Research on Secure Transmission Performance of Electric Vehicles Under Nakagami-m Channel

This article studies the confidential transmission performance of an electric vehicle (EV) in heterogeneous network when it communicates with vehicle to grid (V2G). Based on the relay selection strategy that maximizes the signal-to-noise ratio(SNR), the electric vehicle as a legitimate user in this article uses a multi-antenna maximum ratio combining method for signal reception. Among them, a single antenna is configured for the power grid sender, relay nodes and illegal eavesdropping users. The wireless channel adopts Nakagami- ${m}$ fading channel and the relay adopts decode and forward (DF) method. First, based on the stochastic geometric analysis method, statistical characteristics such as probability density function(PDF) and cumulative distribution function(CDF) of the received SNR are obtained at legitimate users and illegal eavesdropping users, respectively. Then, a functional analysis method is used to derive closed expressions for the secrecy outage probability (SOP) and non-zero security capacity probability in multi-eavesdropping user systems. Finally, the effects of the system’s related parameters on SOP and non-zero security capacity probability are verified through simulations. The simulation results prove the correctness of the theoretical analysis, which can guarantee the privacy and security of electric vehicle users in heterogeneous network.

[1]  Honghao Gao,et al.  V2VR: Reliable Hybrid-Network-Oriented V2V Data Transmission and Routing Considering RSUs and Connectivity Probability , 2020, IEEE Transactions on Intelligent Transportation Systems.

[2]  Miaowen Wen,et al.  MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X , 2019, IEEE Communications Magazine.

[3]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[4]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[5]  Lajos Hanzo,et al.  Vehicular Sensing Networks in a Smart City: Principles, Technologies and Applications , 2018, IEEE Wireless Communications.

[6]  Jishun Li,et al.  An Efficient Data Collection Protocol Based on Multihop Routing and Single-Node Cooperation in Wireless Sensor Networks , 2014, J. Sensors.

[7]  Hong Wen,et al.  Joint optimization for ambient backscatter communication system with energy harvesting for IoT , 2020 .

[8]  Jiangtao Fu,et al.  Hierarchical Model Predictive Control for Parallel Hybrid Electrical Vehicles , 2018 .

[9]  Mohamed-Slim Alouini,et al.  On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks Over Nakagami- $m$ Fading Channels , 2017, IEEE Transactions on Cognitive Communications and Networking.

[10]  Ashok Kumar,et al.  Secrecy outage performance analysis of MIMO underlay cognitive radio networks with delayed CSI and transmitter antenna selection , 2019, International Journal of Communication Systems.

[11]  Qiang Li,et al.  Neural Networks-Aided Insider Attack Detection for the Average Consensus Algorithm , 2020, IEEE Access.

[12]  Mohamed-Slim Alouini,et al.  On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.

[13]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[14]  Victor C. M. Leung,et al.  Information-Sharing Outage-Probability Analysis of Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.

[15]  Shahid Mumtaz,et al.  Secrecy Performance Analysis of UAV Assisted Relay Transmission for Cognitive Network With Energy Harvesting , 2020, IEEE Transactions on Vehicular Technology.

[16]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[17]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.

[18]  Feifei Gao,et al.  Zero-forcing beamforming for physical layer security of energy harvesting wireless communications , 2015, EURASIP Journal on Wireless Communications and Networking.

[19]  Ashok Kumar Das,et al.  A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things , 2019, IEEE Access.

[20]  Rose Qingyang Hu,et al.  Subcarrier Index Modulation for Future Wireless Networks: Principles, Applications, and Challenges , 2020, IEEE Wireless Communications.

[21]  Yucong Duan,et al.  Transformation-based processing of typed resources for multimedia sources in the IoT environment , 2019, Wireless Networks.

[22]  Honghao Gao,et al.  An IoT-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing , 2019, EURASIP Journal on Wireless Communications and Networking.

[23]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[24]  Rui Li,et al.  Context-Aware QoS Prediction With Neural Collaborative Filtering for Internet-of-Things Services , 2020, IEEE Internet of Things Journal.

[25]  Chunguo Li,et al.  Exponent-Based Partitioning Broadcast Protocol for Emergency Message Dissemination in Vehicular Networks , 2016, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[26]  Xiaohui Liang,et al.  Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era , 2017, IEEE Internet of Things Journal.

[27]  Tao Zhang,et al.  Secure Full-Duplex Spectrum-Sharing Wiretap Networks With Different Antenna Reception Schemes , 2017, IEEE Transactions on Communications.

[28]  Yu-Cheng He,et al.  Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami- $m$ Fading Channels , 2017, IEEE Transactions on Communications.

[29]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[30]  George K. Karagiannidis,et al.  On Secrecy Performance of Antenna-Selection-Aided MIMO Systems Against Eavesdropping , 2015, IEEE Transactions on Vehicular Technology.

[31]  Bin Guo,et al.  Mining consuming Behaviors with Temporal Evolution for Personalized Recommendation in Mobile Marketing Apps , 2020, Mobile Networks and Applications.

[32]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[33]  Il-Min Kim,et al.  Secure Transmission for Multiuser Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[34]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[35]  Hong Wen,et al.  The Efficient BackFi Transmission Design in Ambient Backscatter Communication Systems for IoT , 2019, IEEE Access.

[36]  Wei-Ping Zhu,et al.  Security–Reliability Tradeoff Analysis of Multirelay-Aided Decode-and-Forward Cooperation Systems , 2015, IEEE Transactions on Vehicular Technology.

[37]  Derrick Wing Kwan Ng,et al.  Resource Allocation for a Massive MIMO Relay Aided Secure Communication , 2016, IEEE Transactions on Information Forensics and Security.

[38]  H. T. Mouftah,et al.  WAVE 4 V2G: Wireless access in vehicular environments for Vehicle-to-Grid applications , 2016, Veh. Commun..

[39]  Zhi Ding,et al.  Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.

[40]  Wei Xu,et al.  On the Design of Relay Selection Strategies in Regenerative Cooperative Networks with Outdated CSI , 2011, IEEE Transactions on Wireless Communications.

[41]  Honghao Gao,et al.  Offloading decision methods for multiple users with structured tasks in edge computing for smart cities , 2020, Future Gener. Comput. Syst..

[42]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[43]  Hong Wen,et al.  Build-in wiretap channel I with feedback and LDPC codes by soft decision decoding , 2017, IET Commun..

[44]  Chintha Tellambura,et al.  Error rates for Nakagami-m fading multichannel reception of binary and M-ary signals , 2001, IEEE Trans. Commun..

[45]  Sherali Zeadally,et al.  Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives , 2020, IEEE Internet of Things Journal.

[46]  Yuqi Li,et al.  Secrecy Outage Analysis of UAV Assisted Relay and Antenna Selection for Cognitive Network Under Nakagami- ${m}$ Channel , 2020, IEEE Transactions on Cognitive Communications and Networking.

[47]  Yongming Huang,et al.  A Cooperative Relay Selection for Two-Way Cooperative Relay Networks in Nakagami Channels , 2013, Wirel. Pers. Commun..