Next Article in Journal
A SVM and SLIC Based Detection Method for Paddy Field Boundary Line
Next Article in Special Issue
A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios
Previous Article in Journal
Conductivity Classification of Non-Magnetic Tilting Metals by Eddy Current Sensors
Previous Article in Special Issue
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Realizing Efficient Security and Privacy in IoT Networks

1
Department of Communication Engineering, College of Internet of Things, Hohai University, Nanjing 210098, China
2
Department of Electronics BCC of Central South University of Forestry and Technology, Changsha 410004, China
3
Computer Science and Technology, Xidian University, Xi’an 710126, China
4
Research Centre of Interneural Computing, China Medical University, Taichung 404472, Taiwan
5
College of Information and Electrical Engineering, Asia University, Taichung 41354, Taiwan
6
Department of Computer Science, College of Electrical and Computer Engineering, Chungbuk National University, Cheongju-si 28644, Korea
*
Authors to whom correspondence should be addressed.
Current address: Department of Math and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada.
Sensors 2020, 20(9), 2609; https://doi.org/10.3390/s20092609
Submission received: 22 March 2020 / Revised: 22 April 2020 / Accepted: 30 April 2020 / Published: 3 May 2020
(This article belongs to the Special Issue Security and Privacy Techniques in IoT Environment)

Abstract

:
In recent times, security and privacy at the physical (PHY) layer has been a major issue of several communication technologies which comprise the internet of things (IoT) and mostly, the emerging fifth-generation (5G) cellular network. The most real-world PHY security challenge stems from the fact that the passive eavesdropper’s information is unavailable to the genuine source and destination (transmitter/receiver) nodes in the network. Without this information, it is difficult to optimize the broadcasting parameters. Therefore, in this research, we propose an efficient sequential convex estimation optimization (SCEO) algorithm to mitigate this challenge and improve the security of physical layer (PHY) in a three-node wireless communication network. The results of our experiments indicate that by using the SCEO algorithm, an optimal performance and enhanced convergence is achieved in the transmission. However, considering possible security challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm for a multiple-input, multiple-output, multiple-eavesdropper (MIMOME) scenario as it is applicable to security in IoT and 5G technologies. The result of the investigation show that the algorithm executes significantly with minimal complexity when compared with nonoptimal parameters. We further employed the use of rate constraint together with self-interference of the full-duplex transmission at the receiving node, which makes the performance of our technique outstanding when compared with previous studies.

1. Introduction

With the recent swift advancement of wireless communication networks and the advent of the fifth generation (5G) cellular network, interconnected devices are embedded into the environment through the IoT paradigm to enhance constant quality of service (QoS) and connectivity [1]. However, security of wireless transmissions has become a vital concern [2]. Unfortunately, in wireless technology, security risks are unavoidably inherent. Recently, network intrusion and eavesdropping, known as Eves, has become the major cradle of security risks in 5G wireless communications. The resources (e.g., battery) of most IoT devices (such as handheld/mobile communicating devices) are constrained, thus resulting in the devices having limited power for transmission, which may warrant the use of frailer cryptographic techniques as power savers. Therefore, devices may be prone to several attacks by some prevailing adversaries.
Security in wireless networks is typically employed through cryptographic methods using the upper layers of the open system interconnection (OSI) model [2,3]. However, these adversaries, which are considered as unauthorized users or network Eves, may infiltrate the network system, exhaust the networks bandwidth, taint the transmission data, reduce transmission performance, and inject data harms that thwart easy access of network data by authentic users. As a result of wireless link’s unprotected nature, most wireless connectivity is susceptible which makes it easy for them to be attacked by jamming technology. These jamming attacks can result in a problem of Denial-of-Service (DoS), which can cause numerous other higher-layer security glitches in IoT and 5G technologies [3].
The 5G wireless network is predicted to activate the smart hyperlinked environment, enhancing the evolution and the growth of several sectors, such as energy and railway, where huge amounts of accessibility and reliability is essential. In contrast, this evolution may warrant that future mobile transmitting devices be exposed to cyber-attacks, which can destabilize system accessibility [4]. Because of the nature of wireless communications, vulnerability to Eve’s attacks is inevitable. Therefore, transmission confidentiality cannot be guaranteed. In this paper, our work is focused on utilizing the networks physical layer to address countermeasures towards tackling confidentiality attacks in wireless network.
5G communications will headline what is being called the 4th Industrial Revolution, where the mobile wireless broadband, pervasive sensing, and artificial intelligence (AI) promises to lead to major changes in academia, industry, and society itself. This coming generation of wireless communications globally focuses on many aspects as standards, policy, and infrastructure are still being shaped. 5G definitely promises to make the IoT network a reality.
In wireless networks, confidentiality attacks mostly stem from jamming. This is considered as the interruption of the flow in wireless transmissions by diminishing the signal-to-noise ratio (SNR) at the receiver end over a wireless signal’s transmission interference. This clearly varies from normal network interferences because it explains a deliberate injection of wireless signals into an existing transmission with the intention of interrupting communications. However, network interference is said to be an accidental kind of disruption during transmission [5]. Recently, through conventional means, the implementation of different encryption approaches has been used to handle this security challenge at the advanced communications layers. That being said, a lot of attention has been drawn towards the security of the physical (PHY) layer lately. From a PHY security perspective, the authors of [6] investigated the impact of saturation nonlinear energy harvesting (EH) and activation threshold on the multiuser wireless powered sensor networks (WPSNs) from the physical layer security (PLS) perspective, and with respect to the generalized multiuser scheduling (GMS), they examined the improvement in the secrecy performance in WPNs. Their work explored and presented an exact closed-form expressions for secrecy outage probability (SOP) under linear EH (LEH), saturation nonlinear EH (SNEH), and saturation nonlinear EH with activation threshold (SNAT), respectively, through finding a solution for the maximization problem of secure energy efficiency (SEE).
The basis for tackling jamming attacks is hinged on Wyner’s architecture. This architecture presented and demonstrated a wiretap channel when the channel of the eavesdropper (Eve) is a tainted version of the authentic receiver’s channel, a secret message can be sent from the transmitter to the destination, while Eve is kept unaware of the content of the transmitted message [7]. The concept of privacy capacity is described as the optimal attainable rate of transmission of private data from the transmitting source (node) to its receiving destination. In [8], the Wyner’s wiretap method was generalized by assuming the private message transmission over channels broadcast. Lately, substantial studies have analyzed privacy in wiretap channels under multiple antennas networks [9,10,11]. Particularly, the authors of [11,12] described the performance capacity of privacy in a multiple-input, multiple-output (MIMO) wiretap transmission channel. However, the authors of [13] investigated a joint effect of multiple jamming signals and noise at the eavesdropper in a MIMO network by assuming the implementation of antenna selection technique by the transmitter, while both the eavesdropper and legitimate receiver make use of a maximal-ratio combining scheme to achieve spatial diversity in reception. Their results show the effects of imperfect feedback and other key system parameters on the secrecy performance.
Basically, security at the PHY layer guarantees an optimal level of transmission privacy against Eve’s as well as establishing an anticipated reception standard and quality as expected by the receiver(s). This research area comprises both signal processing analysis and theoretical information study. Although the latter involves more bounds and asymptotical limits, the former inclines towards innovating primal designs of algorithms and architectures to tackle security issues in a wireless network. Therefore, the focus and motivations of this paper is wrapped around the former with respect to Eve’s growing quantity of transmitting antennas on privacy.
All the above-mentioned studies, except for [10,11], failed to explore a MIMOME scenario wish illustrates the effects of Eve’s growing quantity of transmitting antennas on privacy. Although the authors of [6,11,13] proposed proficient privacy, their technique is reliant only on the assumption of a scenario where several factors such as the quantity of Eve’s antennas that are accessible for transmitter usage for artificial noise subspace, are constrained in a MIMO and MIMOME network. By implication, it is essential that Eve’s multiple antenna usage needs be considered and addressed. In this research, this is believed to be an issue of importance, therefore these problems are first extensively described, then techniques to tackle such problems are investigated and proposed.The main contributions of this research are as follows.
  • A primal outlook into the investigation and optimization of wireless communications security with respect to IoT networks is presented.
  • Using a mathematical model, an analysis of a novel transmission system where the eavesdroppers attack is tackled by injecting artificial noise which is transmitted by the receiver who has full-duplex aptitude with the same frequency in the channel, which reduces Eve’s reception quality.
  • Proposal of a new jamming mitigation technique and developed a sequential convex estimation and optimization (SCEO) algorithm for an optimized and enhanced privacy to solve the optimization problem in a three-node network where network users do not have knowledge of Eve’s channel state information (CSI).
  • The vulnerability of the proposed privacy enhancing scheme to Eve’s increasing number of antennas is characterized and explored, while the performance of the proposed algorithm in a three-node network is established.
  • Finally, because privacy capacity in a three-node network have been over-studied by several authors, this research is expanded to cover a MIMOME scenario, justifying its applicability in secured IoT network transmission.
The remainder of this paper is organized as follows. The privacy capacity model in wireless networks is described in Section 2. Review of recent works related to the research is presented in Section 3. System model is described in Section 4. Numerical analysis and results are provided in Section 5, and finally conclusions are outlined in Section 6.

