Skip to main content

Advertisement

Log in

Physical layer security for IoT over Nakagami-m and mixed Rayleigh–Nakagami-m fading channels

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is a new para-digm for achieving ubiquitous connectivity by enormously deploying physical objects like sensors, actuators, and controllers. Wireless communication is one of the main enabling technologies that make the IoT a reality. However, due to the open nature of wireless communication and constraints on energy consumption, this raises concerns about the security of the IoT. Eavesdropping is a major threat to the wireless communications security. To counteract such an attack, physical layer security is among the promising solutions. The aim of this work is to evaluate the secrecy performance of two-hop wireless communication systems. This evaluation is done in the presence of potential eavesdropping threats over Nakagami-m and mixed Rayleigh–Nakagami-m fading channels. To enhance the security of the system, the use of cooperative jamming and opportunistic relaying has been considered. In particular, based on classical probability theory, we first analyze the secrecy outage performance for scenario 1, where all channels (S-R, R-D, R-R, S-E, R-E) experience Nakagami-m fading. Then, we examine the secrecy performance for scenario 2, where the channel coefficients for links (S-R, R-D, S-E, R-E) are subject to Nakagami-m fading and the channel coefficients for the link (R-R) follow Rayleigh fading. Finally, simulation and numerical results are presented to validate our theoretical achievements. The results suggest that as the fading parameter m increases, the probability of secrecy outages decreases, leading to an improvement in the security performance of the wireless IoT data collection process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Zanella, A., et al. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 22–32.

    Article  Google Scholar 

  2. Akpakwu, G. A., et al. (2018). A survey on 5G networks for the internet of things: Communication technologies and challenges. IEEE Access, 6, 3619–3647.

    Article  Google Scholar 

  3. Wang, H. M., & Xia, X.-G. (2015). Enhancing wireless secrecy via cooperation: Signal design and optimization. IEEE Communications Magazine, 53(12), 47–53.

    Article  Google Scholar 

  4. Koyluoglu, O. O., & El Gamal, H. (2012). Polar coding for secure transmission and key agreement. IEEE Transactions on Information Forensics and Security, 7(5), 1472–1483.

    Article  Google Scholar 

  5. Atzori, L., Iera, A., et al. (2010). The internet of things: A survey. Computer networks, 54(15), 2787–2805.

    Article  MATH  Google Scholar 

  6. Mousavi, S. K., et al. (2021). Security of internet of things based on cryptographic algorithms: A survey. Wireless Networks, 27(2), 1515–1555.

    Article  Google Scholar 

  7. Gao, H., Qiu, B., Barroso, R., Duranm J., Hussain, W., Xu, Y., & Wang, X. (2022). TSMAE: A novel anomaly detection approach for Internet of Things time series data using memory-augmented autoencoder. IEEE Transactions on Network Science and Engineering.PP. 1-1.

  8. Bloch, M., et al. (2012). Special issue on physical-layer security. Journal of Communications and Networks, 14(4), 349–351.

    Article  Google Scholar 

  9. Mathur, S., et al. (2010). Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks]. IEEE Wireless Communications, 17(5), 63–70.

    Article  Google Scholar 

  10. Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.

    Article  MathSciNet  MATH  Google Scholar 

  11. Bloch, M., et al. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.

    Article  MathSciNet  MATH  Google Scholar 

  12. Cai, C., Cai, Y., Zhou, X., Yang, W., & Yang, W. (2014). When does relay transmission give a more secure connection in wireless ad hoc networks? IEEE Transactions on Information Forensics and Security, 9(4), 624–632.

    Article  Google Scholar 

  13. Lei, H., Gao, C., Guo, Y., & Pan, G. (2015). On physical layer security over generalized gamma fading channels. IEEE Communications Letters, 19(7), 1257–1260.

    Article  Google Scholar 

  14. Mathur, A., Ai, Y., Bhatnagar, M. R., Cheffena, M., & Ohtsuki, T. (2018). On physical layer security of \(\alpha -\eta -\kappa -\mu\) fading channels. IEEE Communications Letters, 22(10), 2168–2171.

    Article  Google Scholar 

  15. Pandey, A., & Yadav, S. (2018). Physical layer security in cooperative AF relaying networks with direct links over mixed Rayleigh and double-Rayleigh fading channels. IEEE Transactions on Vehicular Technology, 67(11), 10615–10630.

