Abstract

In this paper, the secure uplink transmission scenario in Internet of Things (IoT) applications is investigated, where one of multiple sensors communicates with the controller aided by the cooperative relay. Firstly, by considering the direct link, an energy-efficient transmission scheme (EET) is proposed, which can be suitable for the resource-constrained devices and applications in IoT communication. Moreover, the secrecy outage probability (SOP) and secure energy efficiency (SEE) of different transmission strategies are derived, which contributes to the design of energy-efficient secure transmission. Finally, simulation results demonstrate that EET outperforms other transmission protocols in terms of SEE in most situations. To improve the secrecy performance and energy efficiency of the IoT deployment, EET can be adopted as an effective additional strategy in practical applications.

1. Introduction

The Internet of Things (IoT), serving as an important architecture in the fifth-generation (5G) mobile communication systems, has drawn dramatic interest all over the world [13]. However, most of IoT terminal devices are resource-constrained commonly, which causes low computing power and energy storage capacity. Generally, it is necessary for IoT applications to operate at low power. Meanwhile, since most devices are battery-powered sensor nodes that cannot be replaced for some reasons, such as being embedded in a human body, these sensors are required to work for a long time without human intervention [4]. Consequently, energy efficiency is worthy of concern in the IoT system especially.

Cooperative transmission in wireless communications has been considered as a promising solution in order to economize the power of transmitter, improve throughput, and enhance the reliability of communications [5]. Because of limited resources of IoT devices, the employment of relay transmission is of utmost importance for IoT to cope with the issue of energy efficiency. Traditional cooperative protocols have been studied deeply by many researchers [6, 7], such as amplify-and-forward (AF) and decode-and-forward (DF), in which DF can be further subdivided into fixed DF and selective DF [8], as well as cooperative jamming (CJ) [9, 10]. In particular, for the CJ scheme, the relay does not forward confidential information but emits interference signals (also known as artificial noise) to interfere with the eavesdropper. It is worth noting that a common problem in [610] is that the direct link between the source and the target has been unexploited.

On the other hand, it is also necessary to consider the security and privacy issues for IoT. Obviously, not all devices connected via the IoT are able to access the network data. Moreover, the wireless communication channel is open, which may also lead to the eavesdropping risk caused by unauthorized users. In general, security has always been regarded as a problem that needs to be solved by high-layer computing methods. However, physical layer security (PLS), which is an emerging method to ensure the security of wireless communication, has become an effective supplement to existing solutions. In terms of wireless PLS, the basic idea is to make use of the characteristics of wireless channels to transmit information reliably from the source to the intended receiver as well as to ensure the confidentiality of the information, that is, not to be intercepted or eavesdropped [11]. In recent years, PLS techniques have been widely explored to ensure security of future wireless communications, as it could provide the security of new network architectures such as the IoT. Unfortunately, energy efficiency of PLS has not aroused sufficient attention in the cooperative relay networks and IoT scenario.

The measurements of PLS are generally related to the availability of channel state information (CSI) for source. When the source well knows global CSI, the confidential information will not leak to the eavesdropper via the adaption of secure coding rate; thus the so-called perfect secrecy can be realized [12]. In this case, the measurement of security is secrecy capacity [1315]. However, the hypothesis of knowing global CSI is too strong to be realized easily, since it may require the intended destination to report its information of the position; in addition, eavesdroppers collaboration to give feedback on CSI to the source is also required. Obviously, above requirement may be not suitable for the IoT devices because it will lead to higher cost and power consumption as well as more serious latency, which are unacceptable to the effective deployment of massive IoT. Therefore, a more realistic way of applying the probabilistic view is proposed, in which it was assumed that only part of the CSI of the legitimate channel is known and communication operates at a fixed secure transmission rate. At this point, security is denoted by the secrecy outage probability (SOP) [16].

Inspired by previous work, this paper focuses on secure uplink transmission scenario in IoT applications, in which one of multiple sensors in the localized group transmits collected data to a controller aided by the cooperative relay when considering the presence of a passive eavesdropper. A more practical scenario worthy of concern is that there exists a direct link between controller and sensor. With the optimal performance and controllable cost, MRC technique is usually utilized by controller to process the received signal [17]. The main contributions of this work are listed below.

By making use of the advantages of both direct and relay links, we propose a novel energy-efficient secure transmission strategy based on the CSI of the legitimate link, that is, energy-efficient transmission (EET), by which the best path is selected (direct or cooperative transmission), to cope with implementation limits of the IoT devices. Since the source has known about CSI of main links, then the direct or cooperative transmission could be performed based on the above information, which contributes to decreasing energy consumption and improving secure energy efficiency (SEE).

We obtain the closed-form expressions of SOP and SEE, which will be helpful to secure the applications of cooperative IoT. In order to show the effectiveness of our new strategy, we further compare the secrecy performance of different transmission schemes such as EET, DF, AF, and CJ as well as direct transmission (DT).

Our results demonstrate that the proposed EET is superior to other transmission protocols in many cases when considering SEE. To improve the secrecy performance and energy efficiency of the IoT deployment with the help of cooperative relay, EET can be regarded as an effective additional strategy in practical applications.

This paper is organized as follows. In Section 2, we present the system model and our EET design. The exact SOP and SEE of proposed strategy and DT as well as other conventional cooperative protocols are derived in Section 3. Then the secrecy performance of above transmission strategies is shown by simulation results in Section 4. Finally, conclusions of this paper are drawn in Section 5.

2. System Model and EET Design

2.1. System Model and Notation

Figure 1 shows the communication model of a single-antenna IoT device in the presence of wireless cooperative links, where one of multiple IoT sensors (S) transmits the detected data to a desired controller (D) aided by a relay (R) when considering the presence of a passive eavesdropper (E). This model can use the direct link to improve the reliability of the system [18]. The helper node, which is adopted as a relay or as a jammer, is equipped with a single antenna used for data transmission and reception in a half-duplex manner. The signal received by any node from the transmitting terminal of , , is expressed aswhere we denote as the path-loss between nodes and , as the transmit power of , as the useful data signal, and as the zero-mean and variance additive white Gaussian noise (AWGN). Furthermore, we denote as the channel coefficient between nodes and , which exhibits Rayleigh flat-fading that remains constant for the duration of one transmission block time and varies in different block independently. Assuming that all wireless channels are independent and distributed as exponential random variables, the receiver can fully obtain the CSI of legitimate link [19]. Consequently, the intended end can obtain CSI of the main links. It is reasonable due to the fact that R and D can get available channel parameters of the main link with the assistance of channel estimation; then D is able to attain accurate CSI through cooperative relays [20]. The path-loss is , where is the total antenna gain, denotes the wavelength, represents the distance between nodes and , is the path-loss exponent, denotes the link margin, and is the noise at the intended receiver. Next, the instantaneous signal-to-noise ratio (SNR) at any channel can be expressed as , where represents the average SNR, is defined as the noise power and denotes the channel bandwidth, and any is exponentially distributed according to the probability density function (PDF) for .

In line with [13], the achievable secrecy rate of source-destination () is given by

where denotes the capacity of the legitimate link and represents the capacity of the eavesdropper link, and are the end-to-end instantaneous SNR of the legitimate and eavesdropper links, respectively, and .

2.2. EET Design

For the EET strategy, the selection criterion is that the sensor determines the most secure method (the direct or cooperative transmission) to be transmited to D with the aid of the available CSI. Different from the conventional cooperative protocols, since we consider both the direct and relay links simultaneously, the proposed EET can achieve better security performance. Then, in ETT, the capacity of the legitimate channel can be described by

It is worth noting that the term in (5) denotes the half duplexing cost. Then, the corresponding secrecy capacity of EET is expressed as , where is obtained from (5) by replacing D by E.

