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/a9219879cc03/sensors-17-02023-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/db1386f1a49e/sensors-17-02023-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/bf6dccb14da3/sensors-17-02023-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/134b7ef32479/sensors-17-02023-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/4cfe4a35535b/sensors-17-02023-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/deda35e05ba7/sensors-17-02023-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/6f3dd9705a8c/sensors-17-02023-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/647a7751b08a/sensors-17-02023-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/0d32e28c0483/sensors-17-02023-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/9637275bc20a/sensors-17-02023-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/a9219879cc03/sensors-17-02023-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/db1386f1a49e/sensors-17-02023-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/bf6dccb14da3/sensors-17-02023-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/134b7ef32479/sensors-17-02023-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/4cfe4a35535b/sensors-17-02023-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/deda35e05ba7/sensors-17-02023-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/6f3dd9705a8c/sensors-17-02023-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/647a7751b08a/sensors-17-02023-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/0d32e28c0483/sensors-17-02023-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/043f/5621061/9637275bc20a/sensors-17-02023-g010.jpg

相似文献

1
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.具有无线能量收集不可信中继的CIoT网络中的安全通信
Sensors (Basel). 2017 Sep 4;17(9):2023. doi: 10.3390/s17092023.
2
RF Energy Harvesting and Information Transmission Based on NOMA for Wireless Powered IoT Relay Systems.基于 NOMA 的用于无线供电物联网中继系统的射频能量收集和信息传输。
Sensors (Basel). 2018 Sep 27;18(10):3254. doi: 10.3390/s18103254.
3
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.CIoT网络中用于安全通信的最坏情况协作干扰
Sensors (Basel). 2016 Mar 7;16(3):339. doi: 10.3390/s16030339.
4
Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks.在非可信中继网络中,用于无线信息和功率同时传输的安全传输方法。
Sensors (Basel). 2018 Dec 26;19(1):76. doi: 10.3390/s19010076.
5
Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays.基于中继的物联网安全通信的稳健迭代分布式最小总均方误差算法。
Sensors (Basel). 2018 Nov 13;18(11):3914. doi: 10.3390/s18113914.
6
Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming.协作 SWIPT NOMA 系统中非线性能量收集和友好干扰下的安全通信。
Sensors (Basel). 2020 Feb 14;20(4):1047. doi: 10.3390/s20041047.
7
Deep Q-Learning-Based Buffer-Aided Relay Selection for Reliable and Secure Communications in Two-Hop Wireless Relay Networks.基于深度 Q 学习的缓冲辅助中继选择在两跳无线中继网络中的可靠和安全通信。
Sensors (Basel). 2023 May 17;23(10):4822. doi: 10.3390/s23104822.
8
NOMA-Assisted Multiple Access Scheme for IoT Deployment: Relay Selection Model and Secrecy Performance Improvement.物联网部署中的 NOMA 辅助多址接入方案:中继选择模型和保密性能改进。
Sensors (Basel). 2019 Feb 12;19(3):736. doi: 10.3390/s19030736.
9
Energy-Efficient Power Allocation and Relay Selection Schemes for Relay-Assisted D2D Communications in 5G Wireless Networks.5G 无线网络中继辅助 D2D 通信中的节能功率分配和中继选择方案。
Sensors (Basel). 2018 Aug 30;18(9):2865. doi: 10.3390/s18092865.
10
Time Switching Based Wireless Powered Relay Transmission with Uplink NOMA.基于时间切换的无线供电中继传输与上行链路非正交多址接入
Sensors (Basel). 2021 Aug 13;21(16):5467. doi: 10.3390/s21165467.

引用本文的文献

1
Secrecy Outage Probability of a NOMA Scheme and Impact Imperfect Channel State Information in Underlay Cooperative Cognitive Networks.NOMA 方案的保密中断概率与非理想信道状态信息对下承认知网络的影响。
Sensors (Basel). 2020 Feb 7;20(3):895. doi: 10.3390/s20030895.
2
Defending Against Randomly Located Eavesdroppers by Establishing a Protecting Region.通过建立保护区域来防御随机位置的窃听者。
Sensors (Basel). 2020 Jan 13;20(2):438. doi: 10.3390/s20020438.
3
Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks.

本文引用的文献

1
Secrecy Performance Analysis of Cognitive Sensor Radio Networks with an EH-Based Eavesdropper.基于能量收集的窃听者的认知传感器无线网络的保密性能分析
Sensors (Basel). 2017 May 4;17(5):1026. doi: 10.3390/s17051026.
2
Optimal Power Allocation of Relay Sensor Node Capable of Energy Harvesting in Cooperative Cognitive Radio Network.协作认知无线电网络中具备能量收集能力的中继传感器节点的最优功率分配
Sensors (Basel). 2017 Mar 21;17(3):648. doi: 10.3390/s17030648.
3
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.
在非可信中继网络中,用于无线信息和功率同时传输的安全传输方法。
Sensors (Basel). 2018 Dec 26;19(1):76. doi: 10.3390/s19010076.
一种基于无线传感器网络的新型安全物联网智能家居自动化系统。
Sensors (Basel). 2016 Dec 30;17(1):69. doi: 10.3390/s17010069.
4
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.面向物联网的传感器网络中能量约束下的安全分布式检测
Sensors (Basel). 2016 Dec 16;16(12):2152. doi: 10.3390/s16122152.
5
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.CIoT网络中用于安全通信的最坏情况协作干扰
Sensors (Basel). 2016 Mar 7;16(3):339. doi: 10.3390/s16030339.