2. Privacy Capacity Model in Wireless Networks

In this section, the privacy capacity model of the transmitting network is expressed. In the privacy capacity model of the network, it is assumed that the malicious node may eavesdrop the source as well as well as the receiver. However, in order to get a full use of the signals transmitted from the transmitter, the eavesdropper must be fully synchronized in the network. According to traditional privacy definitions in [8], the channel of communication can be modeled as a channel of broadcast in line with the wiretap channel as illustrated in Figure 1.
Considering the wiretap channel, the transmitting channel’s message is represented as a n A n and is encoded and broadcasted as a codeword c m C m . The receiver ( R x ) and eavesdropper (Eve) receive b m B m and e m E m , respectively. Eve’s received information via her receiving signal is then modeled and described as in Equation (1),
I e m ; a n = g a n g a n e m
where I ( e m ; a n ) represents the mutual information shared by the transmitter and the legitimate receivers, while g is considered as the entropy. As long as Eve cannot decode any bit of the transmitted information, then perfect privacy is achieved. Thus, Equation (2),
I e m ; a n = 0 g a n = g a n e m
This implies that the quantity of uncertainty about Eve’s private information is not altered after e m is received.
By definition, the probability of experiencing an error P i in the message estimation of message a n , and  a ^ n is defined as the estimate of a n ; therefore,
P i = P a n a ^ n .
Eve’s rate of uncertainty about message a n is term as the rate of equivocation and can be described as
Q i = 1 m g a n e m
where
0 Q i g ( a n ) / m
Evidently, if  Q i = g ( a n ) / m , then perfect privacy, which is related to perfect privacy rate Q s , is realized. For each ε > 0 , a particular Q s is assumed to be realizable, and there is a sequence of ( 2 m Q s , m ) codes such that for any m > m ( ε ) the following states are obtained.
P i < ε Q s ε < Q i
The first state is the constraint for the realizable rate, whereas the second is the equivocation rate constraint which guarantees prefect privacy. In summary, privacy capacity S c is the optimal realizable rate of privacy in a network transmission. Thus, in [8], it is established that the difference between the main channel capacity C m c and the wiretap channel capacity C w c is the privacy capacity S c , in other words,
S c = ( C m c C w c ) + ,
as ( . ) + = Δ max ( 0 , . ) , where negative rate is meaningless. Although Wyner demonstrated this for the distinct no-memory channel, the principle that the capacity of privacy is the difference of the capacity of the legitimate channel and that of the eavesdropper’s is established to be accurate for several systems like in multiple-input, multiple-output (MIMO) set-ups [12,13].

Notations

We denoted the column vectors and matrices by boldface letters (both at upper and lower cases), while the determinant, inverse of a matrix and column-wise vectorization of the matrix X are all represented as X H , X 1 , X , respectively. In a diagonal vectorization, Y is denoted as the column vector of y , whereas the random variable of y is represented as C y [ . ] and the probability of event occurrence is denoted as P { X } . Using the same probability space, we defined the random variables Y and Y m , if  Y m converges to Y , we transposed Y m a . s Y as m . We used I to represent the matrix identity of supplied size, as  I ( y ; z ) represents the information which is mutually and randomly transmitted between y and x variables.

3. Related Works

In a wireless network, jammers intentionally introduce radio frequency (RF) interference to distort wireless communications. This is achieved by occupying the transmitting channel and keeping it busy, thereby triggering the transmitter to withdraw each time it senses a busy wireless channel, or a tainted signal acknowledged at the receiver’s end. In this section, in an attempt to understand the jamming attack on wireless networks, different kinds of jamming in wireless communications as proposed by several researchers are explored. Primarily, network jamming can occur in different ways based on the type of jammer. Therefore, different kinds of jammers and their jamming mechanisms are reviewed in this section.
The established secrecy capacity rate principle by Wyner in [8] preceded several other theoretical proposals by different researchers. So far, the wireless channels rate of secrecy has been explored from several perspectives like in [9,10]. The different perspectives explored are as follows, the fading channels secrecy [9,10,11], the analysis of Gaussian wiretap channels secrecy of [11], the multiple antenna systems secrecy [13,14,15], the broadcast channels secrecy [16], the analysis of secure degrees of freedom [17,18,19,20,21], and the secrecy of cooperative jamming techniques coupled with helpers or relays [22,23,24,25,26,27,28,29].
Additionally, the theoretical information [30] forms guarantees defined by secrecy capacity of the communication channel; the nodes that legitimate can also assume active approaches to improve their communication secrecy. One important approach for improving the secrecy of wireless communication was developed in [31]. The approach proposes that the transmitter (Alice) injects artificial noise into legitimate channels null-space together with the data signal. This scheme is intended to actively reduce the reception quality of any Eve’s presence without altering the quality of legitimate receivers (Bobs) channel. Several other works [32,33] have also investigated this approach. Equipping Bob with the capacities of full-duplex radio aptitude, which enables him broadcast jamming noise counter to Eve, while both Bob and Eve attempt to acquire information from Alice [34,35] is another approach. The combination of the aforementioned two jamming approaches is investigated in most part of this study to attain secrecy at higher levels. Moreover, this combination was examined in [36], as it proposed a cooperative optimization algorithm to generate decent parameters for the transmission. Separately, two different sets of antennas are considered for broadcasting and for full-duplex reception. Meanwhile, the research did not fully consider the residual self-interference at Bob. Further, several other works were interested with comparable systems in [37,38]. The system proposed in [39] presents a scenario with Alice and Bob communicating simultaneously and are furnished with full-duplex radio with full consideration of residual self-interference. The study target was to discover the maximum beamforming transmit trajectories for artificial noise and signal considering some constraints of quality of service (QoS) with Eve’s CSI recognizable to users. With Eve’s exact CSI unrecognizable to the user in [40], a closed-form lower bound on the ergodic rate of secrecy is realized. The authors of [41,42] considered a case of a single-antenna Bob and multiple antenna base station coupled with a colluding and non-colluding single-antenna Eves. As an alternative to beamforming, an antenna selection scheme is used by the study and it is of the research assumption that Eves are dispersed in accordance to the process of Poisson point.
For cooperative relaying networks, several authors have also investigated different techniques for the security of systems physical layers [43]. In cooperative relaying networks, even destinations or relays are used as assistants to offer jamming signals to complicate the eavesdropper’s transmission. This method is known as cooperative jamming. The noise-forwarding approach which was introduced in [24], and applied in a channel comprising of four-terminal relay-eavesdropper also considered a full-duplex relay, which independently transmits secret messages codewords which are targeted at complicating the eavesdropper’s transmission. The authors of [44] investigated a two-stage cooperative jamming scheme (TSCS) which involves multiple relay nodes acting as the single-antenna’s source node extension. The relays in this study do not transmit the information signals as they only function as a helper. However, for a single-antenna relay network, the authors of [45] proposed three different cooperative communication methods. On the other hand, for the second hop, they attempted to optimize secrecy by deriving a power allocation approach and its corresponding relay weights. The study in [46] investigated a decode-and-forward (DF) relays performance based on an optimal beamforming strategy; however, the investigation is limited because it only considered a transmission where the Eve monitors just a single connection linking the transmission destination and relay. The investigation of [47] was based on different privacy enhancing technologies (PETs) for IoT devices which have resulted in a much efficiency and convenience to our daily life. Their survey claim to have identified current state of improvement of the PETs in several turfs and also analyzed how the current technologies adhere with the modern legal ideologies and privacy criteria in curtailing the threats to privacy. A secured IoT-based healthcare system, which operates through the body sensor networks (BSN) architecture, was examined by the authors of [48]. The main focus of their system is to concurrently realize system robustness of transmission and efficiency within publicly transmitting IoT-based communication networks. Utilizing a vigorous utilize crypto-primitives, they constructed two communication schemes to ensure confidentiality in transmission and support entity authentication among smart objects. As most of the IoT data is relevant to personal privacy, it is necessary to pay attention to data transmission security. The authors of [49] investigated an IoT-oriented offloading method (IOM) which is enclave with privacy preservation to solve the problem of privacy in Cloudlet-enabled Wireless Metropolitan Area Networks (CWMAN). Their research and that of [50] adopted the non-dominated sorting differential evolution algorithm (NSDE) in order to optimize the multi-objective problem.
By contrast to the works analyzed above, the work in [51] proposed a cooperative jamming approach for a half-duplex two-hop wireless MIMO relay scheme where the eavesdropper can bug the channels throughout the phases of transmission. The study investigation considered both single and multiple streams of data transmissions. However, for jamming support, due to the absence of an “outer” helpers, the relay, destination, and source must depend on themselves. Whether the eavesdropper is in proximity to the source or the destination, the strategy guarantees that it is jammed. In this strategy, both the source and the destination nodes perform as provisional assistants for transmitting jamming signals throughout the phases of transmission where they are generally inactive.
In summary, the event of optimizing privacy without the users recognizing Eve’s CSI is sparsely contained in literature; however, a few works like [52,53,54,55,56,57] gave more attention to the use of only enough energy to authenticate a particular QoS for Bob and is this energy is estimated in terms of signal-to-interference-plus-noise-ratio (SINR). Using the remaining energy, artificial interference is generated to jam Eve not minding the effect of Eve’s location. This process is implemented in place of making attempts to optimize the rate of secrecy, which is impossible without the users having a knowledge of Eve’s CSI [58,59]. Furthermore, as new telecommunication technologies emerge, the use of several security and privacy techniques proposed earlier becomes over exploited and obsolete; therefore, it is vital to develop advanced state-of-the-art techniques and algorithms that can mitigate against network jamming and eavesdropping attacks and ensure constant quality of service (QoS) in the network. Considering that this is the optimal focus of this research, therefore, the relevance of this research to cutting-edge telecommunication technologies like the IoT and 5G cellular network cannot be underestimated.

4. System Model

In this section, the system model is described. There are similarities in the model to what was given in [8]. For the set-up, a three-node-based wireless transmission is illustrated in Figure 2.
In the set-up, all three nodes are attached to a single transmitting antenna. The intention of the transmitter (Source) is to broadcast some private information to the receiver (Destination) while Eve (a passive eavesdropper) attempts to gain access to the sensitive private information. We assume that each link channel entails several M orthogonal subcarriers and each subcarrier fading is flat. Tackling eavesdropping attacks in this set-up entails that artificial noise is broadcasted by R x with the same frequency and in the same channel, which reduces Eve’s reception quality. Considering that this jamming attack operates at the same frequency and time in which information is transmitted from T x to R x ; thus, it is assumed that R x has full-duplex aptitude. It is well known that there is no perfect full-duplex system, therefore R x always manifests some level of residual self-interference.
Considering y s ( x ) M × 1 is the signal vector independent and identically distributed (i.i.d) zero mean cyphers and unit variance that the T x will be transmitting while y d ( x ) M × 1 is assumed to be the jamming noise vector of i.i.d. zero mean cyphers and unit variance the transmitter ( T x ) will be transmitting. Thus, the signal vectors R x and Eve received can be individually described,
z d ( x ) = g s d p s y s ( x ) + δ g d d p d y d ( x ) + m d ( x ) ,
z e ( x ) = g s e p s y s ( x ) + g d e p d y d ( x ) + m e ( x ) ,
where M × 1 comprises the vector, g s d , g s e , g d e , and g d d are explicitly described in Figure 2, and  p s and p d vectors, respectively, represent the power of transmission between the T x and R x . m d ( x ) M × 1 and m e ( x ) M × 1 are considered as the mean of independent white Gaussian noise of zero and unit variance, respectively. The multiplication and square root are used as element-wise operators, and  δ represents the attenuation factor of self-interference.
Denoting the superscript ( m ) as a vector m th element, we formulate the respective signal-to-noise-ratios (SNRs) of the m th subcarrier at R x and Eve as
γ d ( m ) = A m y m 1 + B m z m   and   γ e ( m ) = C m y m 1 + D m z m ,
where A m = g s d ( n ) 2 , B m = δ g d d ( n ) 2 , C m = g s e ( n ) 2 , D m = g d e ( n ) 2 , y m = p s ( m ) and z m = p d ( m ) . Recall that as stated earlier, Eve’s CSI ( C m and D m m ) is only supposed to be recognizable by legitimate users in this Section.
Thus, the privacy capacity of this model is defined as
S c ( y , z ) = 1 M m = 1 M max 0 , Δ S m ( y m , z m ) ,
where
Δ S m ( y m , z m ) = log 1 + γ d ( m ) log 1 + γ e ( m ) .

4.1. Formulated Optimization Problem

In this subsection, our objective is to boost the privacy capacity of the scheme using power and rate constraints with cooperative power distribution between T x (source) and R x (destination). As compared with the conventional physical layer security techniques, the proposed SCEO and swift privacy rate optimization algorithms are suitable for the Internet of Things, because the optimization algorithms are energy efficient; therefore, the low-energy consumption necessities of IoT is enormously satisfied. Specifically, in a wireless channel transmission scheme, intrinsic noise is deployed which degrades the quality of the eavesdropper’s received signal; thus, privacy in transmission is guaranteed with no cost of supplementary power. In summary, the application of the proposed technique in IoT technologies is low power capable as it does not necessitated the use of additional energy to guarantee privacy in transmission. The authors in [38] attempted to solve this low power problem through the bisection approach by swapping the source and destination powers optimizations, iteratively. However, in this work, we provided an improved solution by jointly assigning source and destination powers, thereby formulating the first optimization problem as (13):
m a x x , y 1 M m Ψ z log ( 1 + A m y n 1 + B m z m ) log ( 1 + C m y m 1 + D m z m ) s . t . 1 M m Ψ z log ( 1 + A m y n 1 + B m z m ) C s d m Ψ z z m p d , z m 0 m Ψ z m y m p s , y m 0 m z m = 0 , m Ψ z
where
Ψ z = Θ z Φ Θ z = m A m 1 + B m z m > C m 1 + D m z m , m Φ = m A m C m > B m D m , B m D m < 1 , m Ψ z = m m , m Ψ z
The privacy capacity of our system is considered as the objective function, and the approximation is performed over the privacy capacity of the group of subcarriers which warrants a positive capacity of ψ z . First, the rate constraint which guarantees the quality of service (QoS) of the network is considered. Although the techniques warrant data exchange or channel feedback between the authentic users, which can result in a slight rate performance degradation, typically IoT devices and applications have very low data rates. Therefore, this setback of low rate performance does not alter the adoption of the scheme in IoT operations. Second, the jamming mitigation power constraint which has its summation over the set of subcarriers ψ z is considered. This is due to the need to properly manage power so no power waste is experienced by subcarriers which might not guarantee a positive gain of privacy. Last, the third constraint which is the power constraint at Source is taken into consideration. Furthermore, the minimum expected rate is represented as C s d , whereas p s and p d are set to represent the optimal sum of powers at Source and Destination.
With the aim of exploring the Karush–Kuhn–Tucker (KKT) conditions, we formulated the Lagrangian function of the problem as
L ( y , z , λ , μ y , μ z , υ y , υ z ) = 1 M m ψ z log ( 1 + A m y m 1 + B m z m ) log ( 1 + C m y m 1 + D m z m ) μ y R y μ z R z + μ y ( m y m p s ) + υ z ( m ψ z y m p d ) + λ C ˜ s d 1 M m ψ z log ( 1 + A m y m 1 + B m z m )
Considering the KKT conditions as
m ψ z l y m = φ m ( y m , z m ) 1 M A m 1 + B m z m A m y m μ y ( m ) + υ y = 0 l z m = φ m ( y m , z m ) 1 M B m 1 + B m z m A m y m B m 1 + B m z m μ z ( m ) + υ z = 0 y m 0 , μ y ( m ) 0 , y m μ y ( m ) = 0 , m z m 0 , μ z ( m ) 0 , z m μ z ( m ) = 0 , m ψ z υ y 0 , m y m p s , υ y m y m p s = 0 υ z 0 , ψ y y m p d , υ z ψ y y m p d = 0 λ 0 , C ˜ s d 1 M m ψ z log ( 1 + A m y m 1 + B m z m ) λ C ˜ s d 1 M m ψ z log ( 1 + A m y m 1 + B m z m ) = 0
where
φ ( y m , z m ) = 1 M A m 1 + B m z m + A m y m 1 M C m 1 + D m z m + C m y m
ϑ m ( y m , z m ) = 1 M B m 1 + B m z m + A m y m ) B m 1 + B m z m D m 1 + D m z m + C m y m + D m 1 + D m z m
Equations (16)–(18) above are the derivations of the KKT conditions which the Lagrangian function of the problem must satisfy for optimal solution to be achieved.
Apparently, attempting to find solution to the source-to-destination KKT conditions, a two-dimensional (2-D) bisection search estimation is performed on parameters λ , ν , and μ as analyzed in Algorithm 1.
Algorithm 1 Algorithm to solve problem (15) by solving the KKT conditions of (16), using 2-D search approach for μ , ν , and  λ .
Initialize:
A m , B m , C m , D m , y m , m ; p s ; s d ; C S O D ; ε , ζ .
Generate:
1:
Initiate λ = 0 therefore, eliminating the rate constraint), perform search for ν and y .
2:
Compute C ( y ) as s d capacity.
3:
if C ( y ) > C S O D then
4:
revert y (meaning the rate constraint is achieved).
5:
else2-D search: perform search for ν = 0 to satisfy power constraint till precision ε is achieved. Perform search λ > 0 for every given ν to achieve the rate constraint until precision ζ is achieved. Given each pair of λ and ν , y m 0 is achieved as the solution of (24) for every m .
6:
revert y (meaning the rate constraint is achieved).
7:
end if
Considering Algorithm 1 (bisection algorithm), the following set of equations which require solution will be encountered. These represent two nonlinear systems of equations:
l y m = φ m ( y m , z m ) λ M A m 1 + B m z m A m y m μ y ( m ) + υ y = 0 l z m = φ m ( y m , z m ) λ M B m 1 + B m z m A m y m B m 1 + B m z m μ z ( m ) + υ z = 0 .
Finding solution for the KKT conditions which contains these two nonlinear equations appears to be unnerving; therefore, we consider applying the approach of sequential convex approximation.

4.2. Sequential Convex Approximation

In attempt to realize a sequential convex approximation, the rate constraint and the objective function which constitute the optimization problem formulated in (13) is rewritten as (20) below.
f ( y , z ) = 1 M m Θ z log ( 1 + A m y m 1 + B m z m ) log ( 1 + C m y m 1 + D m z m ) = 1 M m Θ z log ( 1 + B m z m + A m y m ) + log ( 1 + D m z m ) 1 M m Θ z log ( 1 + D m z m + C m y m ) + log ( 1 + B m z m ) = f 1 ( y , z ) + f 2 ( y , z ) 1 M m log ( 1 + B m z m + A m y m ) 1 M m log ( 1 + B m z m ) C s d f 3 ( y ) + f 4 ( y , z ) C s d
Evidently, f 1 and f 4 functions are concave while f 2 and f 3 functions are convex. Considering first-order Taylor series expansion of convex functions as the function’s underestimator. By denoting the first-order Taylor series expansion of f 2 and f 3 around ( y ( h ) , z ( h ) ) points and expressing them, respectively, as  f ˜ 2 ( h ) , f ˜ 3 ( h ) , the following was realized,
f 1 ( y , z ) + f 2 ( y , z ) f 1 ( y , z ) + f ˜ 2 ( h ) ( y , z ) y , z M f 4 ( y , z ) + f 3 ( z ) f 4 ( y , z ) + f ˜ 3 ( h ) ( z ) y , z M
where
f ˜ 2 ( h ) ( y , z ) = f 2 ( y ( h ) , z ( h ) ) + f 2 ( y ( h ) , z ( h ) ) R ( y z y ( h ) z ( h ) ) f ˜ 3 ( h ) ( z ) = f 3 ( z ( h ) ) + f 3 ( z ( h ) ) R ( z z ( h ) ) f 2 ( y , z ) = 1 M C 1 1 + D 1 z 1 + C 1 y 1 C M 1 + D M z M + C M y M D 1 1 + D 1 z 1 + C 1 y 1 + B 1 1 + B 1 z 1 D M 1 + D M z M + C M y M + B M 1 + B M z M f 3 ( z ) = 1 M B 1 1 + B 1 z 1 B M 1 + B M z M
Based on work done in [34] and assuming B m D m < 1 we further simplify Θ z and obtain
Θ z = m z m 0 , A m 1 + B m z m > C m 1 + D m z m , m = m ( B m C m A m D m ) z m > A m C m , m = m z m A m C m B m C m A m D m , 1 > A m C m > B m D m , m m z m 0 , 1 < A m C m > B m D m , m
Thus, following iteration h, we formulate the optimization problem as follows,
max y , z f 1 ( y , z ) + f ˜ 2 ( h ) ( y , z ) s . t . f 4 ( y , z ) + f ˜ 3 ( h ) ( z ) C s d m z m p d , z m 0 m z m = 0 m m A m C m < B m D m < 1 , m m B m D m > 1 , m z m A m C m B m C m A m D m m m 1 > A m C m > B m D m , m m y m p s , y m 0 m
It is observed that a convex optimization problem occurs at each point of iteration. This attempts to optimize a lower bound on the primal objective function and guarantees the rate constraint. As the iterative Algorithm reaches convergence, a decent approximation on the optimal values is expected. The optimization process is detailed in Algorithm 2.
Algorithm 2 Sequential Convex Estimation Optimization Algorithm for solving optimization problem.
Initialize:
( A m , B m , C m , D m ) : m , p d , p s , C s d , ζ .
Generate:
y ( 0 ) = 1 M p s 1 M
z ( 0 ) = 1 Θ x p d a ( i ) = 1
1:
if ( i Θ x )
2:
else a ( i ) = 0 , t = 1
3:
WhileTruedo
4:
end if
 Perform the convex optimization problem in (18) to realize y ( t ) , z ( t ) ,
if ( [ y ( t ) ; z ( t ) ] [ y ( t 1 ) ; z ( t 1 ) ] < ζ ) then
  break.
else
   t = t + 1
end if
5:
end
6:
return y ( t ) , z ( t ) ;

4.3. Optimization of Swift Privacy Rate in a MIMOME

Considering a network scenario where multiple eavesdroppers operate, the first assumption in realizing a swift privacy rate will be that Eve has full knowledge of her covariance matrix of noise and interference ( M E ) just as she has full knowledge of all her entire CSIs (as earlier stated); then, she can make use of the optimal receiving antenna and her achievable rate would be derived as
R T E = log M E + a A 1 Z r A 1 G log M E
where
M E = I + a P m A T x r A 2 A 2 G + e P B A R x B B G
Then, the swift realizable privacy rate would be expressed as
P R = R T R R T E +
However, for a multiple-input multiple-output multiple-antenna eavesdropping (MIMOME) system, assuming there is a constraint on the number of Eve’s antenna ( A E ) , one major issue of the system will be on how can to optimize the parameters of the transmission in such a way that Eve’s interference in the transmission is made difficult. This becomes our focus in this subsection.
In this MIMOME system, if there is great increase in of ( A E ) , the artificial noise does not have a significant impact on the rate of transmission between T x and Eve ( R T E ) . Therefore, the assumption in this subsection is that there is a constraint on Eve’s maximum number of antennas; therefore, for the reason of optimization, a worst case is assumed, and thus this maximum number of antennas is considered as ( A E ) .
To achieve this optimization, T x and R x cannot utilize the swift CSI at Eve, so as earlier mentioned, P R is inappropriate for this optimization. From some previous research [6,13,18], it is observed that Eve’s symptotic rate is a decent approximation to the tangible rate; thus, we adopted this fact in order to achieve optimization. Suppose that the we make no assumption on the realizable random parameter ( r ) and assuming that z r is a vector encompassing the transverse elements of Z r , and  ( A E ) is discreetly huge. Then, by rewriting (26), we obtained
R T E = log I + a P m A T x r A 2 A 2 G + e P B A R x B B G + a A 1 z r A 1 G log I + a P m A T x r A 2 A 2 G + e P B A R x B B G = log I + K 3 Θ ¯ 3 K 3 G log I + K 4 Θ ¯ 4 K 4 G ,
as K 3 and K 4 are expanded as K 3 = 1 A E A 1 , A 2 A 3 , and K 4 = 1 A E A 2 , B . where
Θ ¯ 3 = A E trans a z r P , a P m A T x r 1 A T x r , b P B A R x 1 A R x ,
Θ ¯ 4 = A E trans a P m A T x r 1 A T x r , b P B A R x 1 A R x ,
Deriving from the approximation of R T E , an objective function which entails the approximation of P R is proposed. Note that the proposed objective function does not depend on the CSI of Eve; however, it considers the approximate swift rate of Eve. Likewise, as it is assumed that the transmitter and receiver has full knowledge of the null space ( G ) , the receivers exact rate is applied but not in its asymptotic form. The objective function is expressed as follows,
h ( z r , P m , P B ) = log M B + G V 1 Z r V 1 G G G + log M B + A E Ω β ¯ 3 , Θ ¯ 3 , σ ¯ 3 A E Ω β ¯ 4 , Θ ¯ 4 , σ ¯ 4 ,
where M B implies that the receiver has full knowledge of her covariance matrix of noise and interference, β ¯ 3 = A T x + A R x A E , β ¯ 4 = A T x r + A R x A E , while σ ¯ 3 and σ ¯ 4 are solutions to the formulated problem. In order to optimize the swift privacy rate, we proposed an optimization problem as stated below.
r min z r , P m , P B min h z r , P m , P B s . t . i = 1 r z r ( i ) + P m P A max z r ( i ) 0 , i = 1 , . . . , r P m 0 0 P B P B max
In the optimization problem above, the constraints are in their convex form; nevertheless, h ( . ) is yet to assume a convex form. We can achieve this by rewriting the function
h ( z r , P m , P ) = log M B + G V 1 Z r V 1 G G G + log M B + A E β ¯ 3 υ Θ 3 ( σ ¯ 3 ) A E β ¯ 4 υ Θ 4 ( σ ¯ 4 ) + A E log σ ¯ 4 σ ¯ 3 + A E σ ¯ 3 σ ¯ 4 log ( c ) = log M B + G V 1 Z r V 1 G G G + log M B + k = 1 N Θ ¯ 3 log 1 + σ ¯ 3 ( Θ ¯ 3 ) k , k k = 1 N Θ ¯ 4 log 1 + σ ¯ 4 ( Θ ¯ 4 ) k , k + A E log σ ¯ 4 σ ¯ 3 + A E σ ¯ 3 σ ¯ 4 log ( c )
From Equation (33), we can linearize + k = 1 N Θ ¯ 3 log 1 + σ ¯ 3 ( Θ ¯ 3 ) k , k , which is the convex form of h ( . ) at every iteration point of the optimization algorithm using the expansion method of first-order Taylor series. Similarly, we can resolve the reliance state of h ( . ) on the σ ¯ 3 , σ ¯ 4 parameters by making them constant with respect to their values and the upgrading them at the end to achieve the following,
1 σ ¯ i j + 1 = β ¯ i σ ¯ i j + 1 N Θ ¯ i k = 1 N Θ ¯ i ( Θ ¯ i j + 1 ) k , k 1 + σ ¯ i j + 1 ( Θ ¯ i j + 1 ) k , k , i = 3 , 4 .
note that j + 1 represents the parameter value at j + 1 iteration. Thus, we optimized the preceding convex function at j iteration,
g j ( y r ) = log M B + G V 1 Z r V 1 G G G k = 1 N Θ ¯ 4 log 1 + σ ¯ 3 j ( Θ ¯ 4 ) k , k + y r y r j J y r f j y r = y r j ,
denoting y r = z r J , P m , P B J and f j ( y r ) = log M B + k = 1 N Θ ¯ 3 log 1 + σ ¯ 3 j ( Θ ¯ 3 ) k , k . Recall that terms that are constant were not used in (25) because they do not have any effect in the optimization. However, at this point, h ( . ) has assumed a convex function and we can then optimize it using the preceding optimization
y r j + 1 = y r arg min g j ( y r ) s . t . i = 1 r z r ( i ) + P m P A max z r ( i ) 0 , i = 1 , . . . , r P m 0 0 P B P B max .
Similarly, at this point, if any possible values of r is deployed, an optimal output will be recorded. The summary of our proposed optimization procedure can be seen in Algorithm 3. Although different optimization methods to tackle this kind of problem were proposed in [13,18] comparatively, these methods give almost similar outcome, nonetheless, our proposed Algorithm 3 significantly executes with minimal complexity. Our figures illustrate the efficiency and out-performance of our swift optimization algorithm as compared with nonoptimal parameters.
Algorithm 3 Swift privacy rate optimization algorithm.
Input actual:
ε , σ ¯ 3 0 , σ ¯ 4 0 , and initiate h min = 0
1:
for r = 1 : A T x do
2:
 Set y r to satisfy the constraints
3:
while y r j y r j 1 y r j 1 > ε do
4:
  execute (28) till y r j + 1 is realized
5:
  execute (25) using y r j 1 till σ ¯ 3 0 , σ ¯ 4 0 is updated
6:
   j = j + 1 .
7:
end while
8:
if h y r j < h min then
9:
   h min = h y r j
10:
    y min = y r j
11:
end if
12:
end for
13:
Revert y min .

5. Numerical Analysis and Results

In this section, MATLAB simulation results based on our proposed SCEO algorithm and the Swift privacy rate optimization algorithm is presented. Our investigations show that the magnitudes of all transmission channels are distributed in a Rayleigh form with an even unit of mean square, while the attenuation factor of the transmission self-interference ρ is set to be 0.8 , except where slight changes are required. The transmission power constraints were set at 20 d b except where otherwise stated.

