Secure rate control and statistical QoS provisioning for cloud-based IoT networks |
|
Author: | Muhammad, Irfan1; Alves, Hirley1; Alcaraz López, Onel1; |
Organizations: |
1Centre for Wireless Communications (CWC), University of Oulu, Oulu, Finland |
Format: | article |
Version: | published version |
Access: | open |
Online Access: | PDF Full Text (PDF, 1.6 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe2021120859568 |
Language: | English |
Published: |
Hindawi,
2021
|
Publish Date: | 2021-12-08 |
Description: |
AbstractThe Internet of Things (IoT) facilitates physical things to detect, interact, and execute activities on-demand, enabling a variety of applications such as smart homes and smart cities. However, it also creates many potential risks related to data security and privacy vulnerabilities on the physical layer of cloud-based Internet of Things (IoT) networks. These can include different types of physical attacks such as interference, eavesdropping, and jamming. As a result, quality-of-service (QoS) provisioning gets difficult for cloud-based IoT. This paper investigates the statistical QoS provisioning of a four-node cloud-based IoT network under security, reliability, and latency constraints by relying on the effective capacity model to offer enhanced QoS for IoT networks. Alice and Bob are legitimate nodes trying to communicate with secrecy in the considered scenario, while an eavesdropper Eve overhears their communication. Meanwhile, a friendly jammer, which emits artificial noise, is used to degrade the wiretap channel. By taking advantage of their multiple antennas, Alice implements transmit antenna selection, while Bob and Eve perform maximum-ratio combining. We further assume that Bob decodes the artificial noise perfectly and thus removes its contribution by implementing perfect successive interference cancellation. A closed-form expression for an alternative formulation of the outage probability, conditioned upon the successful transmission of a message, is obtained by considering adaptive rate allocation in an ON-OFF transmission. The data arriving at Alice’s buffer are modeled by considering four different Markov sources to describe different IoT traffic patterns. Then, the problem of secure throughput maximization is addressed through particle swarm optimization by considering the security, latency, and reliability constraints. Our results evidence the considerable improvements on the delay violation probability by increasing the number of antennas at Bob under strict buffer constraints. see all
|
Series: |
Security and communication networks |
ISSN: | 1939-0114 |
ISSN-E: | 1939-0122 |
ISSN-L: | 1939-0114 |
Volume: | 2021 |
Article number: | 8650272 |
DOI: | 10.1155/2021/8650272 |
OADOI: | https://oadoi.org/10.1155/2021/8650272 |
Type of Publication: |
A1 Journal article – refereed |
Field of Science: |
213 Electronic, automation and communications engineering, electronics |
Subjects: | |
Funding: |
This research was financially supported by Academy of Finland 6Genesis Flagship (grant 318927), EE-IoT (grant 319008), and AKProf (grant 307492). |
Academy of Finland Grant Number: |
318927 319008 307492 |
Detailed Information: |
318927 (Academy of Finland Funding decision) 319008 (Academy of Finland Funding decision) 307492 (Academy of Finland Funding decision) |
Copyright information: |
© 2021 Irfan Muhammad et al. (This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
https://creativecommons.org/licenses/by/4.0/ |