1. Introduction
The daily activities of modern living have become more integrated and, in many cases, reliant on technology. This holds true on the consumer level, as well as industrial and enterprise levels. Technologies that provide versatility and connectivity and enable efficient operations with simpler user experience have become prevalent. One of the most dominant technologies in this context are devices that can sense and/or actuate and control some physical quantity, are connected to the Internet, and can communicate with users or other devices. Such devices have become known as Internet of Things (IoT) devices. IoT devices can be loosely categorized into consumer and industrial general types, with predictions expecting the number of connected IoT devices globally to exceed 32 billion by 2030 [
1]. IoT expands a large spectrum of technologies from drones, robots, connected vehicles, health devices, controllers, grid electric transformers, and many other industries. IoT devices have existed since the early days of the Internet and have since become an increasingly fascinating manifestation of technological development.
Industrial use cases across many domains extensively utilize IoT to perform sensing and actuation tasks with minimal human intervention [
2], thus supporting higher levels of automation and autonomy. Hence, cybersecurity and resilience become critical, specifically in ensuring the integrity, confidentiality, and availability of the IoT devices and communication connectivity to the devices. While IoT devices vary largely in capabilities and the nature of available computational resources, the general trend in the industry optimizes on-device resources such as processing, memory, storage, energy usage, and cost based on functionality and purpose. This often has resulted in IoT technologies suffering from serious security flaws and gaps. In fact, several major cybersecurity attacks during the past few years have leveraged IoT devices as part of the attack kill chain [
3,
4]. Most recently, many efforts have focused on improving IoT built-in security.
Cybersecurity encompasses technologies and practices to safeguard information’s availability, integrity, and confidentiality. Traditional cybersecurity measures primarily focus on preventing the unauthorized access, disruption, and modification of information. The evolution of such controls was historically based on a special class of technologies (Information Technologies or IT) used in information systems within typical computer networks. Traditional cybersecurity defenses and controls, such as access control, key management, and encryption schemes, often prove impractical for ecosystems with limited storage, processing, and transmission capabilities [
5,
6,
7]. Security priorities in an IoT system rely heavily on the nature of the system, whereas, in delay-sensitive critical infrastructures, availability and integrity are of the highest priority. In other IoT environments, such as health monitoring, confidentiality may be of higher priority. In critical control operations and industrial processes, measures for the confidentiality of information prevent unauthorized access to sensor measurements by an illegitimate eavesdropper, thus avoiding the disclosure of the industrial process’s critical information. Data theft in wireless IoT networks raises concerns related to violations of privacy, infringements of intellectual property, and reverse engineering of system settings.
To fully capitalize on the benefits of IoT ecosystems, it is crucial to apply robust security controls [
8,
9,
10,
11,
12]. Inadequate security and negligence of proper risk understanding and management may cause significant damage from adversaries, particularly when IoT is part of critical industrial control systems [
7,
13]. Ensuring information integrity and availability becomes paramount in such environments. Information availability guarantees that controllers receive timely access to IoT-transmitted data as needed. Similarly, information confidentiality measures ensure that only devices allowed to read the information are able to do so.
IoT systems are widely employed in various industries and mostly utilize a form of wireless communication for connectivity. Using wireless communication technologies can support scalability in large-scale IoT systems’ deployments and operations. Machine-to-machine communication links (e.g., Zigbee, LoRa, Bluetooth) often prove to be useful for large-scale deployments [
1,
14,
15,
16]. Modern wireless technologies, such as spectrum-sharing communication systems, present new opportunities to enable IoT connectivity [
17]. This is particularly interesting in newer generations of cellular communication, such as 6G, where massive machine-type communication continues to be a key driver. Due to the shared nature of the communication channel, wireless IoT networks face critical challenges in ensuring information security [
18]. The complexity of emerging security threats targeting IoT devices further exacerbates the issue, especially in resource-constrained IoT systems. Incidents like the Mirai attack have highlighted the vulnerability of IoT systems to cyber attacks [
7,
18,
19].
