On secure wireless communications for IoT under eavesdropper collusion
Article
Article Title | On secure wireless communications for IoT under eavesdropper collusion |
---|---|
ERA Journal ID | 30198 |
Article Category | Article |
Authors | Zhang, Yuanyu (Author), Shen, Yulong (Author), Wang, Hua (Author), Yong, Jianming (Author) and Jiang, Xiaohong (Author) |
Journal Title | IEEE Transactions on Automation Science and Engineering |
Journal Citation | 13 (3), pp. 1281-1293 |
Number of Pages | 13 |
Year | 2016 |
Place of Publication | United States |
ISSN | 1042-296X |
1545-5955 | |
1558-3783 | |
Digital Object Identifier (DOI) | https://doi.org/10.1109/TASE.2015.2497663 |
Web Address (URL) | https://ieeexplore.ieee.org/document/7350251 |
Abstract | Wireless communication is one of the key technologies that actualize the Internet of Things (IoT) concept into the real world. Understanding the security performance of wireless communications lays the foundation for the security management of IoT. Eavesdropper collusion represents a significant threat to wireless communication security, while physical-layer security serves as a promising approach to providing a strong form of security guarantee. This paper studies the important secrecy outage performance of wireless communications under eavesdropper collusion, where the physical layer security is adopted to counteract such attack. Based on the classical Probability Theory, we first conduct analysis on the secrecy outage of the simple noncolluding case in which eavesdroppers do not collude and operate independently. For the secrecy outage analysis of the more hazardous M-colluding scenario, where any M eavesdroppers can combine their observations to decode the message, the techniques of Laplace transform, keyhole contour integral, and Cauchy Integral Theorem are jointly adopted to work around the highly cumbersome multifold convolution problem involved in such analysis, such that the related signal-to-interference ratio modeling for all colluding eavesdroppers can be conducted and thus the corresponding secrecy outage probability can be analytically determined. Finally, simulation and numerical results are provided to illustrate our theoretical achievements. An interesting observation suggests that the SOP increases first superlinearly and then sublinearly with M. |
Keywords | eavesdropper collusion; Internet of Things (IoT);physical layer security; secrecy outage performance; wireless communication |
ANZSRC Field of Research 2020 | 460507. Information extraction and fusion |
Public Notes | Files associated with this item cannot be displayed due to copyright restrictions. |
Byline Affiliations | Future University Hakodate, Japan |
Xidian University, China | |
Victoria University | |
School of Management and Enterprise | |
Institution of Origin | University of Southern Queensland |
https://research.usq.edu.au/item/q38q9/on-secure-wireless-communications-for-iot-under-eavesdropper-collusion
1753
total views8
total downloads4
views this month0
downloads this month