Artificial-Noise-Aided Secure Transmission for User-Centric Cell-Free IoT Network

IF 8.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Internet of Things Journal Pub Date : 2024-11-14 DOI:10.1109/JIOT.2024.3498061
Xiang Gao;Yong Li;Limeng Dong;Wei Cheng;Ge Shi
{"title":"Artificial-Noise-Aided Secure Transmission for User-Centric Cell-Free IoT Network","authors":"Xiang Gao;Yong Li;Limeng Dong;Wei Cheng;Ge Shi","doi":"10.1109/JIOT.2024.3498061","DOIUrl":null,"url":null,"abstract":"This article investigates the physical-layer security for user-centric cell-free massive multiple-input-multiple-output (UC-CF-mMIMO)-enabled Internet of Things (IoT) network with multiple active eavesdroppers (Eves). We assume that each Eve intends to decode the information of the user (UE) closest to it and is intelligent enough to eliminate interference of other UEs perfectly. Two eavesdropping modes of noncolluding and colluding Eves are considered. Additionally, access points (APs) inject artificial noise (AN) into confidential data signal to hamper the eavesdropping of Eves. To assess the secrecy performance of UC-CF-mMIMO-enabled IoT network, we derive the worst case secrecy rate expression. Then, a max-min secrecy rate (MMSR) problem is formulated via joint optimization of AP clustering, AN selection, and power allocation, which aims to maximize the minimal secrecy rate among attacked UEs while adhering to the Quality-of-Service requirement of UEs, the limitation on the number of UEs and AN sent by each AP, and maximum transmit power limitation of APs. Due to the mixed-integer and nonconvex nature, the formulated problem is tackled via employing the <inline-formula> <tex-math>${\\ell }_{1}$ </tex-math></inline-formula>-norm relaxation and successive convex approximation approach. Finally, we obtain a near-optimal solution to the MMSR problem by iteratively solving a sequence of second-order cone programmings. Simulation results demonstrate the superiority of proposed approach by the comparison with some existing schemes.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 6","pages":"7622-7635"},"PeriodicalIF":8.9000,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10753350/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This article investigates the physical-layer security for user-centric cell-free massive multiple-input-multiple-output (UC-CF-mMIMO)-enabled Internet of Things (IoT) network with multiple active eavesdroppers (Eves). We assume that each Eve intends to decode the information of the user (UE) closest to it and is intelligent enough to eliminate interference of other UEs perfectly. Two eavesdropping modes of noncolluding and colluding Eves are considered. Additionally, access points (APs) inject artificial noise (AN) into confidential data signal to hamper the eavesdropping of Eves. To assess the secrecy performance of UC-CF-mMIMO-enabled IoT network, we derive the worst case secrecy rate expression. Then, a max-min secrecy rate (MMSR) problem is formulated via joint optimization of AP clustering, AN selection, and power allocation, which aims to maximize the minimal secrecy rate among attacked UEs while adhering to the Quality-of-Service requirement of UEs, the limitation on the number of UEs and AN sent by each AP, and maximum transmit power limitation of APs. Due to the mixed-integer and nonconvex nature, the formulated problem is tackled via employing the ${\ell }_{1}$ -norm relaxation and successive convex approximation approach. Finally, we obtain a near-optimal solution to the MMSR problem by iteratively solving a sequence of second-order cone programmings. Simulation results demonstrate the superiority of proposed approach by the comparison with some existing schemes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
以用户为中心的无蜂窝物联网网络的人工噪声辅助安全传输
本文研究了具有多个主动窃听器(eve)的以用户为中心的无蜂窝大规模多输入多输出(UC-CF-mMIMO)支持的物联网(IoT)网络的物理层安全性。我们假设每个Eve都打算解码最接近它的用户(UE)的信息,并且足够智能,可以完美地消除其他UE的干扰。考虑了非串通窃听和串通窃听两种窃听模式。此外,接入点(ap)在机密数据信号中注入人工噪声(AN),阻碍了eve的窃听。为了评估uc - cf - mimo支持的物联网网络的保密性能,我们推导了最坏情况下的保密率表达式。然后,通过AP聚类、AN选择和功率分配的联合优化,提出了最大-最小保密率(MMSR)问题,其目的是在满足终端的服务质量要求、每个AP发送的ue和AN数量限制以及AP的最大发射功率限制的情况下,使受攻击的终端之间的最小保密率最大化。由于混合整数和非凸的性质,采用${\ well}_{1}$范数松弛和连续凸逼近方法来解决公式化问题。最后,通过迭代求解一系列二阶锥规划,得到了MMSR问题的近最优解。通过与现有方案的比较,仿真结果证明了该方法的优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Internet of Things Journal
IEEE Internet of Things Journal Computer Science-Information Systems
CiteScore
17.60
自引率
13.20%
发文量
1982
期刊介绍: The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.
期刊最新文献
IEEE Internet of Things Journal Information for Authors IEEE Internet of Things Journal Society Information BR-DPO: Balanced and Robust Distributed Pose Optimization for Cooperative LiDAR-inertial SLAM Enhancing Positioning Accuracy of GNSS/INS/Vision Integration System with Lane-Driven Atlanta World Assumption in Man-Made Environments The Error-Prone Point Based Resampling for Sampling Offset Mitigation in NLOS-OCC Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1