    Article  Google Scholar 

  16. Si, J., Li, Z., Cheng, J., & Zhong, C. (2019). Secrecy performance of multi-antenna wiretap channels with diversity combining over correlated Rayleigh fading channels. IEEE Transactions on Wireless Communications, 18(1), 444–458.

    Article  Google Scholar 

  17. Tang, J., et al. (2020). On the security-reliability and secrecy throughput of random mobile user in internet of things. IEEE Internet of Things Journal, 7(10), 10635–10649.

    Article  Google Scholar 

  18. Lei, H., et al. (2020). Safeguarding UAV IoT communication systems against randomly located eavesdroppers. IEEE Internet of Things Journal, 7(2), 1230–1244.

    Article  Google Scholar 

  19. Lee, D. (2021). Secrecy analysis of relay-user selection in AS-AF systems over Nakagami fading channels. IEEE Transactions on Vehicular Technology, 70(3), 2378–2388.

    Article  Google Scholar 

  20. Gao, H., Liu, C., Yin, Y., Xu, Y., & Li, Y. (2022). A hybrid approach to trust node assessment and management for VANETs cooperative data communication: Historical interaction perspective. IEEE Transactions on Intelligent Transportation Systems, 23(9), 16504–16513.

    Article  Google Scholar 

  21. Lee, D. (2022). The impact of channel imperfection and multiple eavesdroppers on security of dual-signal selection in AF-relay systems. Wireless Networks, 28(4), 1531–1540.

    Article  Google Scholar 

  22. Gao, H., Liu, C., Li, Y., & Yang, X. (2021). V2VR: Reliable hybrid-network-oriented V2V data transmission and routing considering RSUs and connectivity probability. IEEE Transactions on Intelligent Transportation Systems, 22(6), 3533–3546.

    Article  Google Scholar 

  23. Dongo, I., et al. (2021). A qualitative and quantitative comparison between Web scraping and API methods for Twitter credibility analysis. International Journal of Web Information Systems, 17(6), 580–606.

    Article  Google Scholar 

  24. Dhanani, J., Mehta, R., & Rana, D. P. (2021). Legal document recommendation system: A dictionary based approach. International Journal of Web Information Systems, 17(3), 187–203.

    Article  Google Scholar 

  25. Zhang, X., Wang, W., & Ji, X. (2009). Multiuser diversity in multiuser two-hop cooperative relay wireless networks: System model and performance analysis. IEEE Transactions on Vehicular Technology, 58(2), 1031–1036.

    Article  Google Scholar 

  26. Ram, M. C. (2004). Ad hoc wireless networks: Architectures and protocols .... Portable Documents, Pearson Education.

  27. Lin, Z., et al. (2016). Opportunistic relaying and jamming with robust design in hybrid full/half-duplex relay system. EURASIP Journal on Wireless Communications and Networking, 2016(1), 1–10.

    Article  Google Scholar 

  28. Zheng, G., Choo, L., & Wong, K. (2011). Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing, 59(3), 1317–1322.

    Article  MathSciNet  MATH  Google Scholar 

  29. Zwillinger, D., & Jeffrey, A. (Eds.). (2007). Table of integrals, series, and products. Amsterdam: Elsevier.

    Google Scholar 

  30. Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for IoT under eavesdropper collusion. IEEE Transactions on Automation Science and Engineering, 13(3), 1281–1293.

    Article  Google Scholar 

Download references

Funding

No funds, grants, or other support was received.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parmila Devi.

Ethics declarations

Conflict of interest

Authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A: Proof of Lemma 2

Appendix A: Proof of Lemma 2

From the definition of event B, we can write

$$\begin{aligned} \begin{aligned} p_{{B|J^{n}_{1}}} = P(\delta _{S,R_{c}}<\alpha |J^{n}_{1}).\\ \end{aligned} \end{aligned}$$
(27)

