Secure Internet-of-Things Communications: Joint Precoding and Power Control

In this paper, we consider a downlink internet-of-things (IoT) multiple-input multiple-output (MIMO) network wherein an access point (AP), multiple IoT users, and a single eavesdropper coexist. The eavesdropper attempts to wiretap confidential messages of the IoT users. In the considered system, we solve a sum secrecy rate maximization problem in the finite blocklength (FBL) regime. Due to the FBL, the secrecy rate has a back-off factor with respect to blocklength, decoding error probability, and information leakage, which makes the problem more challenging. The main challenges are: i) the problem is not tractable because of the back-off factor, ii) an objective function is inherently non-convex, and iii) information leakage by the eavesdropper needs to be considered. To address these difficulties, we first obtain a lower bound of the secrecy rate and transform the problem into a product of Rayleigh quotients form. Then, we derive a first-order Karush–Kuhn–Tucker (KKT) condition to find a local optimal solution and interpret the condition as a generalized eigenvalue problem. Consequently, we develop a low-complexity algorithm by adopting a generalized power iteration-based (GPI) method. Via simulations, we validate the secrecy rate performance of the proposed method for the short-packet IoT communication systems.

[1]  Jinseok Choi,et al.  MIMO Design for Internet of Things: Joint Optimization of Spectral Efficiency and Error Probability in Finite Blocklength Regime , 2021, IEEE Internet of Things Journal.

[2]  Chen Feng,et al.  Secure Short-Packet Communications at the Physical Layer for 5G and Beyond , 2021, IEEE Communications Standards Magazine.

[3]  Bingli Jiao,et al.  Secrecy Throughput in Full-Duplex Multiuser MIMO Short-Packet Communications , 2021, IEEE Wireless Communications Letters.

[4]  Yansha Deng,et al.  Resource Allocation for Secure URLLC in Mission-Critical IoT Scenarios , 2019, IEEE Transactions on Communications.

[5]  Vahid Jamali,et al.  Resource Allocation for Multi-User Downlink MISO OFDMA-URLLC Systems , 2019, IEEE Transactions on Communications.

[6]  Xianbin Wang,et al.  Secure Transmission via Joint Precoding Optimization for Downlink MISO NOMA , 2019, IEEE Transactions on Vehicular Technology.

[7]  Alireza Ghasempour,et al.  Internet of Things in Smart Grid: Architecture, Applications, Services, Key Technologies, and Challenges , 2019, Inventions.

[8]  H. Vincent Poor,et al.  Secure Short-Packet Communications for Mission-Critical IoT Applications , 2019, IEEE Transactions on Wireless Communications.

[9]  Giuseppe Caire,et al.  Joint User Selection, Power Allocation, and Precoding Design With Imperfect CSIT for Multi-Cell MU-MIMO Downlink Systems , 2019, IEEE Transactions on Wireless Communications.

[10]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[11]  Mikael Skoglund,et al.  Delay Performance of the Multiuser MISO Downlink Under Imperfect CSI and Finite-Length Coding , 2018, IEEE Journal on Selected Areas in Communications.

[12]  Qian Liu,et al.  Secure Beamformer Designs in MU-MIMO Systems With Multiuser Interference Exploitation , 2018, IEEE Transactions on Vehicular Technology.

[13]  Babak D. Beheshti,et al.  A survey of cryptographic algorithms for IoT devices , 2018, 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[14]  Li Sun,et al.  Physical layer security with its applications in 5G networks: A review , 2017, China Communications.

[15]  H. Vincent Poor,et al.  Wiretap Channels: Nonasymptotic Fundamental Limits , 2017, IEEE Transactions on Information Theory.

[16]  Andreas Mitschele-Thiel,et al.  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture , 2017, IEEE Communications Magazine.

[17]  H. Vincent Poor,et al.  Finite-blocklength bounds for wiretap channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[18]  Abdelmadjid Bouabdallah,et al.  M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.

[19]  Vincent Y. F. Tan,et al.  The dispersion of nearest-neighbor decoding for additive non-Gaussian channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[20]  Petar Popovski,et al.  Towards Massive, Ultra-Reliable, and Low-Latency Wireless Communication with Short Packets , 2015 .

[21]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[22]  Giuseppe Durisi,et al.  Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength , 2013, IEEE Transactions on Information Theory.

[23]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[24]  Giuseppe Caire,et al.  Joint Spatial Division and Multiplexing—The Large-Scale Array Regime , 2012, IEEE Transactions on Information Theory.

[25]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[26]  S. Verdú,et al.  Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.