37 research outputs found

    Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones

    Get PDF
    This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network). The nodes in the secondary network are assumed to be solely powered by ambient RF energy harvested from the transmissions of the primary network. We assume that the secondary nodes can eavesdrop on the primary transmissions due to which the primary network uses secrecy guard zones. The primary transmitter goes silent if any secondary receiver is detected within its guard zone. Using tools from stochastic geometry, we derive the probability of successful connection of the primary network as well as the probability of secure communication. Two conditions must be jointly satisfied in order to ensure successful connection: (i) the SINR at the primary receiver is above a predefined threshold, and (ii) the primary transmitter is not silent. In order to ensure secure communication, the SINR value at each of the secondary nodes should be less than a predefined threshold. Clearly, when more secondary nodes are deployed, more primary transmitters will remain silent for a given guard zone radius, thus impacting the amount of energy harvested by the secondary network. Our results concretely show the existence of an optimal deployment density for the secondary network that maximizes the density of nodes that are able to harvest sufficient amount of energy. Furthermore, we show the dependence of this optimal deployment density on the guard zone radius of the primary network. In addition, we show that the optimal guard zone radius selected by the primary network is a function of the deployment density of the secondary network. This interesting coupling between the two networks is studied using tools from game theory. Overall, this work is one of the few concrete works that symbiotically merge tools from stochastic geometry and game theory

    Low-Power Wide-Area Networks: A Broad Overview of its Different Aspects

    Get PDF
    Low-power wide-area networks (LPWANs) are gaining popularity in the research community due to their low power consumption, low cost, and wide geographical coverage. LPWAN technologies complement and outperform short-range and traditional cellular wireless technologies in a variety of applications, including smart city development, machine-to-machine (M2M) communications, healthcare, intelligent transportation, industrial applications, climate-smart agriculture, and asset tracking. This review paper discusses the design objectives and the methodologies used by LPWAN to provide extensive coverage for low-power devices. We also explore how the presented LPWAN architecture employs various topologies such as star and mesh. We examine many current and emerging LPWAN technologies, as well as their system architectures and standards, and evaluate their ability to meet each design objective. In addition, the possible coexistence of LPWAN with other technologies, combining the best attributes to provide an optimum solution is also explored and reported in the current overview. Following that, a comparison of various LPWAN technologies is performed and their market opportunities are also investigated. Furthermore, an analysis of various LPWAN use cases is performed, highlighting their benefits and drawbacks. This aids in the selection of the best LPWAN technology for various applications. Before concluding the work, the open research issues, and challenges in designing LPWAN are presented.publishedVersio

    QoS-aware Stochastic Spatial PLS Model for Analysing Secrecy Performance under Eavesdropping and Jamming

    Full text link
    Securing wireless communication, being inherently vulnerable to eavesdropping and jamming attacks, becomes more challenging in resource-constrained networks like Internet-of-Things. Towards this, physical layer security (PLS) has gained significant attention due to its low complexity. In this paper, we address the issue of random inter-node distances in secrecy analysis and develop a comprehensive quality-of-service (QoS) aware PLS framework for the analysis of both eavesdropping and jamming capabilities of attacker. The proposed solution covers spatially stochastic deployment of legitimate nodes and attacker. We characterise the secrecy outage performance against both attacks using inter-node distance based probabilistic distribution functions. The model takes into account the practical limits arising out of underlying QoS requirements, which include the maximum distance between legitimate users driven by transmit power and receiver sensitivity. A novel concept of eavesdropping zone is introduced, and relative impact of jamming power is investigated. Closed-form expressions for asymptotic secrecy outage probability are derived offering insights into design of optimal system parameters for desired security level against the attacker's capability of both attacks. Analytical framework, validated by numerical results, establishes that the proposed solution offers potentially accurate characterisation of the PLS performance and key design perspective from point-of-view of both legitimate user and attacker.Comment: Accepted in IET communication

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    The survey on Near Field Communication

    Get PDF
    PubMed ID: 26057043Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Publisher's Versio
    corecore