Abstract
Cyber-physical systems (CPS) offer integrated resolutions for various applications by combining computer and physical components and enabling individual machines to work together for much more excellent benefits. The ad hoc–based CPS provides a promising architecture due to its decentralized nature and destructive-resistance. A growing number of information leakage events in CPSs and the following serious consequences have aroused ubiquitous concern about information security. In this article, we combine physical layer security solutions and millimeter-wave (mmWave) techniques to safeguard the ad hoc network and investigate the reliability-security tradeoff by taking user demands for the network into account, where eavesdroppers attempt to intercept messages. For the secrecy enhancements, we adopt an artificial noise (AN) assisted transmission scheme, in which AN is employed to create non-cancellable interference to eavesdroppers. The reliability and security are correspondingly characterized by the connection outage probability and secrecy outage probability, and their analytical expressions of them are attained through theoretical analysis for the purpose of the tradeoff issue discussion. Our results reveal that secrecy performance in mmWave ad hoc networks gains significant improvement through the use of AN. It also shows that given total transmit power, there exists a tradeoff between reliability and security to achieve optimal outage performance.
- [1] . 2014. What will 5G be? IEEE J. Select. Areas Commun. 32, 6 (2014), 1065–1082. Google ScholarCross Ref
- [2] . 2015. Coverage and rate analysis for millimeter-wave cellular networks. IEEE Trans. Wireless Commun. 14, 2 (2015), 1100–1114. Google ScholarDigital Library
- [3] . 2008. Security in mobile ad hoc networks. IEEE Secur. Priv. 6, 2 (2008), 72–75. Google ScholarDigital Library
- [4] . 2018. A joint optimization scheme for artificial noise and transmit filter for half and full duplex wireless cyber physical systems. IEEE Trans. Sust. Comput. 3, 2 (2018), 126–136. Google ScholarCross Ref
- [5] . 2021. LoRa wake-up radio relay with beaglebone black. In IEEE SoutheastCon (SoutheastCon’21). 1–8. Google ScholarCross Ref
- [6] . 2017. Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems. IEEE Trans. Vehic. Technol. 66, 9 (2017), 8139–8151. Google ScholarCross Ref
- [7] . 2014. Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks. IEEE J. Select. Areas Commun. 32, 6 (2014), 1152–1163. Google ScholarCross Ref
- [8] . 2022. RNS-based adaptive compression scheme for the block data in the blockchain for IIoT. IEEE Trans. Industr. Inf. 18, 12 (2022), 9239–9249. Google ScholarCross Ref
- [9] . 2012. Stochastic Geometry for Wireless Networks. Cambridge University Press.Google ScholarCross Ref
- [10] . 2009. Stochastic geometry and random graphs for the analysis and design of wireless networks. IEEE J. Select. Areas Commun. 27, 7 (2009), 1029–1046. Google ScholarDigital Library
- [11] . 2009. Interference in Large Wireless Networks. Now Publishers Inc.Google Scholar
- [12] . 2019. Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Commun. Surv. Tutor. 21, 2 (2019), 1773–1828. Google ScholarCross Ref
- [13] . 2014. Reliability and secrecy functions of the wiretap channel under cost constraint. IEEE Trans. Inf. Theory 60, 11 (2014), 6819–6843. Google ScholarCross Ref
- [14] . 2018. Millimeter-wave communications: Physical channel models, design considerations, antenna constructions, and link-budget. IEEE Commun. Surv. Tutor. 20, 2 (2018), 870–913. Google ScholarCross Ref
- [15] . 2017. Cyber-physical systems security—A survey. IEEE IoT J. 4, 6 (2017), 1802–1831.Google Scholar
- [16] . 2019. The impact of mobile blockers on millimeter wave cellular systems. IEEE J. Select. Areas. Commun. 37, 4 (2019), 854–868. Google ScholarCross Ref
- [17] . 2017. Secure transmissions in millimeter wave systems. IEEE Trans. Commun. 65, 5 (2017), 2114–2127. Google ScholarCross Ref
- [18] . 2020. Artificial noise hopping: A practical secure transmission technique with experimental analysis for millimeter wave systems. IEEE Syst. J. 14, 4 (2020), 5121–5132. Google ScholarCross Ref
- [19] . 2017. Cyber physical systems (CPS): Security issues, challenges and solutions. In Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC’17). 1–4. Google ScholarCross Ref
- [20] . 2022. Adaptive hierarchical cyber attack detection and localization in active distribution systems. IEEE Trans. Smart Grid 13, 3 (2022), 2369–2380. Google ScholarCross Ref
- [21] . 2023. Mobility-aware multi-hop task offloading for autonomous driving in vehicular edge computing and networks. IEEE Trans. Intell. Transport. Syst. 24, 2 (2023), 2169–2182. Google ScholarCross Ref
- [22] . 2015. Interference exploitation in D2D-enabled cellular networks: A secrecy perspective. IEEE Trans. Commun. 63, 1 (2015), 229–242. Google ScholarCross Ref