5.1. Realized Privacy Capacity

We performed a transmission performance evaluation for a three-node transmission under power and rate constraints as shown in Figure 3 and Figure 4. A comparison of three separate transmission scenarios with respect to the privacy capacity of their transmissions is shown in the experiment.
Figure 3 indicates privacy capacity against Eve, whereas Figure 4 represents the data rate of the transmission between the source and destination (Source-to-Destination) specifically realizing for the entire A m < C m , m . This clearly implies that, for the entire set of subcarriers, the Eve’s channel is stronger from the Source ( T x ) than the Destination ( R x ) has from the Source.
For Transmission 1 (the first transmission scenario), at the Source and Destination terminals, data rate is optimized subject to power constraints. However, this occurs without the constraint for privacy capacity. The subsequent obtainable data rate is signified by C S O D , 1 . On the other hand, as expected for this channel, the subsequent privacy capacity S c , 1 is realized as zero.
For Transmission 2, the transmissions privacy capacity is optimized subject to power constraints at Source and Destination likewise a rate constraint of Source-to-Destination. Setting the lesser bound on the rate (i.e., the constrained rate) at C S O D = 0.8 C S O D , 1 , the equivalent rate realized at the channel transmission is signified by C S O D , 2 , as anticipated, the curve is vague from that of C S O D . S c , 2 represents the subsequent attained transmission privacy capacity and it is huge and quite close to Transmission 3.
In Transmission 3 (the third transmission scenario), the privacy capacity is optimized with only power constraint at Source and Destination without considering any rate constraint. Subsequently, we represented the privacy capacity as S c , 3 while the data transmission rate is signified as C S O D , 3 .
Considering the three transmission scenarios, it is observed that the result obtained at the second scenario (Transmission 2) outperform the other two transmission scenarios in terms of source-to-destination data rate trade-off and the transmission’s privacy capacity.

5.2. Joint Power Assignment for Multiple Destinations

For a multiple transmission destinations scenario, we considered C n = χ C n , representing C n as the optimal data rate attainable from Source to Destination when power p s N is assigned to Source for data broadcast to the n th destination. Considering χ = 0.8 and N = 4 , Figure 5 and Figure 6, respectively, represent the maximum attained privacy capacities and data rates from the source-to-destination. Likewise, the equivalent outputs with no rate constraint are represented in the two figures. It is observed that if rate constraints are applied, a small measure of privacy capacities is lost, however, significant data rates are gained and maintained. For both Figure 5 and Figure 6, under rate constraint, both the achieved and constrained rates are separable.

5.3. Joint Power Assignment for Multiple Sources

For a multiple transmission source scenario, considering the n th transmission source, we set the rate constraint as C n = χ C n , representing C n as the optimal data rate attainable from Source to Destination when power p s , n = p s M is assigned to Destination for data broadcast from the n th Source. Figure 7 and Figure 8 present the data rates and privacy capacities for all three different sources. The subsequent result shows that although a small measure of privacy capacity is lost in the absence of rate constraint, significant data rates are gained and maintained.

5.4. Performance Comparison of Difference Algorithms

In Figure 9 and Figure 10, we compared our proposed sequential convex estimation optimization (SCEO), which is intended to mitigate the optimization problem in (15) against the Bisection method in [38] and the two-stage cooperative jamming scheme (TSCS) in [44]. A total of 60 transmitting antennas were selected for both experiments. For the rate constraints, about 0.8 of optimal attainable capacity (OAA) was selected for Figure 9, whereas for Figure 10, the power constraint ( p s = p d = p ) is set at 20 dB.
Figure 9 indicates that mostly if the power constraints are low, our proposed SCEO technique is latent enough to obtain optimal values. Comparing the three different techniques in Figure 10 at different variations of rate constraint. Our technique is observed to outperform the other two compared techniques notwithstanding severe rate constraints. Moreover, as the rate constraints becomes more severe, convergence might be difficult for the TSCS and Bisection techniques but our algorithm converges almost seamlessly.
Finally, the complexity analysis of our swift privacy rate optimization algorithm in a multiple transmission and multiple eavesdropper scenario is shown in Figure 11. We set the optimization parameters as A E = A T x , β 1 = 6 , P n max = P B max = 20 dB. From the result of our investigation, there were no evident patterns in the optimal values, in addition, the optimal parameters are dependent on the outputs of G . Nevertheless, P n can be assumed to be frequently and approximately distributed evenly among the channels. Finally, it is observed that as A E becomes larger, the minimal P B and r are respectively favored by the optimization.

6. Conclusions

In this study, we explore the privacy capacity of wireless transmitting networks in several schemes relating to full-duplex jamming. Subject to both the transmission rate and power constraints, we considered and implemented an efficient power allocation optimization algorithm for enhancing privacy capacity in a three-node transmitting network and also in a real life MIMOME scenario. The applications of the resulting research and results can be applied to current wireless communication networks seen in rampant use in both IoT and 5G networks. Our experimental results showed that by using the sequential convex estimation optimization (SCEO) algorithm, a more optimal result and enhanced convergence is achieved. However, due to possible challenges envisaged when a multiple eavesdropper is active in a network, we expanded our research to develop a swift privacy rate optimization algorithm, which executes significantly with minimal complexity when compared with nonoptimal parameters. The use of the rate constraint together with self-interference of the full-duplex at the receiving node makes the performance of our technique outstanding from the recent studies reviewed. Furthermore, we extended our study to consider a scenario where multiple sources and multiple destinations are in use. Finally, our technique indicates that as the iterative algorithm reaches convergence, a decent approximation on the optimal values is achieved. In a future work, we intend to consider a stochastic optimization approach for privacy capacity with Eve’s CSI Unknown to Users.

Author Contributions

Conceptualization, J.H.A. and Y.T.; methodology, J.H.A. and C.I.; software, A.O.; validation, J.H.A, Y.T., C.I., and G.S.; formal analysis, Y.T. and J.H.A.; investigation, A.O. and J.H.A; resources, O.J. and G.S.; data curation, J.H.A.; writing—original draft preparation, J.H.A.; writing—review and editing, C.I., and G.S.; visualization, C.I.; supervision, Y.T.; project administration, J.H.A. and O.J.; funding acquisition, O.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2018R1C1B5045013).

