kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Time Allocation and Mode Selection for Secure Communications in Internet of Things
Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China..
Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China..
Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Peoples R China..
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering. KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0002-5407-0835
2022 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 9, no 5, p. 3743-3755Article in journal (Refereed) Published
Abstract [en]

A joint optimization scheme of both time allocation and mode selection is proposed for defending smart jammer in the Internet of Things (IoT). Specifically, we employ multiple modes to deal with the potential eavesdropping and jamming attacks in wireless sensor networks (WSNs), respectively, as wireless-powered relaying (WPR), ambient backscatter relaying (ABR), friendly jamming (FJ) modes. Assuming a specific frame structure, time allocation between energy harvesting and transmission duration is first optimized for three modes based on transmission and security data maximization. In addition, considering that a single mode may fail to guarantee the performance demand due to the uncertainty of network conditions and adversary attacks, mode selection is carried out for adapting characteristics of different modes. Moreover, according to the available knowledge of jamming detection, for enhancing the robustness in secure transmission, the process of mode selection is further divided into two phases. Specifically, game theory is also utilized to achieve the Nash equilibrium for mode selection. Finally, numerical results verify the effects and exhibit the advantages of the proposed scheme.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2022. Vol. 9, no 5, p. 3743-3755
Keywords [en]
Jamming, Security, Resource management, Internet of Things, Eavesdropping, Backscatter, Wireless sensor networks, Ambient backscatter, friendly jamming (FJ), secure communications, wireless-powered relaying (WPR)
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-310205DOI: 10.1109/JIOT.2021.3100884ISI: 000761217100049Scopus ID: 2-s2.0-85112648969OAI: oai:DiVA.org:kth-310205DiVA, id: diva2:1648335
Note

QC 20220330

Available from: 2022-03-30 Created: 2022-03-30 Last updated: 2022-06-25Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Xiao, Ming

Search in DiVA

By author/editor
Xiao, Ming
By organisation
Information Science and EngineeringACCESS Linnaeus Centre
In the same journal
IEEE Internet of Things Journal
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 41 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf