| Literature DB >> 30518061 |
Ping Xie1, Ling Xing2, Honghai Wu3, Jung Taek Seo4, Ilsun You5.
Abstract
Smart homes can improve the quality of life and be implemented by Internet of Things (IoT) technologies. However, security is a very important issue in smart homes. For this reason, we propose a secrecy transmission protocol for primary user (PU) by selecting friendly jammer in cognitive IoT model. In particular, a secondary transmitter (ST) is selected to transmit secondary signals by the PU's frequency spectrum, while another ST is chosen to transmit artificial noise to protect the transmission confidentiality of the PU against eavesdropping. Moreover, two selection schemes are presented to confirm the former and the latter ST, and the goal is to optimize the secondary transmission performance and the primary security performance, respectively. For the non-security model and the proposed protocol, we derive the closed-form expressions of the intercept probability and the outage probability for the PU. We also obtain the closed-form expression of outage probability for the secondary user. The numerical results show that the security performance of the PU is significantly enhanced in our protocol compared to the non-security model. In addition, the outage performance of the secondary users is also improved in high secondary transmit SNR region.Entities:
Keywords: aided opportunistic jamming; artificial noise; cognitive Internet of things; intercept probability; physical layer security
Year: 2018 PMID: 30518061 PMCID: PMC6308576 DOI: 10.3390/s18124257
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The system models.
Figure 2The outage probabilities of primary users versus with different K values.
Figure 3The outage probability of secondary system versus in the two protocols with different K values.
Figure 4The intercept probabilities of primary users versus with different K values.
Figure 5The intercept probabilities of primary users versus with different values.
Figure 6The intercept probabilities of primary users versus with different values.
Figure 7The intercept probabilities of primary users versus with different values.