- [23] . 2013. Path loss models for 5G millimeter wave propagation channels in urban microcells. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’13). 3948–3953. Google ScholarCross Ref
- [24] . 2015. Tractable model for rate in self-backhauled millimeter wave cellular networks. IEEE J. Select. Areas Commun. 33, 10 (2015), 2196–2211. Google ScholarDigital Library
- [25] . 2013. Stochastic Geometry and Its Applications. John Wiley & Sons.Google Scholar
- [26] . 2007. Applications of LDPC codes to the wiretap channel. IEEE Trans. Inf. Theory 53, 8 (2007), 2933–2945. Google ScholarDigital Library
- [27] . 2016. Performance analysis of outdoor mmWave ad hoc networks. IEEE Trans. Sign. Process. 64, 15 (2016), 4065–4079. Google ScholarDigital Library
- [28] . 2020. A physical layer security framework for cognitive cyber-physical systems. IEEE Wireless Commun. 27, 4 (2020), 32–39. Google ScholarCross Ref
- [29] . 2015. Interference in finite-sized highly dense millimeter wave networks. In Proceedings of the Information Theory and Applications Workshop (ITA’15). 175–180. Google ScholarCross Ref
- [30] . 2016. Physical layer security in millimeter wave cellular networks. IEEE Trans. Wireless Commun. 15, 8 (2016), 5569–5585. Google ScholarDigital Library
- [31] . 2011. Research and application of the architecture of ad hoc based CPS. In Proceedings of the International Conference on Advanced Intelligence and Awareness Internet (AIAI’11). 309–312. Google ScholarCross Ref
- [32] . 2014. Key elements to enable millimeter wave communications for 5G wireless systems. IEEE Wireless Commun. 21, 6 (2014), 136–143. Google ScholarCross Ref
- [33] . 2018. A survey of physical layer security techniques for 5g wireless networks and challenges ahead. IEEE J. Select. Areas Commun. 36, 4 (2018), 679–695. Google ScholarDigital Library
- [34] . 2011. The design of simulation platform for ad hoc based cyber-physical system. In Proceedings of the 7th Int. Conf. Mobile Ad-hoc Sens. Netw. 350–353. Google ScholarDigital Library
- [35] . 2022. Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0. IEEE Trans. Industr. Inf. 18, 9 (2022), 6368–6378. Google ScholarCross Ref
- [36] . 2015. Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun. Mag. 53, 4 (2015), 20–27. Google ScholarDigital Library
- [37] . 2021. Cyber—physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions. IEEE J. Emerg. Select. Top. Power Electr. 9, 4 (2021), 4639–4657. Google ScholarCross Ref
- [38] . 2021. Securing critical infrastructures: deep-learning-based threat detection in IIoT. IEEE Commun. Mag. 59, 10 (2021), 76–82. Google ScholarCross Ref
- [39] . 2022. A blockchain-based Shamir’s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE IoT J. 9, 11 (2022), 8154–8167. Google ScholarCross Ref
- [40] . 2013. Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks. IEEE Trans. Inf. Forens. Secur. 8, 11 (2013), 1802–1814. Google ScholarDigital Library
- [41] . 2022. Secure millimeter-wave ad hoc communications using physical layer security. IEEE Trans. Inf. Forens. Secur. 17 (2022), 99–114. Google ScholarDigital Library
- [42] . 2022. A federated learning framework for detecting false data injection attacks in solar farms. IEEE Trans. Power Electr. 37, 3 (2022), 2496–2501. Google ScholarCross Ref
- [43] . 2016. Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers. IEEE Trans. Vehic. Technol. 65, 10 (2016), 8812–8817. Google ScholarCross Ref
- [44] . 2017. Secure communications in millimeter wave ad hoc networks. IEEE Trans. Wireless Commun. 16, 5 (2017), 3205–3217. Google ScholarDigital Library
- [45] . 2016. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 104, 9 (2016), 1727–1765. Google ScholarCross Ref
Index Terms
- Reliability–Security Tradeoff Analysis in mmWave Ad Hoc–based CPS
Recommendations
Enhancing DSR protocol performance in mobile ad hoc network using ACK reply
This paper presents a new method to improve performance of DSR in Ad Hoc Network. We present an analysis of DSR protocol and propose our algorithm to improve the performance of DSR protocol by using ACK reply path as a backup route when an original ...
A novel solution for achieving anonymity in wireless ad hoc networks
PE-WASUN '04: Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networksA mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of other intermediate nodes to establish communication channels. In such an ...
Throughput analysis for interference limited TDMA and TDMA-CDMA wireless ad hoc networks
The node throughput, which is defined as the total rate received at each node, is evaluated for the interference limited TDMA and TDMA-CDMA wireless ad hoc networks. In the TDMA wireless ad hoc network, there is only one transmission link connected to ...
Comments