Haya Shajaiah, A. Sengupta, A. Abdel-Hadi, T. Clancy
{"title":"保密约束下物联网上行网络的性能权衡","authors":"Haya Shajaiah, A. Sengupta, A. Abdel-Hadi, T. Clancy","doi":"10.1109/PIMRCW.2019.8880817","DOIUrl":null,"url":null,"abstract":"We investigate the performance of uplink communications in Internet-of-Things (IoT) networks under passive attacks from eavesdroppers capable of intercepting individual links. An industrial IoT network is studied where multiple sensor classes, each with a dedicated local access point (LAP), are connected to one or more small cell access points (SAP) which in turn are connected to a central server. The server interfaces the IoT network to industrial sensor monitoring systems which periodically request sensor readings. We propose a unique attack resilient IoT sensor reporting model and study the performance of this system under strict latency as well as secrecy constraints. We show through simulation results how the proposed model behaves in different scenarios and compare the resilience to attack capability for the different cases.","PeriodicalId":158659,"journal":{"name":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Performance Trade-offs in IoT Uplink Networks under Secrecy Constraints\",\"authors\":\"Haya Shajaiah, A. Sengupta, A. Abdel-Hadi, T. Clancy\",\"doi\":\"10.1109/PIMRCW.2019.8880817\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We investigate the performance of uplink communications in Internet-of-Things (IoT) networks under passive attacks from eavesdroppers capable of intercepting individual links. An industrial IoT network is studied where multiple sensor classes, each with a dedicated local access point (LAP), are connected to one or more small cell access points (SAP) which in turn are connected to a central server. The server interfaces the IoT network to industrial sensor monitoring systems which periodically request sensor readings. We propose a unique attack resilient IoT sensor reporting model and study the performance of this system under strict latency as well as secrecy constraints. We show through simulation results how the proposed model behaves in different scenarios and compare the resilience to attack capability for the different cases.\",\"PeriodicalId\":158659,\"journal\":{\"name\":\"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PIMRCW.2019.8880817\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIMRCW.2019.8880817","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance Trade-offs in IoT Uplink Networks under Secrecy Constraints
We investigate the performance of uplink communications in Internet-of-Things (IoT) networks under passive attacks from eavesdroppers capable of intercepting individual links. An industrial IoT network is studied where multiple sensor classes, each with a dedicated local access point (LAP), are connected to one or more small cell access points (SAP) which in turn are connected to a central server. The server interfaces the IoT network to industrial sensor monitoring systems which periodically request sensor readings. We propose a unique attack resilient IoT sensor reporting model and study the performance of this system under strict latency as well as secrecy constraints. We show through simulation results how the proposed model behaves in different scenarios and compare the resilience to attack capability for the different cases.