The dominant use of wireless communication channels in IoT environments cast them as attractive targets for threat vectors that exploit the inherent vulnerabilities in such channels’ physical and data layers. For example, in attacks that target availability, an adversary may intentionally interfere with and degrade wireless communication channels. Such attacks may disrupt industrial control system operations, raising concerns related to health, safety, and quality. Similarly, an adversary who has access to the wireless communication medium may sniff the spectrum to reverse engineer transmitted information.
This work acknowledges current IoT security challenges, particularly in resource-constrained devices, to address IoT interference and eavesdropping attacks. In this article, we present an alternative approach to security at the physical layer, focusing on two use cases with different security objectives. We motivate the physical-layer security (PLS) approach as a complementary approach to other network and application layer mechanisms. Due to the challenges in securing IoT systems and the inherent computational limitations of the devices, PLS methods are becoming more popular [
5,
6,
20,
21]. A major benefit of PLS approaches for IoT environments lies in their ability to provide enhanced security within the constrained resources of the IoT devices as we illustrate in this article with the proposed strategies. Other security controls on the network and application layers are often limited due to restricted device resources.
First, we consider the challenge of interference attacks, where we investigate a scenario where an IoT device transmits its sensor data to a receiver unit through a wireless channel that is subjected to an intentional interference attack by an
adversary. The malicious interference negatively affects the legitimate IoT’s received signal, which results in channel outages that impede timely access to IoT data at the receiver unit, thereby disrupting the availability of IoT data. In the IoT system under investigation, the legitimate device can coordinate its transmission with other IoT devices in the ecosystem to mitigate the negative impacts of the interference attack conducted by the adversary. One objective of the proposed security approach is to limit the average outage probability of the legitimate device’s signal to an acceptable threshold during the interference attack. The approach employed in this work focuses on employing a spectrum-sharing cognitive communication framework [
22] to address information availability at the physical layer. Cooperative communications between devices in the IoT ecosystem are employed to enhance the quality of service (QoS) of the received signal during the interference attack.
Second, we consider a setup with several IoT devices utilizing a wireless channel to communicate their sensor measurements. A set of the IoT devices, called primary devices, require higher signal quality guarantees at the receiver compared with the the rest of the devices (called secondary devices), which have lower transmission priority. The primary and secondary IoT devices may use different receiving units. Additionally, there is an illegitimate device, referred to as the eavesdropper, attempting to decode the primary device’s transmission. A coordinated transmission strategy by secondary IoT devices is developed in this article to ensure the information confidentiality of the primary device’s signal in the presence of the eavesdropper.
In the remaining parts of the articles, we discuss security for IoT systems in
Section 2, and we discuss the proposed solutions for interference attacks in
Section 3 and for eavesdropping in
Section 4. Simulation results illustrating the performance of the proposed solutions are shown and discussed in
Section 5. Conclusions and future work are presented in
Section 6.
2. Background and Motivation
Recently, security strategies originally developed for sensor networks have been extended to IoT environments due to their similarities [
5,
16,
23,
24,
25,
26,
27,
28,
29]. However, the widespread deployment of IoT devices, coupled with their unique computational capabilities and energy efficiency, presents challenges for existing security approaches. For instance, security schemes relying on compressive sensing, probabilistic ciphering, and channel state information scalability suffer as the number of devices increases. Additionally, computationally complex schemes like compressive sensing are impractical for resource-limited IoT devices [
2,
5]. Moreover, the sheer number of IoT devices and the complexity of interconnected systems make it more challenging to identify and address security vulnerabilities.
Physical-layer security leverages wave propagation and transmitter/receiver designs and offers an approach to information security by enabling secure communication over wireless channels [
2,
5,
26,
30,
31]. In the context of IoT systems, PLS approaches have the capability to overcome some of the constraints of conventional cybersecurity solutions and offer extra layers of protection against cyber attacks [
20,
21]. It can make eavesdropping and disrupting IoT communications more difficult for attackers without transmitting additional information.
