https://www.mdu.se/

mdu.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Performance Analysis of an Energy-Harvesting IoT System Using a UAV Friendly Jammer and NOMA Under Cooperative Attack
Duy Tan Univ, Fac Informat Technol, Da Nang 550000, Vietnam.;Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam.;Khon Kaen Univ, Dept Comp Sci, Appl Network Technol ANT Lab, Fac Sci, Khon Kaen 40002, Thailand..
Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam.;Khon Kaen Univ, Dept Comp Sci, Appl Network Technol ANT Lab, Fac Sci, Khon Kaen 40002, Thailand..ORCID iD: 0000-0003-1026-191X
Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Phenikaa Univ, Dept Comp Sci, Hanoi 100000, Vietnam.;Mälardalen Univ, Sch Innovat Design & Engn, S-72123 Västerås, Sweden..
Duy Tan Univ, Fac Elect & Elect Engn, Da Nang 550000, Vietnam..
Show others and affiliations
2020 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 221986-222000Article in journal (Refereed) Published
Abstract [en]

In this article, we consider the information leakage and outage probabilities of a multiple-input single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a multiantenna ground base station (GBS) transmits messages to legitimate IoT destinations (LIDs) with the help of IoT relays (IRs) using non-orthogonal multiple access (NOMA) in the presence of a malicious jammer (MJ) and eavesdroppers (EAVs). The communication protocol is separated into two phases. In the EH phase, the IRs harvest energy from a power beacon (PB). In the information transmission (IT) phase, the communication process is further divided into two subphases: 1) The GBS broadcasts signals to the IRs using NOMA. Simultaneously, the MJ sends interfering signals to attack the IRs while the EAVs steal the confidential signals from the GBS, in a process called a cooperative attack. On the other hand, to protect the legitimate communication, an unmanned aerial vehicle (UAV) is used as a friendly jammer to defend against the EAVs. 2) A selected IR employs the time-switching-based relaying (TSR) technique to forward the received signal to the LIDs using NOMA. Similar to the first subphase, the LIDs are subjected to a cooperative attack, and the UAV attacks the EAVs in return. The secrecy performance of this communication protocol is characterized by deriving expressions for the information leakage probabilities (ILPs) for the LIDs' signals. A UAV altitude optimization algorithm is also proposed to achieve the best possible secrecy performance. Furthermore, we evaluate the system performance by deriving closed-form expressions for the outage probabilities (OPs). Accordingly, an algorithm is proposed to guarantee both the secrecy and system performance (in terms of the ILPs and OPs). Monte Carlo simulations are presented to verify our analytical results.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC , 2020. Vol. 8, p. 221986-222000
Keywords [en]
Cooperative attack, energy harvesting, information leakage probability, Internet of Things, NOMA, UAV friendly jammer
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:mdh:diva-53114DOI: 10.1109/ACCESS.2020.3044760ISI: 000603733400001Scopus ID: 2-s2.0-85098292094OAI: oai:DiVA.org:mdh-53114DiVA, id: diva2:1520641
Available from: 2021-01-21 Created: 2021-01-21 Last updated: 2024-05-03Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Tran, Hung

Search in DiVA

By author/editor
So-In, ChakchaiTran, Hung
By organisation
Embedded Systems
In the same journal
IEEE Access
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 68 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf