Physical layer security in IoT: A spatial-temporal perspective

Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we set up a secure analytical framework for IoT networks to characterize the network delay performance and secrecy performance. Firstly, stochastic geometry and queueing theory are adopted to model the location of IoT devices and the temporal arrival of packets. Based on this model, a low-complexity secure on-off scheme is proposed to improve the network performance. Then, the delay performance and secrecy performance are evaluated in terms of packet delay and packet secrecy outage probability. It is demonstrated that the intensity of IoT devices arouse a tradeoff between the delay and security and the secure on-off scheme can improve the network delay performance and secrecy performance. Moreover, secrecy transmission rate is adopted to reflect the delay-security tradeoff. The analytical and simulation results show the effects of intensity of IoT devices and secure on-off scheme on the network delay performance and secrecy performance.

[1]  Vincent K. N. Lau,et al.  Artificial Noise Injection for Securing Single-Antenna Systems , 2017, IEEE Transactions on Vehicular Technology.

[2]  T. Mattfeldt Stochastic Geometry and Its Applications , 1996 .

[3]  Attahiru S. Alfa,et al.  Applied Discrete-Time Queues , 2015 .

[4]  Jeffrey G. Andrews,et al.  Heterogeneous Cellular Networks with Flexible Cell Association: A Comprehensive Downlink SINR Analysis , 2011, IEEE Transactions on Wireless Communications.

[5]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[6]  Mohamed-Slim Alouini,et al.  Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis , 2016, IEEE Transactions on Communications.

[7]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Anthony Ephremides,et al.  On the stability of interacting queues in a multiple-access system , 1988, IEEE Trans. Inf. Theory.

[9]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[10]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[12]  Shi Jin,et al.  On the Secure Spectral-Energy Efficiency Tradeoff in Random Cognitive Radio Networks , 2016, IEEE Journal on Selected Areas in Communications.

[13]  Xingqin Lin,et al.  A Primer on 3GPP Narrowband Internet of Things , 2016, IEEE Communications Magazine.

[14]  Xiaohu Ge,et al.  Heterogeneous Cellular Networks With Spatio-Temporal Traffic: Delay Analysis and Scheduling , 2016, IEEE Journal on Selected Areas in Communications.

[15]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[16]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.