Incentive Jamming-Based Secure Routing in Decentralized Internet of Things

This article focuses on the secure routing problem in the decentralized Internet of Things (IoT). We consider a typical decentralized IoT scenario composed of peer legitimate devices, unauthorized devices (eavesdroppers), and selfish helper jamming devices (jammers), and propose a novel incentive jamming-based secure routing scheme. For a pair of source and destination, we first provide theoretical modeling to reveal how the transmission security performance of a given route is related to the jamming power of jammers in the IoT. Then, we design an incentive mechanism with which the source pays some rewards to stimulate the artificial jamming among selfish jammers, and also develop a two-stage Stackelberg game framework to determine the optimal source rewards and jamming power. Finally, with the help of the theoretical modeling as well as the source rewards and jamming power setting results, we formulate a shortest weighted path-finding problem to identify the optimal route for secure data delivery between the source–destination pair, which can be solved by employing the Dijkstra’s or Bellman–Ford algorithm. We prove that the proposed routing scheme is individually rational, stable, distributed, and computationally efficient. Simulation and numerical results are provided to demonstrate the performance of our routing scheme.

[1]  Heinrich von Stackelberg,et al.  Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Roy D. Yates,et al.  A Framework for Uplink Power Control in Cellular Radio Systems , 1995, IEEE J. Sel. Areas Commun..

[4]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[5]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[6]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[7]  Deep Medhi,et al.  Network routing - algorithms, protocols, and architectures , 2007 .

[8]  Dina Katabi,et al.  Interference alignment and cancellation , 2009, SIGCOMM '09.

[9]  Sushil Jajodia,et al.  Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation , 2009, IEEE Transactions on Vehicular Technology.

[10]  Shuguang Cui,et al.  Cooperative Interference Management With MISO Beamforming , 2009, IEEE Transactions on Signal Processing.

[11]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[12]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[13]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[14]  Azzedine Boukerche,et al.  Routing protocols in ad hoc networks: A survey , 2011, Comput. Networks.

[15]  Ming Gu,et al.  USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks , 2012, IEEE Transactions on Wireless Communications.

[16]  Walid Saad,et al.  Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks , 2012, IEEE Transactions on Wireless Communications.

[17]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[18]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[19]  Aylin Yener,et al.  Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.

[20]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[21]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[22]  Mohsen Guizani,et al.  Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.

[23]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[24]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[25]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[26]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[27]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[28]  Ariel Orda,et al.  Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.

[29]  Tarik Taleb,et al.  Security/QoS-aware route selection in multi-hop wireless ad hoc networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[30]  Xiangyun Zhou,et al.  Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.

[31]  Xiaohong Jiang,et al.  SOQR: Secure Optimal QoS Routing in Wireless Ad Hoc Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[32]  Constantinos Psomas,et al.  Impact of Directionality on Interference Mitigation in Full-Duplex Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[33]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[34]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[35]  Fen Zhou,et al.  A distributed time-limited multicast algorithm for VANETs using incremental power strategy , 2018, Comput. Networks.

[36]  Pinyi Ren,et al.  Security-aware routing for artificial-noise-aided multi-hop secondary communications , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[37]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[38]  Kurt Binder,et al.  Monte Carlo Simulation in Statistical Physics , 1992, Graduate Texts in Physics.

[39]  Fatih Kurugollu,et al.  Blockchain in Internet-of-Things: Architecture, Applications and Research Directions , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).

[40]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[41]  Furqan Jameel,et al.  A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[42]  Kang G. Shin,et al.  Interference Steering to Manage Interference in IoT , 2019, IEEE Internet of Things Journal.

[43]  Norio Shiratori,et al.  Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks , 2020, IEEE Transactions on Information Forensics and Security.