SwePub
Sök i LIBRIS databas

  Utökad sökning

WFRF:(Tran Nhan)
 

Sökning: WFRF:(Tran Nhan) > Secrecy Performance...

Secrecy Performance in the Internet of Things : Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers

Nhan Vo, Van (författare)
International School, Duy Tan University, Vietnam
Nguyen, Gia Tri (författare)
International School, Duy Tan University, Vietnam
So-In, Chakchai (författare)
Khon Kaen University, Khon Kaen, Thailand
visa fler...
Tran, Hung (författare)
Mälardalens högskola,Inbyggda system,Nguyen Tat Thanh University, Vietnam
Surasak, Sanguanpong (författare)
Kasetsart University, Bangkok, Thailand
visa färre...
 (creator_code:org_t)
2019-02-05
2020
Engelska.
Ingår i: Software, practice & experience. - Sweden : Springer. - 0038-0644 .- 1097-024X. ; 25:1, s. 193-210
  • Tidskriftsartikel (refereegranskat)
Abstract Ämnesord
Stäng  
  • In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.

Ämnesord

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Datorsystem (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Computer Systems (hsv//eng)

Publikations- och innehållstyp

ref (ämneskategori)
art (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy