Secure IoT Communications Using HARQ-Based Beamforming for MISOSE Channels
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yu, Heejung | - |
dc.contributor.author | Joung, Jingon | - |
dc.date.accessioned | 2022-02-12T11:41:20Z | - |
dc.date.available | 2022-02-12T11:41:20Z | - |
dc.date.created | 2022-02-09 | - |
dc.date.issued | 2021-12-01 | - |
dc.identifier.issn | 2327-4662 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/135498 | - |
dc.description.abstract | In this article, we consider physical-layer security (PLS) of the Internet-of-Things (IoT) communications based on hybrid automatic repeat request (HARQ) protocols in multiple-input single-output single-eavesdropper (MISOSE) channels. Owing to the reciprocity of wireless channels, a negative acknowledge frame can be used to obtain the channel state information (CSI) from a source with multiple antennas to an IoT destination device, and this CSI of a legitimate link is used for beamforming for the next transmission round (TR). Therefore, a higher secrecy rate can be expected from retransmissions with beamforming based on the CSI as compared to the first TR without CSI. To evaluate the secrecy throughput under time-invariant and time-varying channels, connection and secrecy outage probabilities (OPs) are derived. By exploiting the characteristics of the OPs, we suggest an approximated secrecy throughput. We then consider the optimization of the approximated secrecy throughput considering the rate parameters for legitimate and eavesdropping links. With an alternating optimization approach, an algorithm to find convergent system parameters, i.e., the rates for legitimate and eavesdropping links, is proposed. Moreover, an asymptotic analysis with the large number of transmit antennas indicates an interesting behavior of the secrecy rate with regard to the number of TRs. The analytical results are verified by rigorous numerical simulations and they can serve as a useful guideline to those involved in the design of secure IoT communication systems with HARQ in MISOSE channels. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | PHYSICAL-LAYER SECURITY | - |
dc.subject | BLOCK-FADING CHANNELS | - |
dc.subject | 5G WIRELESS NETWORKS | - |
dc.subject | HYBRID-ARQ PROTOCOLS | - |
dc.subject | ARTIFICIAL-NOISE | - |
dc.subject | MULTIPLE-ACCESS | - |
dc.subject | POWER ALLOCATION | - |
dc.subject | RATE ADAPTATION | - |
dc.subject | TRANSMISSION | - |
dc.subject | PERFORMANCE | - |
dc.title | Secure IoT Communications Using HARQ-Based Beamforming for MISOSE Channels | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Yu, Heejung | - |
dc.identifier.doi | 10.1109/JIOT.2021.3078062 | - |
dc.identifier.scopusid | 2-s2.0-85105845987 | - |
dc.identifier.wosid | 000720519000048 | - |
dc.identifier.bibliographicCitation | IEEE INTERNET OF THINGS JOURNAL, v.8, no.23, pp.17211 - 17226 | - |
dc.relation.isPartOf | IEEE INTERNET OF THINGS JOURNAL | - |
dc.citation.title | IEEE INTERNET OF THINGS JOURNAL | - |
dc.citation.volume | 8 | - |
dc.citation.number | 23 | - |
dc.citation.startPage | 17211 | - |
dc.citation.endPage | 17226 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | 5G WIRELESS NETWORKS | - |
dc.subject.keywordPlus | ARTIFICIAL-NOISE | - |
dc.subject.keywordPlus | BLOCK-FADING CHANNELS | - |
dc.subject.keywordPlus | HYBRID-ARQ PROTOCOLS | - |
dc.subject.keywordPlus | MULTIPLE-ACCESS | - |
dc.subject.keywordPlus | PERFORMANCE | - |
dc.subject.keywordPlus | PHYSICAL-LAYER SECURITY | - |
dc.subject.keywordPlus | POWER ALLOCATION | - |
dc.subject.keywordPlus | RATE ADAPTATION | - |
dc.subject.keywordPlus | TRANSMISSION | - |
dc.subject.keywordAuthor | Array signal processing | - |
dc.subject.keywordAuthor | Beamforming | - |
dc.subject.keywordAuthor | Eavesdropping | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | Internet of Things (IoT) | - |
dc.subject.keywordAuthor | Protocols | - |
dc.subject.keywordAuthor | Relays | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Throughput | - |
dc.subject.keywordAuthor | hybrid automatic repeat request (HARQ) | - |
dc.subject.keywordAuthor | outage probability (OP) | - |
dc.subject.keywordAuthor | physical layer security (PLS) | - |
dc.subject.keywordAuthor | secrecy throughput | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.