3. Secrecy Performance Analysis

We resort to the SOP and SEE to analyze the secure performance for EET as well as DT, DF, AF, and CJ protocols in this section.

3.1. Secrecy Outage Probability

In the following, the SOP can be formulated aswhere EET, DT, DF, AF, and CJ.

3.1.1. Derivation for EET

In general, the relay R is located in the middle position of the source S and the controller D, and we make the following considerations to (5): S (or the relay R) transmits data when (or when ). Based on the fundamental principle of EET, SOP can be expressed by

where is obtained as

where . For the Rayleigh fading, and are random variables that follow the exponential distribution, and their PDFs have been given above; thus,

When the sensor decides to utilize the relay, we consider that and are the SNRs at D and E, respectively, and their PDFs are expressed by , . Then, the SOP yields in the following casesTo obtain , we isolate and use the integral that . Thus

Similarly, is derevid as shown in (12). It is worth noting that both intersections, and , are not to be considered, for the sake of the fact that last intersection contains the first area.

From what has been discussed above, by combining the results of (11) and (12) and substituting back into (10), the SOP of the cooperative phase is obtained as

where .

Finally, the overall SOP of EET is derived after plugging (9) and (13) in (7).

3.1.2. Derivation for DT

In the direct transmission scheme, the sensor S always sends collected data to intended controller D according to a transmit rate in the two phases, while the relay remains silent. Then we can obtain an exact expression for the SOP of DT in the following theorem.

Theorem 1.

Proof. See the appendix.

3.1.3. Derivation for DF

Notably, different from EET, the relay R is always active in DF. The capacity of the main channel , which obviously indicates a performance deficiency, as the transmission rate must meet the requirements of the S-R link. The SOP of DF can be formulated as [21]

where and .

3.1.4. Derivation for AF

For AF scheme, similar to DF, the relay completes a total transmission in two stages; that is, the source broadcasts the signal, which is then amplified and transmitted to D by the relay R with a variable gain. The SOP of the AF scheme as found in [22] is reproduced as

3.1.5. Derivation for CJ

CJ can be adopted to interfere E by resorting to the relay to transmit interference signal, in which jamming is utilized in a cooperative manner to provide a secure communication link between the sensor and the desired controller to improve the secrecy performance of IoT uplink transmission. Thus, the SOP of CJ can be derived as [21]

where , , , , , and .

3.2. Secure Energy Efficiency

Actually, improvements of security often come at the cost of higher power. In consideration of sustainability, excessive pursuit of security performance is detrimental to IoT devices. In terms of IoT applications, secrecy communications should be conducted in an energy-efficient manner. Consequently, the SEE is used here as the best metric to measure physical layer security and energy efficiency at the same time. Mathematically, the SEE is expressed as

where denotes the total power consumption of each transmission strategy; that is, EET, DT, DF, AF, and CJ, which are derived as

where and denote the power costed by the transmit and receive circuitry, respectively. and represent the power spent by the sensor source and by the relay. For simplicity, we assume that in this paper. Furthermore, it is worth noting that the power consumption at E is neglected. Obviously, the denominator of SEE is an increasing function for sending power. Thus, increasement of the power will cause SEE to drop. Note that SEE works as a convex function of the targeted rate. Therefore, we illustrate the optimization problem asIt is obviously seen that the exact optimal expressions of and are very difficult to derive. However, we can use simulation and numerical evaluation to obtain the desired and via searching algorithm. It should be emphasized that the above expression in (23) has more pragmatic significance for IoT.

4. Numerical Results

This section provides some numerical simulations to prove the previous theoretical analysis. The parameter configurations in the simulation are set as follows: = 2bps/Hz, = 100m, , = 112.2mW, = 97.9mW, = 10kHz, = -174dBm/Hz, a link margin of = 10dB, antenna gain = 5dBi, noise = 10dB, and = 2.5GHz.

