3 research outputs found

    Securing internet of medical things with friendly-jamming schemes

    Get PDF
    The Internet of Medical Things (IoMT)-enabled e-healthcare can complement traditional medical treatments in a flexible and convenient manner. However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional cryptographic approaches, which are often computationally-complicated. In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT. In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges. We then propose using Fri-jam schemes to protect the confidential medical data of patients collected by medical sensors from being eavesdropped. We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity. Moreover, we present two case studies of Fri-jam schemes in IoMT. The results of these two case studies indicate that the Fri-jam method will significantly decrease the eavesdropping risk while leading to no significant influence on legitimate transmission

    Control of cognitive networks with friendly jamming as a service

    No full text
    We consider a cognitive radio network with single antenna primary user (PU), destination and eavesdropper, and multi-antenna secondary users (SUs). SUs act as helper nodes transmitting noise to confound a passive eavesdropper while nulling the interference leakage at the destination. The jamming helper nodes are non-altruistic, and they gain access to the primary network by aiding in the confidential transmissions of the PU. We obtain the secrecy outage probability as a closed-form expression when PU and SUs have merely statistical information about the eavesdropper channel. For the delay-unlimited system, we derive the achievable confidential rates given the control strategies for bandwidth and power allocation. For the more practical delay-limited case, we formulate a network control problem with secrecy appearing as a Quality of Service (QoS) constraint optimizing the confidential and open transmission rates of the PU and SUs respectively. Finally, we develop a dynamic control algorithm obtaining asymptotically optimal solution and demonstrate its performance by numerical experiments

    Control of Cognitive Networks With Friendly Jamming as a Service

    No full text
    corecore