A review of physical-layer security approaches for achieving information security in wireless channels is provided in [
5,
32]. The challenges and opportunities of using PLS in IoT systems are discussed in surveys such as [
31,
33,
34,
35]. Several PLS techniques can be employed in IoT systems, including beamforming to direct signals toward intended receivers and away from eavesdroppers as well as the use of artificial noise to hinder eavesdroppers in decoding transmitted signals. Other existing PLS methods include operating within the secrecy capacity, exploiting channel signatures, using spectrum spreading techniques, and node cooperation to degrade the eavesdropper’s communication channel [
36]. Additional results on PLS security are summarized in [
6].
The work in [
37] investigated security solutions for heterogeneous IoT and multi-access mobile edge computing (MA-MEC) in smart cities, focusing on physical-layer security technologies like secure wiretap coding, resource allocation, signal processing, and multi-node cooperation to address emerging security threats. The researchers in [
38] proposed a Gaussian-tag-embedded physical-layer authentication scheme for IoT security, using a weighted fractional Fourier transform to verify signal authenticity, and they conducted security analysis and experiments to demonstrate the scheme’s robustness against spoofing and replay attacks. The study in [
39] explored a secure wireless communication scenario in IoT for protecting data collection from detection and eavesdropping attacks. The work in [
40] studied secure beamforming design in a two-way cognitive radio IoT network with simultaneous wireless information and power transfer with the aim to maximize the secrecy sum rate for primary users by designing beamforming solutions and optimization algorithms to balance complexity and performance.
Studies have examined the average secrecy capacities of wireless multi-user networks against passive or active eavesdroppers [
41]. Physical-layer security approaches for wireless sensor networks include distributed co-phasing-based transmissions [
26] and energy-efficient solutions for securing downlink IoT connections through interference exploitation [
6]. A unified framework for various physical-layer security systems has been proposed [
42]. In [
20], physical-layer security measures for an IoT environment under jamming signals are discussed, utilizing a game-theoretic formulation for distributed IoT channel access. However, scaling this game-theoretic approach becomes challenging as the number of IoT devices increases due to transmission collisions and retransmissions.
The proposed solutions for interference and eavesdropping attacks in this article are innovative as they do not waste resources, provide opportunities for IoT cooperation, complement other security measures that are in place, strengthen defense-in-depth strategy, and quantify a measure of information availability and confidentiality using outage probability. The proposed algorithms use a round-robin approach to include secondary IoT devices, providing a chance to communicate over the channel for all devices and leading to more fairness in the IoT network. The algorithms also include a degree of flexibility through setting the value of a cooperation factor. It is important to note here that the proposed cooperative transmission strategy for interference attacks requires accurate estimates of the adversary channel gains, which is feasible using channel estimation techniques for active interfering agents.
In the following, we discuss the proposed PLS solutions for IoTs under interference attack in
Section 3 and for eavesdropping attacks in
Section 4. The theoretical framework and the cooperative transmission strategies that enable the IoTs to respond to the cyber attacks will be developed for both use cases.
3. PLS for Interference Attacks Defense
Consider a communication system consisting of multiple IoT devices that need to transmit data using a wireless channel. Within this ecosystem, certain devices, referred to as primary IoT devices, require higher information availability guarantees at their respective receivers compared to others, known as secondary IoT devices. It should be noted that primary and secondary IoT devices may have different receiver units. In this scenario, an adversary specifically targets the data transmission of a primary IoT device by conducting interference attacks that jam its receiver unit. To address this challenge, a spectrum-sharing cognitive communication paradigm is utilized [
43]. Secondary IoT devices can concurrently transmit over the shared channel along with the primary IoT device to ensure a target level of signal quality for the primary device. The primary outage probability is considered as the QoS metric in this setup.
To utilize the channel, the secondary IoT device cooperates with the primary device by allocating a portion of its power to relay the primary device’s signal and using the remaining power to transmit its own data. Consequently, the simultaneous transmission of signals introduces additional interference at the intended receiver. However, the QoS of the received signal can be improved through cooperative communication from the secondary IoT devices in the system. This cooperative communication approach allows the primary IoT device to achieve a certain measure of information availability while under interference attacks by the adversary.
3.1. System Model
Consider the spectrum-sharing uplink communication environment depicted in
Figure 1. This setup includes a legitimate primary IoT device that intends to transmit its data (for example, sensor readings) to a primary receiver unit (PR). Also, the wireless communication environment includes other secondary devices (collectively referred to as ST) that aim to transmit their information to a secondary receiver unit (SR). In this communication system, the PR and SR can simultaneously transmit over the shared wireless channel. Additionally, the communication system includes an adversary device (referred to as AT) that attacks the data transmission of the PT by causing an interference at the PR. In a similar way, the adversary’s transmission introduces additional interference at the SR as well. In addition, the secondary transmission by the ST causes interference at the PR. In a similar fashion, the primary transmission by the PT leads to additional interference at the secondary receiver SR.
Furthermore, the PT utilizes the secondary transmission by the cooperative ST to alter the composition and characteristics of its received signals at the PR, with the goal of limiting the average value of the outage probability of the primary signal at the PR in order to achieve certain degree of information availability during the AT’s interference attack. Throughout the time duration of interest, the PR transmits its data at a rate of with a power of . Each transmission interval involves the selection of a secondary device to communicate over the shared channel with a power of and a rate of . In addition, the adversary user causes interference utilizing a transmission power of . Finally, the PR and SR experience additive white Gaussian noise (AWGN) signals with zero mean and a variance of and , respectively.
The wireless channels between the different IoT devices and receiver units in this environment undergo independent and identically distributed (i.i.d.) Rayleigh block fading.
Figure 2 illustrates the power gains of the channels between the PT and PR and the PT and SR as
and
, respectively, with average values of
and
. Likewise, the power gains of the channels between the AT and PR and the AT and SR are termed as
and
, respectively, with average values of
and
. Finally, the power gains of the channels between the ST and PR and the ST and SR are represented by
and
, respectively, with average values of
and
. These different
values capture pertinent characteristics of the communication environment, such as propagation distance between the transmitter and receiver units, path loss, shadowing, and the general fading state of the channel.
3.2. Cooperation Model
To mitigate the impact of the interference signal injected by the adversary unit and facilitate cooperation with the primary IoT device, the secondary device allocates a portion of its transmission power () for relaying the PT’s data. In this communication environment, the following assumptions are made:
The PT and ST are relatively close to each other so that the propagation time between the PT and ST is insignificant compared to that between the PT and PR.
The ST possesses accurate retransmission capability for PT’s data.
The ST dedicates a fraction of its transmission power to cooperate with the PT, and the remaining fraction is used for transmitting ST’s own coded signal.
Here, represents the cooperation factor, satisfying the condition . Although we realize that the first two assumptions might not be very practical at all times, nevertheless, they provide us with a direct way to derive the following mathematical terms and keep the developed expressions traceable.
Let
represent the signal-to-interference plus noise ratio (SINR) of the PT’s signal that is received at the PR, and let
denote the ST’s signal SINR that is received at the SR. Given the concurrent transmissions between the different IoT devices,
and
can be expressed as
For the case of Rayleigh fading in the channel, the cumulative distribution function (CDF) of
can be written as
where
denotes the unit step function. Similar formulas can be found for the other channel gains in this environment.
The expression for
can be expanded into
, where
Further, to ensure tractability in deriving the CDF expression for
, consider the scenario in
where
(i.e., the secondary power received at the PR is considerably stronger compared to that of the adversary and noise powers). In this case, the expression for
can be further simplified to
For this case, we can approximate
as
The distribution function of
can be written as
Following the results of (
5) and (
6), the CDF of
is calculated using
where
,
, and
. Let
denote the average outage probability of the received primary IoT signal at the PR; thus,
can be expressed as
where
is the probability operator and
.
