학술논문

Protection Solution for an EH IoT Networks Under a Cooperative UAV Eavesdropper and Malicious Jammer Attack
Document Type
Conference
Source
2022 IEEE Ninth International Conference on Communications and Electronics (ICCE) Communications and Electronics (ICCE), 2022 IEEE Ninth International Conference on. :124-129 Jul, 2022
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Fields, Waves and Electromagnetics
Photonics and Electrooptics
Power, Energy and Industry Applications
Signal Processing and Analysis
Closed-form solutions
Monte Carlo methods
Protocols
System performance
Probability
Autonomous aerial vehicles
Power system reliability
Unmanned aerial vehicle
Cooperative attack
Friendly jammer
Outage probability
Leakage probability
Language
Abstract
Secrecy and system performance are major concerns when implementing the Internet of Things (IoT) paradigm in fifth-generation (5G) communication networks. The detection capability and system performance of an energy harvesting (EH) Internet of Things (IoT) architecture are explored in the presence of an unmanned aerial vehicle (UAV) eavesdropper (UAV EAV). The communication protocol is divided into two phases as follows: 1) a friendly jammer detects the UAV EAV and the relays harvest energy from a power beacon (PB) in the first phase. 2) a ground base station (BS) sends a confidential signal to relays; the selected relay then uses its harvested energy to forward this confidential signal to IoT destinations (IDs) using the decode-and-forward (DF) technique. Simultaneously, the friendly jammer generates an artificial signal to counteract the detected UAV EAV in the second phase. In this Word, a closed-form expression for the probability of detecting the UAV EAV is derived to analyze the detection performance. Furthermore, the leakage probability and outage probability of the considered IoT architecture are determined. Finally, Monte Carlo simulations are employed to verify our approach.