Figures 2(a), 2(b), and 2(c) show the impact of on the SOP of EET, DT, DF, AF, and CJ transmission strategies for different positions of the relay, respectively, where we observe that, except CJ, the SOP of different transmission strategies was improved by increasing . This is because increasing the transmitting power benefits both the legitimate destination and cooperative relay. Additionally, it is clearly seen that the simulation results and the theoretical curve match exactly in the whole region, which verifies the accuracy of our conclusions. On the other hand, although the location of the relay changes constantly, the proposed EET and AF can always achieve almost the same optimal secrecy performance. In fact, AF outperforms conventional cooperative schemes (i.e., DF and CJ) in terms of SOP; only if E is closer to relay, CJ has better performance than AF [21]; then we can conclude that the designed EET is a secure cooperative transmission strategy.

When the distance between relay R and E changes, Figure 3 compares the maximum SEE of EET, DT, DF, AF, and CJ with the assist of searching methods, which can be used to find the optimal and transmit power. We observe that when E is closer to the legal node, CJ can obtain the best efficiency. On the other hand, when E is far from the legal node, EET performs better in energy efficiency, which confirms that the designed EET is a more energy-efficient secure transmission strategy. Therefore, EET is a low-power green transmission protocol to improve unit energy efficiency for the IoT communication.

In Figure 4, we compare the performance at different transmission rates and at different distances between E and the relay R. For ease of analysis, we just provide the performance comparison between EET and CJ. As the figures show, it is obvious that the performance of the strategies relies on both and . Meanwhile, it is clearly seen that the transmission rate produces a greater impact on EET, and its performance is better when the rate is appropriately low. Thereby, when the EET strategy is adopted in the IoT uplink transmission, for the sake of improving the secrecy performance and energy efficiency of communication systems, a much lower is more suitable. In addition, the location of the relay also has some effects on the EET scheme. Figure 4(a) describes that if the sensor S is closer to the relay R and E stays away from R, EET performs better in contrast to the scenario where E is closer to R. However, if the relay R is closer to the controller D, as shown in Figure 4(c), the jamming signal sent by the relay R will cause serious impact on D, which makes SEE of proposed EET better than CJ. Therefore, we conclude that a more effective energy-efficient secure transmission is introduced by the EET scheme.

5. Conclusion

Secure energy efficiency and physical layer security were investigated in the secure uplink transmission scenario for IoT applications in this paper. Utilizing the advantages of direct and relay links, we proposed a novel energy-efficient secure transmission strategy based on the CSI of the legitimate link (EET), by which the best path is decided between direct and cooperative transmissions, to deal with implementation limits of the IoT devices. The closed-form expressions of SOP and SEE of EET were also derived. In order to show the effectiveness of our new strategy, we further compared the secrecy performance of different transmission schemes such as DF, AF, and CJ as well as DT. The simulation results demonstrated that the proposed EET outperforms other protocols in terms of SEE in most situations. To further enhance the secrecy performance of the IoT networks, EET can be adopted as an effective additional strategy in practical applications. For future work, one interesting aspect is to design the energy-efficient transmission scheme toward secure cooperative IoT in the presence of the multiple eavesdroppers. Other extensions can address another practical issue such as studying the untrusted relays case.

Appendix

By using the formula of full probability, the SOP of DT (14) can be formulated aswhere . Thus can be solved as follows:Similarly, can be expressed asand can be obtained asAfter some simple mathematical manipulations, in (A.4) can be directly derived asTherefore, given by (A.4) can be rewritten asNote that when , ; then can be solved asFinally, the desired expression in (14) can be achieved by summarizing results of (A.2), (A.3), (A.6), and (A.7).

Data Availability

The data in this paper is generated from the simulation in Matlab, and the detail simulation settings can refer to Section 5. Therefore, the data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant 61501508 and Grant 61671476.