Similarly, the CDF of the SINR of ST’s signal at its intended receiver SR (i.e.,
) can be expressed as
where
,
, and
. Then, the average outage probability of ST’s signal received at its intended receiver unit is found from
where
.
The development above shows that the
moves to the right as
increases, as increasing the value of
leads to increasing the
term in the CDF formula in Equation (
7), leading to a shift to the right. Furthermore, the secondary CDF formula in (
9) explains the impact of varying the cooperation factor on the
. In addition, when
increases, the primary outage probability decreases while the secondary IoT device’s outage probability increases as indicated in Equations (
8) and (
10).
3.3. Transmission Strategy
Let
represent the number of secondary devices in the IoT environment. Suppose that
and
are the outage levels that the primary IoT device (i.e., PT) and the secondary IoT devices (i.e., ST) can tolerate, respectively. In practice, we have
. To mitigate the negative results of the interference attack on the PR, one secondary device is chosen from the pool of
IoT devices to cooperate with the PT. To enable cooperation with the PT and to simultaneously transmit its own data, the selected secondary IoT device needs to utilize a cooperation factor
that ensures that the following constraints are satisfied:
This formula allows the PT and ST to cooperate to mitigate the impact of the interference attack caused by the AT by limiting the PT’s signal average outage probability to a level of . This ensures that the PT maintains a certain level of information availability. Simultaneously, the formulation also provides the ST with an opportunity to communicate over the wireless channel while guaranteeing a limited outage probability for the ST. This approach offers a balance between ensuring information availability for the PT and enabling limited communication for the ST in the presence of interference.
Consider the case of fixed
and
values. Let
and
in (
8); then, the value of
can be expressed as
Following the transmission constrains in (
11), the limit on
is rephrased as
Similarly, let
and
in (
10); the value of
becomes
Using the constraint on
in (
11) and the development in (
14),
is limited as
Recall that
and
; then, the secondary IoT device has to satisfy the following constraints on the transmission power:
The cooperative transmission strategy proposed in this work to satisfy the PT’s information availability requirements is illustrated in Algorithm 1. In the proposed transmission strategy, each secondary IoT device has its own constraints and environment settings, including parameters such as
,
,
,
,
,
, and others. The proposed algorithm verifies each candidate ST in a round-robin fashion to determine if it satisfies the transmission criteria outlined in (
11). The algorithm begins by collecting and estimating the communication environment setting parameters, including the number of secondary IoT devices, channel strengths between the devices, noise levels, transmission rates and powers, and outage probability requirements. Each secondary IoT device is then verified to determine if it satisfies the proposed transmission criteria in (
11).
Algorithm 1: Transmission Strategy for Interference Attacks Defense |
Determine: . Collect: , , , , . Estimate: , , , . Determine: . while TRUE do if PT has no more data to transmit then Break. end if Initialize: . while do Determine: . Determine: , , , of . Determine: , . Calculate: that satisfies outage requirements. if then Assign: ST ← . Assign: . while TRUE do Access: ST uses for PT’s signal and for its signal. if ST has no more data to transmit then Break. end if end while end if . end while end while
|
During each transmission interval, the scheduled secondary IoT device retransmits the primary signal with a transmission power of
while also communicating its own signal with a transmission power of
using the shared channel. Then, data transmission by the ST alters the SINR value of the PT’s signal that is received at the PR. However, by ensuring that the ST’s transmission satisfies the constraints in (
11), the average outage probability of the PT remains below the maximum threshold of
, and the ST experiences an average outage probability less than its limit of
. Even though there is an interference attack by the AT, the information availability constraint is fulfilled for the primary device due to the cooperative secondary communication. Simultaneously, the cooperating secondary device is granted an opportunity to communicate over the shared wireless channel, achieving a less stringent outage probability constraint.