In this scenario 2, the channel coefficients \(|h_{i,j}|^{2}\) for (S-R, R-D, S-E, R-E) are Gamma distributed, whereas the channel coefficients \(|h_{i,j}|^{2}\) for (R-R) are exponentially distributed. Therefore, the cdf, i.e., \(P (V_{j} \le V_{i})\) in (8), will also be exponentially distributed. By following the same procedure as for scenario 1, \(P(|h_{S,R_{c}}|^{2}<z)\) in (8), becomes equal to \(\int _{0}^{\infty }uP\Big (\vert h_{S,R_{i}}\vert ^{2}<z, V_{i}=t\Big ) (1-e^{-2t})^{u-1}dt\) for scenario 2. Now, by applying the total probability law, we obtain

$$\begin{aligned} \begin{aligned}&P(|h_{S,R_{c}}|^{2}<z)\\&\quad = \int _{0}^{z}u\varGamma (m,t)(2\varGamma (m,t)-\varGamma (m,z))(1-e^{-2t})^{u-1}dt,\\&\quad =2u\int _{0}^{z}\Big (e^{-t}\sum _{k=0}^{m-1}\dfrac{t^{k}}{k!}\Big )^{2}(1-e^{-2t})^{u-1}dt-u\varGamma (m,z)\\&\qquad \times \int _{0}^{z}e^{-t}\sum _{k_{3}=0}^{m-1}\dfrac{t^{k_{3}}}{k_{3}!}(1-e^{-2t})^{u-1}dt,\\&\quad =2u\sum _{r=0}^{u-1}\sum _{k_{1}=0}^{m-1}\sum _{k_{2}=0}^{m-1}\left( {\begin{array}{c}u-1\\ r\end{array}}\right) (-1)^{r}\int _{0}^{z}e^{-2t(r+1)}\dfrac{t^{k_{1}+k_{2}}}{k_{1}!k_{2}!}dt\\&\qquad -u\varGamma (m,z)\sum _{r=0}^{u-1}\sum _{k_{3}=0}^{m-1}\left( {\begin{array}{c}u-1\\ r\end{array}}\right) (-1)^{r}\int _{0}^{z}e^{-t(2r+1)}\dfrac{t^{k_{3}}}{k_{3}!}dt,\\&\quad =2u\sum _{r=0}^{u-1}\left( {\begin{array}{c}u-1\\ r\end{array}}\right) (-1)^{r}\Bigg [\sum _{k_{1}=0}^{m-1}\sum _{k_{2}=0}^{m-1}\sum _{k_{5}=0}^{k_{1}+k_{2}}\Big [\dfrac{1}{k_{1}!k_{2}!}\\&\qquad \times \dfrac{(k_{1}+k_{2})!}{(2(r+1))^{k_{1}+k_{2}+1}}-e^{-2(r+1)z}\\&\qquad \times \dfrac{(k_{1}+k_{2})!z^{k_{5}}}{{k_{1}!k_{2}!k_{5}!(2(r+1))^{k_{1}+k_{2}+1-k_{5}}}}\Big ]-\sum _{k_{3}=0}^{m-1}\sum _{k_{4}=0}^{m-1}\sum _{k_{6}=0}^{k_{3}}\\&\qquad \times \Big [\dfrac{e^{-z}z^{k_{4}}}{k_{4}!(2r+1)^{k_{3}+1}}-e^{-2(r+1)z} \dfrac{z^{k_{6}+k_{4}}}{k_{6}!k_{4}!(2r+1)^{k_{3}+1-k_{6}}}\Big ]\Bigg ].\\ \end{aligned} \end{aligned}$$
(27)

After substituting \(z = \alpha \sum \limits _{j\in \mathcal {J}}|h_{R_{j},R_{c}}|^{2}|J^{n}_{1}\) in (29), rearranging and taking expectation by using the pdf of \(|h_{R_{j},R_{c}}|^{2}\) for any \(j\in \mathcal {J}\) given below, Lemma 2 follows.

$$\begin{aligned} \begin{aligned} f_{|h_{R_{j},R_{c}}|^{2}}(z)= {\left\{ \begin{array}{ll} \frac{z^{m-1}e^{-z}}{\varGamma m(1-e^{-\sigma })},&{} 0\le z< \sigma \\ 0,&{} z\ge \sigma . \,\,\blacksquare \end{array}\right. } \end{aligned} \end{aligned}$$
(28)

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Devi, P., Bharti, M.R. Physical layer security for IoT over Nakagami-m and mixed Rayleigh–Nakagami-m fading channels. Wireless Netw 29, 3479–3491 (2023). https://doi.org/10.1007/s11276-023-03422-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-023-03422-5

Keywords

Navigation