Skip to main content
Log in

Clustering and power allocation for secured access to simultaneous transmissions and sensing Internet of Things networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The security of wireless access is studied for the integrated wireless communications and sensing in 6G Internet of Everything networks. The scaling law of the secured communications and that of the secured sensing are theoretically derived in closed form with respect to the number of the transmit nodes in the same transmit clustering. The energy efficiency of the secured communications is also theoretically analyzed. It is discovered that the gain from additional transmit nodes benefits both secured communication and secured sensing, yet the factors of these two gain scale in different coefficients. The methodology for the theoretical analysis is the statistical derivation approach. Moreover, the transmit power and the number of the transmit nodes for the cluster are jointly optimized to the global optimum in the analytical expression by either maximizing the secured ergodic throughput or maximizing the secured ergodic energy efficiency under the same constraint of the sensing required quality. Two algorithms are finally developed to jointly solve these two problems with the guaranteed convergence. Numerical simulations verify the performances of our derived results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availibility

No datasets were generated or analysed during the current study.

References

  1. Daza, L., & Misra, S. (2017). Beyond the internet of things: Everything interconnected: technology, communications and computing. IEEE Wireless Communications, 24(6), 10–11.

    Article  Google Scholar 

  2. Dai, Y., Guan, Y. L., Leung, K. K., & Zhang, Y. (2021). Reconfigurable intelligent surface for low-latency edge computing in 6G. IEEE Wireless Communications, 28(6), 72–79.

    Article  Google Scholar 

  3. Mohanty, S. P. (2020). Security and privacy by design is key in the internet of everything (IoE) era. IEEE Consumer Electronics Magazine, 9(2), 4–5.

    Article  Google Scholar 

  4. Sah, D. K., Poongodi, M., Donta, P. K., Hamdi, M., Cengiz, K., Kamruzzaman, M. M., & Rauf, H. T. (2022). Secured wireless energy transfer for the internet of everything in ambient intelligent environments. IEEE Internet of Things Magazine, 5(1), 62–66.

    Article  Google Scholar 

  5. Wu, X.-W., & Jolfaei, A. (2020). Securing the internet of everything through adaptive and resource-efficient mechanisms. IEEE Internet of Things Magazine, 3(4), 16–19.

    Article  Google Scholar 

  6. Hu, J., Zhang, H., Di, B., Bian, K., & Song, L. (2022). Meta-IoT: Simultaneous sensing and transmission by meta-material sensor-based internet of things. IEEE Communications Surveys & Tutorials, 21(8), 6048–6063.

    Google Scholar 

  7. Wu, K., Zhang, J. A., Huang, X., & Guo, Y. J. (2023). OTFS-based joint communication and sensing for future industrial IoT. IEEE Internet of Things Journal, 10(3), 1973–1989.

    Article  Google Scholar 

  8. Han, Y., Wang, L., Xu, L., Zhu, W., Zhang, Y., & Fei, A. (2023). Pilot optimization for OFDM-based ISAC signal in emergency IoT networks. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2023.3314057

    Article  Google Scholar 

  9. Liu, M., Yang, M., Wei, F., Li, H., Zhang, Z., Nallanathan, A., & Hanzo, L. (2024). A non-orthogonal uplink/downlink IoT solution for next-generation ISAC systems. IEEE Internet of Things Journal, 11(5), 8224–8239.

    Article  Google Scholar 

  10. Ma, L., Lu, J., Gu, C., & Mao, J. (2023). A wideband dual-circularly polarized, simultaneous transmit and receive (STAR) antenna array for integrated sensing and communication in IoT. IEEE Internet of Things Journal, 10(7), 6367–6376.

    Article  Google Scholar 

  11. Xu, W., Zhang, Z., Song, H., Liu, S., Feng, Y., & Liu, B. (2023). ISAC: In-switch approximate cache for IoT object detection and recognition. In IEEE INFOCOM 2023-IEEE conference on computer communications. IEEE, pp. 1–10.

  12. Asheralieva, A., & Niyato, D. (2022). Optimizing age of information and security of the next-generation internet of everything systems. IEEE Internet of Things Journal, 9(20), 20331–20351.

    Article  Google Scholar 

  13. Wang, Z., Wang, S., Bhuiyan, M. Z. A., Xu, J., & Hu, Y. (2023). Cooperative location-sensing network based on vehicular communication security against attacks. IEEE Transactions on Intelligent Transportation Systems, 24(1), 942–952.

    Article  Google Scholar 

  14. Ahmadipour, M., Wigger, M., & Shamai, S. (2023). Integrated communication and receiver sensing with security constraints on message and state. In 2023 IEEE international symposium on information theory (ISIT). IEEE, pp. 2738-2743.

  15. Jia, H., Li, X., & Ma, L. (2023). Physical layer security optimization with Cramér-Rao bound Metric in ISAC systems under sensing-specific imperfect CSI model. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2023.3347527

    Article  Google Scholar 

  16. Su, N., Liu, F., & Masouros, C. (2023). Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security. IEEE Transactions on Wireless Communications. https://doi.org/10.1109/TWC.2023.3306029

    Article  Google Scholar 

  17. Furqan, H. M., Solaija, M. S. J., Türkmen, H., & Arslan, H. (2021). Wireless communication, sensing, and REM: A security perspective. IEEE Open Journal of the Communications Society, 2, 287–321.

    Article  Google Scholar 

  18. Sun, W., Sun, S., Su, X., & Liu, R. (2023). Security-ensured integrated sensing and communication (ISAC) systems enabled by phase-coupled intelligent omni-surfaces (IOS). IEEE Transactions on Wireless Communications. https://doi.org/10.1109/TWC.2023.3308973

    Article  Google Scholar 

  19. Xing, Z., Wang, R., & Yuan, X. (2023). Reconfigurable intelligent surface aided physical-layer security enhancement in integrated sensing and communication systems. IEEE Transactions on Wireless Communications. https://doi.org/10.1109/TVT.2023.3329992

    Article  Google Scholar 

  20. Mukherjee, A. (2015). Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proceedings of the IEEE, 103(10), 1747–1761.

    Article  Google Scholar 

  21. Dai, Y., Zhao, J., Zhang, J., Zhang, Y., & Jiang, T. (2024). Federated deep reinforcement learning for task offloading in digital twin edge networks. IEEE Transactions on Network Science and Engineering. https://doi.org/10.1109/TNSE.2024.3350710

    Article  Google Scholar 

  22. Dai, Y., Zhang, K., Maharjan, S., & Zhang, Y. (2021). Deep reinforcement learning for stochastic computation offloading in digital twin networks. IEEE Transactions on Industrial Informatics, 17(7), 4968–4977.

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported in part by Jiangsu Province High Level “333” Program (0401206044), National Natural Science Foundation of China under Grant No. 62272242.

Author information

Authors and Affiliations

Authors

Contributions

J. Z. has made substantial contributions to the conception or design of the work. H. D. is responsible for analysis and interpretation of data for the work. X. X. revised it for fixing the final version of the whole paper. H. Y. is highly involved in the numerical simulations. Z. Z. is responsible for the induction and the references exploration. All authors reviewed the manuscript.

Corresponding author

Correspondence to Juan Zhao.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, J., Dai, H., Xu, X. et al. Clustering and power allocation for secured access to simultaneous transmissions and sensing Internet of Things networks. Wireless Netw (2024). https://doi.org/10.1007/s11276-024-03756-8

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-024-03756-8

Keywords

Navigation