4. PLS for Eavesdropping Attacks Defense
The same principles can be employed to devise a PLS collaborative approach to enhance confidentiality against eavesdropping. In this case, we consider a setup with several IoT devices communicating their sensor measurements using a wireless communication channel. A set of the IoT devices, termed as primary devices, require higher signal quality guarantees at the receiver compared with other secondary IoT devices, which have lower transmission priority. Again, the primary and secondary devices may use different receiving units. Additionally, there is an illegitimate device, referred to as the eavesdropper, attempting to decode the primary device’s transmission. We develop a coordinated transmission strategy by secondary IoT devices to ensure the information confidentiality of the primary device’s signal in the presence of the eavesdropper.
When secondary transmissions occur, they introduce interference to the communication system, which can be detected by both the PR and the eavesdropper EVE. Also, primary transmissions will cause interference at the SR. Using a spectrum-sharing communication paradigm, secondary devices transmit with the primary device simultaneously. The simultaneous transmission occurs while ensuring a minimum quality level of the received primary signal, measured by satisfying an average primary outage probability constraint. Further, the simultaneous transmission of the signals adds extra interference to the received signal at the EVE, thus making it more challenging for the EVE to decode the primary signal. This approach helps the primary IoT device achieve a confidentiality level. The PT utilizes the ST secondary transmission to inflict a signal outage at the EVE, again preventing the EVE from decoding the PT’s signal and thus ensuring confidentiality in its transmission.
This innovative transmission scheme enables IoT devices to communicate wirelessly while strategically inducing channel outages to prevent eavesdroppers from decoding the transmitted signals. An algorithmic transmission strategy that enables IoT devices, threatened by an eavesdropper, is developed to collaborate and cause signal outages, thus reducing the eavesdropper’s ability to decode the signal of interest. This strategy leverages a spectrum-sharing communication model to enhance information confidentiality for IoT devices. By strategically inducing signal outages on the eavesdropper, the IoT devices ensure that sensitive information remains protected during wireless communication.
4.1. System Model
The wireless communication setup consists of a spectrum-sharing system as shown in
Figure 3. This system depicts a primary transmitter communicating with a primary receiver unit using a wireless channel. There also exist multiple secondary transmitters aiming to communicate with another secondary receiver unit. The PR and SR IoT devices can simultaneously transmit their data wirelessly. The threat model considers an adversary, referred to as an EVE, attempting to eavesdrop on data transmitted by the PT. Let the PR transmit at a rate of
with a power of
; both are assumed to remain constant during the communication period. During every transmission round, a secondary IoT transmitter is chosen to start transmitting with a power of
over the wireless channel. At the primary receiver, the noise is assumed to be AWGN with a mean of zero and
variance. Also, we assume that the eavesdropper EVE and SR have AWGN with respective variances of
and
.
Between the two IoT devices and the receiver units, the wireless channels are modeled as i.i.d. block-fading channels with Rayleigh distribution.
Figure 4 illustrates this setup, where the channel power gains between the PT and PR, SR, and EVE are defined as
,
, and
, with corresponding respective averages of
,
, and
. Moreover, channel power gains between the ST and PR, SR, and EVE are defined as
,
, and
, with respective averages of
,
, and
. Here, the
’s are different real and positive values that reflect relevant communication environment characteristics.