Acknowledgments

The authors wish to acknowledge the technical, supervision and material supports received from Tang Yue, Department of Communication Engineering, College of Internet of Things, Hohai University, Changzhou Campus, China.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Anajemba, J.H.; Tang, Y.; Ansere, J.A.; Iwendi, C. Performance Analysis of D2D Energy Efficient IoT Networks with Relay-Assisted Underlaying Technique. In Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23 October 2018; pp. 3864–3869. [Google Scholar] [CrossRef]
  2. Schneider, P.; Horn, G. Towards 5G security. In Proceedings of the 4th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Helsinki, Finland, 20–22 August 2015. [Google Scholar]
  3. Alavi, F.; Mokari, N.; Javan, M.R.; Cumanan, K. Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints. IEEE Trans. Veh. Technol. 2017, 66, 8072–8085. [Google Scholar] [CrossRef] [Green Version]
  4. Sun, X.; Yang, W.; Cai, Y. Secure Communication in NOMA-Assisted Millimeter-Wave SWIPT UAV Networks. IEEE Internet Things J. 2020, 7, 1884–1897. [Google Scholar] [CrossRef]
  5. Yu, W.; Chorti, A.; Musavian, L.; Poor, H.V.; Ni, Q. Effective Secrecy Rate for a Downlink NOMA Network. IEEE Trans. Wirel. Commun. 2019, 18, 5673–5690. [Google Scholar] [CrossRef] [Green Version]
  6. Shang, X.; Yin, H.; Wang, Y.; Li, M.; Wang, Y. Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold. Sensors 2020, 20, 1632. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  7. Zhou, Q.; Chan, C. Secrecy Capacity under Limited Discussion Rate for Minimally Connected Hypergraphical Sources. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2664–2668. [Google Scholar] [CrossRef]
  8. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  9. Khisti, A.; Wornell, G.W. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel. IEEE Trans. Inf. Theory 2010, 56, 3088–3104. [Google Scholar] [CrossRef] [Green Version]
  10. Lin, P.-H.; Lai, S.-H.; Lin, S.-C.; Su, H.-J. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1728–1740. [Google Scholar] [CrossRef] [Green Version]
  11. Oggier, F.; Hassibi, B. The secrecy capacity of the MIMO wiretap channel. IEEE Trans. Inf. Theory 2011, 57, 4961–4972. [Google Scholar] [CrossRef] [Green Version]
  12. Fakoorian, S.A.A.; Swindlehurst, A.L. Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer. IEEE Trans. Signal Process. 2011, 59, 5013–5022. [Google Scholar] [CrossRef] [Green Version]
  13. Ortega, Y.R.; Upadhyay, P.K.; Da Costa, D.B.; Bithas, P.S.; Kanatas, A.G.; Dias, U.S.; de Sousa, R.T., Jr. Joint effect of jamming and noise on the secrecy outage performance of wiretap channels with feedback delay and multiple antennas. Trans. Emerg. Telecommun. Technol. 2017, 28, e3191. [Google Scholar] [CrossRef]
  14. Mahmood, N.H.; Ansari, I.S.; Mogensen, P.; Qaraqe, K.A. On the ergodic secrecy capacity with full duplex communication. In Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017. [Google Scholar]
  15. Xie, J.; Ulukus, S. Secure Degrees of Freedom of One-Hop Wireless Networks. IEEE Trans. Inf. Theory 2014, 60, 3359–3378. [Google Scholar] [CrossRef] [Green Version]
  16. Hua, Y.; Zhu, Q.; Sohrabi, R. Fundamental properties of full-duplex radio for secure wireless communications. arXiv 2017, arXiv:1711.10001. Available online: https://arxiv.org/abs/1711.10001 (accessed on 1 May 2020).
  17. Hua, Y. Advanced Properties of Full-Duplex Radio for Securing Wireless Network. IEEE Trans. Signal Process. 2018, 67, 120–135. [Google Scholar] [CrossRef] [Green Version]
  18. Iwendi, C.; Zhang, Z.; Du, X. ACO based key management routing mechanism for WSN security and data collection. In Proceedings of the 2018 IEEE International Conference on Industrial Technology (ICIT), Lyon, France, 20–22 February 2018; pp. 1935–1939. [Google Scholar] [CrossRef]
  19. Zhou, Y.; Xiang, Z.Z.; Zhu, Y.; Xue, Z. Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization. IEEE Signal Process. Lett. 2014, 21, 804–808. [Google Scholar] [CrossRef]
  20. Cepheli, O.; Dartmann, G.; Kurt, G.K.; Ascheid, G. A Joint Optimization Scheme for Artificial Noise and Transmit Filter for Half and Full Duplex Wireless Cyber Physical Systems. IEEE Trans. Sustain. Comput. 2017, 3, 126–136. [Google Scholar] [CrossRef]
  21. Yun, S.; Park, J.; Im, S.; Ha, J. On the Secrecy Rate of Artificial Noise Assisted MIMOME Channels with Full-Duplex Receiver. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
  22. Masood, M.; Ghrayeb, A.; Babu, P.; Khalil, I.; Hasna, M. A Minorization-Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel. IEEE Commun. Lett. 2016, 21, 1. [Google Scholar] [CrossRef]
  23. Liu, S.; Hong, Y.; Viterbo, E. Artificial Noise Revisited. IEEE Trans. Inf. Theory 2015, 61, 3901–3911. [Google Scholar] [CrossRef] [Green Version]
  24. Sohrabi, R.; Hua, Y. A New Look at Secrecy Capacity of Mimome Using Artificial Noise From Alice and Bob Without Knowledge of Eve’S Csi. In Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, CA, USA, 26–29 Novomber 2018; pp. 1291–1295. [Google Scholar]
  25. Yang, Y.; Scutari, G.; Palomar, D.P.; Pesavento, M. A Parallel Decomposition Method for Nonconvex Stochastic Multi-Agent Optimization Problems. IEEE Trans. Signal Process. 2016, 64, 2949–2964. [Google Scholar] [CrossRef]
  26. Liu, A.; Lau, V.; Kananian, B. Stochastic Successive Convex Approximation for Non-Convex Constrained Stochastic Optimization. CoRR, vol. abs/1801.08266. 2018. Available online: http://arxiv.org/abs/1801.08266 (accessed on 1 May 2020).
  27. Zheng, B.; Wen, M.; Wang, C.-X.; Wang, X.; Chen, F.; Tang, J.; Ji, F. Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex. IEEE J. Sel. Areas Commun. 2018, 36, 1426–1440. [Google Scholar] [CrossRef]
  28. Cepheli, Ö.; Tedik, S.; Kurt, G.K. A High Data Rate Wireless Communication System With Improved Secrecy: Full Duplex Beamforming. IEEE Commun. Lett. 2014, 18, 1075–1078. [Google Scholar] [CrossRef]
  29. Zhou, Y.; Zhu, Y.; Xue, Z. Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 3320–3325. [Google Scholar]
  30. Zhou, Y.; Li, F.; Guo, P.; Xue, Z. Robust MIMO beamforming and power allocation for artificial noise generated by both transmitter and receiver. In Proceedings of the 9th International Conference on Communications and Networking in China, Maoming, China, 14–16 August 2014. [Google Scholar]
  31. Heo, J.; Kim, J.-J.; Jeongyeup, P.; Saewoong, B. Mitigating stealthy jamming attacks in low-power and lossy wireless networks. J. Commun. Netw. 2018, 20, 219–230. [Google Scholar]
  32. Li, M.; Koutsopoulos, I.; Poovendran, R. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2010, 9, 1119–1133. [Google Scholar] [CrossRef]
  33. Matsushita, T.; Taniguchi, Y. A Method for Selecting Jamming Nodes Considering SINR to Prevent Eavesdropping in Wireless Networks. In Proceedings of the 2017 4th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE), Nadi, Fiji, 11–13 December 2017. [Google Scholar]
  34. Dorus, R.; Vinoth, P. Mitigation of jamming attacks in wireless networks. In Proceedings of the 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), Tamil Nadu, India, 25–26 March 2013; pp. 168–171. [Google Scholar] [CrossRef]
  35. Chiang, J.T.; Hu, Y.-C. Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks. IEEE/ACM Trans. Netw. 2010, 19, 286–298. [Google Scholar] [CrossRef]
  36. Li, X.; Dai, H.-N. Friendly-Jamming: An anti-eavesdropping scheme in wireless networks. In Proceedings of the 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Macau, China, 12–15 June 2017. [Google Scholar] [CrossRef]
