14 research outputs found

    A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer

    Get PDF
    In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things (IoT) communication. A single-Antenna transmitter communicates with a half-duplex single-Antenna receiver in the presence of a sophisticated multiple-Antenna-Aided passive eavesdropper and a multiple-Antenna-Assisted hostile jammer (HJ). A low-complexity artificial noise (AN) injection scheme is proposed for drowning out the eavesdropper. Furthermore, for enhancing the resilience against HJ attacks, the legitimate nodes exploit their own local observations of the wireless channel as the source of randomness to agree on shared secret keys. The secret key is utilized for the frequency hopping (FH) sequence of the proposed communication system. We then proceed to derive a new closed-form expression for the achievable secret key rate (SKR) and the ergodic secrecy rate (ESR) for characterizing the secrecy benefits of our proposed scheme, in terms of both information secrecy and transmission resiliency. Moreover, the optimal power sharing between the AN and the message signal is investigated with the objective of enhancing the secrecy rate. Finally, through extensive simulations, we demonstrate that our proposed system model outperforms the state-of-The-Art transmission schemes in terms of secrecy and resiliency. Several numerical examples and discussions are also provided to offer further engineering insights

    Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

    Get PDF
    CCBY By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single-antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system & #x2019;s secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate

    Anti-bacterial effect of essential oil from Xanthium strumarium against shiga toxin-producing Escherichia coli

    No full text
    Shiga toxin-producing Escherichia coli (STEC) serotype O157:H7 is one of the most important human pathogenic microorganisms, which can cause life-threatening infections. Xanthium strumarium L. is a plant with anti-bacterial activity against gram-negative and gram-positive bacteria. This study aims to demonstrate in vitro efficacy of the essential oil (EO) extracted from Xanthium strumarium L. against E. coli O157:H7. Using the agar test diffusion, the effect of Xanthium strumarium L. EO (5, 10, 15, 30, 60, and 120 mg/mL) was verified at each of the four different growth phases of E. coli O157:H7. Cell counts of viable cells and colony forming unit (CFU) were determined at regular time points using Breed's method and colony counting method, respectively. No viable cell was detectable after the 1 hour-exposure to X. strumarium EO at 30, 60, and 120 mg/mL concentrations. No bacterial colony was formed after 1 h until the end of the incubation period at 24 h. At lower concentrations, the number of bacteria cells decreased and colonies could be observed only after incubation. At the exponential phase, the EO at 15 mg/mL was only bacteriostatic, while from 30 mg/mL started to be bactericidal. X. strumarium EO antibacterial activity against Shiga toxin-producing E. coli O157:H7 is dependent on EO concentration and physiological state of the microorganisms tested. The best inhibitory activity was achieved during the late exponential and the stationary phases
    corecore