The cumulative distribution function (CDF) of
can be mathematically described as
The CDF mathematical model for other channel power gains such as
and
will be similar:
4.2. Cooperation Model
Let
and
denote the SINR of the PT’s signal at the EVE and at the PR, respectively, and let the SINR of the ST’s signal at its own receiver unit (i.e., SR) be termed as
. Then, with concurrent transmissions from the primary and secondary, the previous SINR values can be expressed as
Further, the CDF cof
an be calculated using
This integration is simplified as
Following a similar derivation process for
CDF results in
An outage in the wireless communication channel happens when the transmitted data rate exceeds the capacity of the channel. Hence, the outage probability of the PT’s transmission when measured at the PR can be expressed using
. With (
21), this leads to an outage probability of the PT as
Following a similar derivation, the average channel outage probability of the EVE is expressed as
. With the results in (
22), the outage probability is found to be
In a spectrum-sharing communication system, a secondary transmission could be controlled by limiting the additional interference that is received at the primary receiver unit. In the described setup, the outage probability of the primary signal at the PR is limited with a maximum value of
. This limiting helps to account for the secondary interference such that
. Hence, the transmission power of the ST is limited to
Further, the secondary transmission is employed to control the lower limit of the average outage probability of the EVE as
. Here,
, which consequently limits the transmission power of the secondary as
Thus, a level of confidentiality of the PT’s signal at the EVE can be achieved by requiring the transmission power of the secondary to satisfy (
25) and (
26). By satisfying (
25), the ST avoids causing excessive channel outage at the primary receiver, and by satisfying (
26), the ST causes more outages at the EVE. The PT’s objective is to transmit its data to the PR while hindering the EVE’s ability to decode the transmitted information. Using the proposed strategy, the PT allows the ST to transmit data over the wireless channel, causing a secondary interference that will results in an additional outage at the PR and EVE. The secondary transmission is controlled such that it causes a lower-limit outage of
at the EVE and an upper-limit outage of
at the PR.
4.3. Transmission Strategy
To establish the base case before developing the cooperative transmission strategy, consider the case with no secondary transmission (i.e.,
). Hence,
The CDF expressions of
and
will then simplify to
Then, the outage probability can be evaluated as
Note here that the symbol subscript of zero in (
27)–(
29) signifies that
and results in base case values.
Let
and
designate the lower and upper limits on the secondary transmission power. Then, combining (
25), (
26), and (
29) will result in a set of requirements for transmission power expressed as
To ensure concurrent transmission over the wireless channel, any secondary transmitter must operate within a specific power range, defined as
. This constraint guarantees that the EVE experiences an outage probability exceeding the minimum requirement (
) while simultaneously ensuring that the primary receiver’s outage probability remains below the maximum threshold (
), where
.
The communication system is assumed to be composed of
available secondary transmitters, each characterized by its unique maximum transmit power (
) and channel strength. A round-robin approach is employed to verify if each secondary transmitter can meet the condition in (
30). Upon satisfying this criterion, a secondary transmitter is permitted to transmit using a power level of
. This carefully selected transmission power ensures that the ST adheres to the outage probability requirements for both the EVE and PR.
The transmission strategy depicted in Algorithm 2 outlines the transmission strategy designed to meet the confidentiality constraint. It begins by gathering system parameters, including outage requirements, data rates, noise powers, channel strengths, and the number of potential secondary transmitters. Using a round-robin approach, each secondary transmitter is evaluated to determine if it meets the proposed transmission criteria. If a secondary transmitter satisfies these criteria, it is selected to transmit its data over the shared channel, thereby introducing interference and additional outage to both the EVE and PT. Given that (
30) is satisfied for the selected secondary transmitter, the outage probability for the PT will remain within the acceptable limit (
), while the EVE will experience an outage probability of no less than
. As a result, the confidentiality metric is upheld.
Algorithm 2: Transmission Strategy for Eavesdropping Attacks Defense |
Determine: . Collect: , , , , , . Calculate: , . Determine: . while TRUE do if PT has no more data to transmit then Break Loop. end if Initialize: . while do Determine: . Determine: , of . Find: . Calculate: , . if AND then Assign: ST ← . Assign: . while TRUE do Access: ST transmits data with . if ST has no more data to transmit then Break. end if end while end if . end while end while
|
Consider the case where the ST communicates over the channel with a rate of
. Given the value of
in (
19), and following a similar development to that of the PT, the CDF of
, termed as
, is calculated using
This leads to
being expressed as
Next, for a transmission rate of
, the outage probability of the ST’s transmission at the SR is calculated using
; then, using
from (
32), the outage probability of the ST becomes
Recall that the ST has to satisfy the outage probability constraints on the PR and EVE; this means that the ST has upper and lower transmission power limits of
and
, respectively, as indicated in (
30). As the ST will try to maximize its received signal level at the SR,
as mentioned previously. Given these transmission limits on
, the outage probability of the ST will be bounded as
, where