  37. Yu, B.; Zhang, L.-Y. An improved detection method for different types of jamming attacks in wireless networks. In Proceedings of the The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014), Shanghai, China, 15–17 Novomber 2014. [Google Scholar]
  38. Kutia, S.; Chauhdary, S.H.; Iwendi, C.; Liu, L.; Yong, W.; Bashir, A.K. Socio-Technological Factors Affecting User’s Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems. IEEE Access 2019, 7, 90777–90788. [Google Scholar] [CrossRef]
  39. Iwendi, C.; Uddin, M.; Ansere, J.A.; Nkurunziza, P.; Anajemba, J.H.; Bashir, A.K. On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique. IEEE Access 2018, 6, 47258–47267. [Google Scholar] [CrossRef]
  40. Iwendi, C.; AlQarni, M.A.; Anajemba, J.H.; Alfakeeh, A.S.; Zhang, Z.; Bashir, A.K. Robust Navigational Control of a Two-Wheeled Self-Balancing Robot in a Sensed Environment. IEEE Access 2019, 7, 82337–82348. [Google Scholar] [CrossRef]
  41. Vincent, P.M.D.R.; Deepa, N.; Elavarasan, D.; Srinivasan, K.; Chauhdary, S.H.; Iwendi, C. Sensors Driven AI-Based Agriculture Recommendation Model for Assessing Land Suitability. Sensors 2019, 19, 3667. [Google Scholar] [CrossRef] [Green Version]
  42. Mittal, M.; Iwendi, C. A Survey on Energy-Aware Wireless Sensor Routing Protocols. EAI Endorsed Trans. Energy Web 2019, 6. [Google Scholar] [CrossRef]
  43. Iwendi, C.; Allen, A.; Offor, K. Smart security implementation for wireless sensor network nodes. J. Wirel. Sens. Netw. 2015, 1, 1. [Google Scholar]
  44. Iwendi, C.; Allen, A. Enhanced security technique for wireless sensor network nodes. In Proceedings of the IET Conference on Wireless Sensor Systems (WSS 2012), London, UK, 18–19 June 2012. [Google Scholar]
  45. Iwendi, C.; Ponnan, S.; Munirathinam, R.; Srinivasan, K.; Chang, C.-Y. An Efficient and Unique TF/IDF Algorithmic Model-Based Data Analysis for Handling Applications with Big Data Streaming. Electronics 2019, 8, 1331. [Google Scholar] [CrossRef] [Green Version]
  46. Li, Z.; Yates, R.; Trappe, W. Secrecy capacity of independent parallel channels. In Securing Wireless Communications at the Physical Layer; Springer: Boston, MA, USA, 2010; pp. 1–18. Available online: http://dx.doi.org/10.1007/978-1-4419-1385-2_1 (accessed on 1 May 2020).
  47. Cha, S.-C.; Hsu, T.-Y.; Xiang, Y.; Yeh, K.-H. Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges. IEEE Internet Things J. 2018, 6, 2159–2187. [Google Scholar] [CrossRef]
  48. Yeh, K. A Secure IoT-Based Healthcare System with Body Sensor Networks. IEEE Access 2016, 4, 10288–10299. [Google Scholar] [CrossRef]
  49. Xu, Z.; Gu, R.; Huang, T.; Xiang, H.; Zhang, X.; Qi, L.; Xu, X. An IoT-Oriented Offloading Method with Privacy Preservation for Cloudlet-Enabled Wireless Metropolitan Area Networks. Sensors 2018, 18, 3030. [Google Scholar] [CrossRef] [Green Version]
  50. Iwendi, C.; Jalil, Z.; Javed, A.R.; Thippa, R.G.; Kaluri, R.; Srivastava, G.; Jo, O. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks. IEEE Access 2020, 8, 72650–72660. [Google Scholar] [CrossRef]
  51. Riihonen, T.; Werner, S.; Wichman, R. Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays. IEEE Trans. Signal Process. 2011, 59, 5983–5993. [Google Scholar] [CrossRef]
  52. Ng, D.W.K.; Lo, E.S.; Schober, R. Energy-Efficient Resource Allocation for Secure OFDMA Systems. IEEE Trans. Veh. Technol. 2012, 61, 2572–2585. [Google Scholar] [CrossRef]
  53. Anajemba, J.H.; Yue, T.; Iwendi, C.; Alenezi, M.; Mittal, M. Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation. IEEE Access 2020, 8, 53931–53941. [Google Scholar] [CrossRef]
  54. Reddy, G.T.; Sudheer, K.; Rajesh, K.; Lakshmanna, K. Employing data mining on highly secured private clouds for implementing a security-asa-service framework. J. Theor. Appl. Inf. Technol. 2014, 59, 317–326. [Google Scholar]
  55. Anajemba, J.H.; Tang, Y.; Ansere, J.A.; Sackey, S.H. Efficient Switched Digital Beamforming Radar System based on SIMO/MIMO Receiver. In Proceedings of the 2019 Computing, Communications and IoT Applications (ComComAp), Shenzhen, China, 26–28 October 2019. [Google Scholar]
  56. Al-Hayajneh, A.; Alam Bhuiyan, Z.; McAndrew, I. Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN). Computers 2020, 9, 8. [Google Scholar] [CrossRef] [Green Version]
  57. Babaei, A.; Schiele, G. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges. Sensors 2019, 19, 3208. [Google Scholar] [CrossRef] [Green Version]
  58. Reddy, G.T.; Kaluri, R.; Reddy, P.K.; Lakshmanna, K.; Koppu, S.; Rajput, D.S. A Novel Approach for Home Surveillance System Using IoT Adaptive Security. SSRN Electron. J. 2019. [Google Scholar] [CrossRef]
  59. Kumar, M.E.; Reddy, G.T.; Sudheer, K.; Reddy, M.P.K.; Kaluri, R.; Rajput, D.S.; Lakshmanna, K. Vehicle Theft Identification and Intimation Using GSM & IOT. IOP Conf. Ser. Mater. Sci. Eng. 2017, 263, 42062. [Google Scholar] [CrossRef]
Figure 1. A Wiretap Channel for Privacy Capacity model.
Figure 1. A Wiretap Channel for Privacy Capacity model.
Sensors 20 02609 g001
Figure 2. A single-antenna three-node wireless transmission with a full-duplex destination.
Figure 2. A single-antenna three-node wireless transmission with a full-duplex destination.
Sensors 20 02609 g002
Figure 3. Realized privacy capacity against eavesdroppers under power and rate constraints.
Figure 3. Realized privacy capacity against eavesdroppers under power and rate constraints.
Sensors 20 02609 g003
Figure 4. Realized privacy capacity for Source-to-Destination ( C S O D = 0.8 C S O D , 1 ) transmission under power and rate constraints.
Figure 4. Realized privacy capacity for Source-to-Destination ( C S O D = 0.8 C S O D , 1 ) transmission under power and rate constraints.
Sensors 20 02609 g004
Figure 5. Maximum realized privacy capacity for multiple destinations transmission.
Figure 5. Maximum realized privacy capacity for multiple destinations transmission.
Sensors 20 02609 g005
Figure 6. Source-to-Destination data rate for multiple destinations transmission.
Figure 6. Source-to-Destination data rate for multiple destinations transmission.
Sensors 20 02609 g006
Figure 7. Maximum realized privacy capacity for multiple sources transmission.
Figure 7. Maximum realized privacy capacity for multiple sources transmission.
Sensors 20 02609 g007
Figure 8. Source-to-Destination data rate for multiple sources transmission.
Figure 8. Source-to-Destination data rate for multiple sources transmission.
Sensors 20 02609 g008
Figure 9. Performance of the algorithms under different power constraints.
Figure 9. Performance of the algorithms under different power constraints.
Sensors 20 02609 g009
Figure 10. Performance of the algorithms with different rate constraints for p = 20 dB.
Figure 10. Performance of the algorithms with different rate constraints for p = 20 dB.
Sensors 20 02609 g010
Figure 11. Comparison of A ¯ E versus A ¯ T x with different parameters.
Figure 11. Comparison of A ¯ E versus A ¯ T x with different parameters.
Sensors 20 02609 g011

Share and Cite

MDPI and ACS Style

Anajemba, J.H.; Tang, Y.; Iwendi, C.; Ohwoekevwo, A.; Srivastava, G.; Jo, O. Realizing Efficient Security and Privacy in IoT Networks. Sensors 2020, 20, 2609. https://doi.org/10.3390/s20092609

AMA Style

Anajemba JH, Tang Y, Iwendi C, Ohwoekevwo A, Srivastava G, Jo O. Realizing Efficient Security and Privacy in IoT Networks. Sensors. 2020; 20(9):2609. https://doi.org/10.3390/s20092609

Chicago/Turabian Style

Anajemba, Joseph Henry, Yue Tang, Celestine Iwendi, Akpesiri Ohwoekevwo, Gautam Srivastava, and Ohyun Jo. 2020. "Realizing Efficient Security and Privacy in IoT Networks" Sensors 20, no. 9: 2609. https://doi.org/10.3390/s20092609

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop