University of Worcester Worcester Research and Publications
 
  USER PANEL:
  ABOUT THE COLLECTION:
  CONTACT DETAILS:

Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers

Ahmed Haider, Sami, Naeem, Muhammad and Zhao, M. (2020) Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers. Computer Communications, 154. pp. 119-128. ISSN 01403664

[img] Text
AAM-with-cover-9195-Ahmed-Haider-optimization-of-secure-wireless-communications-for-IoT-networks-in-the-presence-of-eavesdroppers_merged.pdf - Accepted Version
Restricted to Repository staff only until 18 February 2021.
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (499kB) | Request a copy

Abstract

The problem motivates this paper is that securing the critical data of 5G based wireless IoT network is of significant importance. Wireless 5G IoT systems consist of a large number of devices (low-cost legitimate users), which are of low complexity and under strict energy constraints. Physical layer security (PLS) schemes, along with energy harvesting, have emerged as a potential candidate that provides an effective solution to address this issue. During the data collection process of IoT, PHY security techniques can exploit the characteristics of the wireless channel to ensure secure communication. This paper focuses on optimizing the secrecy rate for simultaneous wireless information and power transfer (SWIPT) IoT system, considering that the malicious eavesdroppers can intercept the data. In particular, the main aim is to optimize the secrecy rate of the system under signal to interference noise ratio (SINR), energy harvesting (EH), and total transmits power constraints. We model our design as an optimization problem that advocates the use of additional noise to ensure secure communication and guarantees efficient wireless energy transfer. The primary problem is non-convex due to complex objective functions in terms of transmit beamforming matrix and power splitting ratios. We have considered both the perfect channel state information (CSI) and the imperfect CSI scenarios. To circumvent the non-convexity of the primary problem in perfect CSI case, we proposed a solution based on the concave-convex procedure (CCCP) iterative algorithm, which results in a maximum local solution for the secrecy rate. In the imperfect CSI scenario, we facilitate the use of S-procedure and present a solution based on the iterative successive convex approximation (SCA) approach. Simulation results present the validations of the proposed algorithms. The results provide an insightful view that the proposed iterative method based on the CCCP algorithm achieves higher secrecy rates and lower computational complexity in comparison to the other algorithms.

Item Type: Article
Additional Information:

The full-text cannot be supplied for this item. Please check availability with your local library or Interlibrary Requests Service.

Uncontrolled Discrete Keywords: optimization, secure wireless communications, IoT, eavesdroppers, 5G, physical layer security, PLS
Subjects: T Technology > T Technology (General)
Divisions: College of Business, Psychology and Sport > Worcester Business School
Related URLs:
SWORD Depositor: Prof. Pub Router
Depositing User: Sami Ahmed Haider
Date Deposited: 24 Feb 2020 12:20
Last Modified: 17 Jun 2020 17:34
URI: https://eprints.worc.ac.uk/id/eprint/9195

Actions (login required)

View Item View Item
 
     
Worcester Research and Publications is powered by EPrints 3 which is developed by the School of Electronics and Computer Science at the University of Southampton. More information and software credits.