scispace - formally typeset
Open AccessJournal ArticleDOI

Secure Short-Packet Communications for Mission-Critical IoT Applications

Reads0
Chats0
TLDR
The performance of secure short-packet communications in a mission-critical IoT system with an external multi-antenna eavesdropper and an analytical framework to approximate the average achievable secrecy throughput of the system with finite blocklength coding is investigated.
Abstract
In applications of the Internet of Things (IoT), the use of short packets is expected to meet the stringent latency requirement in ultra-reliable low-latency communications; however, the incurred security issues and the impact of finite blocklength coding on the physical-layer security are not well understood. This paper investigates the performance of secure short-packet communications in a mission-critical IoT system with an external multi-antenna eavesdropper. An analytical framework is proposed to approximate the average achievable secrecy throughput of the system with finite blocklength coding. To gain more insight, a simple case with a single-antenna access point (AP) is considered first, in which the secrecy throughput is approximated in a closed form. Based on that result, the optimal blocklengths to maximize the secrecy throughput with and without the reliability and latency constraints, respectively, are derived. For the case with a multi-antenna AP, following the proposed analytical framework, closed-form approximations for the secrecy throughput are obtained under both beamforming and artificial-noise-aided transmission schemes. The numerical results verify the accuracy of the proposed approximations and illustrate the impact of the system parameters on the tradeoff between transmission latency and reliability under a secrecy constraint.

read more

Citations
More filters
Journal ArticleDOI

Massive Access for 5G and Beyond

TL;DR: In this article, a comprehensive survey of massive access design for B5G wireless networks is presented, from the perspectives of theory, protocols, techniques, coverage, energy, and security.
Posted Content

Massive Access for 5G and Beyond

TL;DR: This paper provides a detailed review of massive access from the perspectives of theory, protocols, techniques, coverage, energy, and security, and several future research directions and challenges are identified.
Journal ArticleDOI

5G Ultra-Reliable Low-Latency Communication Implementation Challenges and Operational Issues with IoT Devices

TL;DR: Concerns for the Internet of things (IoT) devices that depend on the low latency and reliable communications of URLLC are addressed, and the recent progress of 3rd Generation Partnership Project (3GPP) standardization and the implementation of UR LLC are included.
Journal ArticleDOI

Average Age of Information in Short Packet Based Machine Type Communication

TL;DR: This work investigates the performance of MTC under traditional protocol and automatic repeat-request (ARQ) protocol and obtains the approximated closed-form expressions of the average AoI, respectively, and designs two suboptimal blocklengths to minimize theaverage AoI under the two protocols.
Journal ArticleDOI

NOMA-Assisted Secure Short-Packet Communications in IoT

TL;DR: Simulations show that in both uplink and downlink, although secrecy performance deteriorates in short-packet communications, the performance gains of NOMA over traditional orthogonal multiple access are significant, and analyzed the challenges and future trends in this emerging area.
References
More filters
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
MonographDOI

Introduction to Numerical Analysis

TL;DR: 1. The numerical evaluation of expressions 2. Linear systems of equations 3. Interpolation and numerical differentiation 4. Numerical integration 5. Univariate non linear equations 6. Systems of nonlinear equations.
Journal ArticleDOI

Five disruptive technology directions for 5G

TL;DR: In this article, the authors describe five technologies that could lead to both architectural and component disruptive design changes: device-centric architectures, millimeter wave, massive MIMO, smarter devices, and native support for machine-to-machine communications.
Journal ArticleDOI

Channel Coding Rate in the Finite Blocklength Regime

TL;DR: It is shown analytically that the maximal rate achievable with error probability ¿ isclosely approximated by C - ¿(V/n) Q-1(¿) where C is the capacity, V is a characteristic of the channel referred to as channel dispersion, and Q is the complementary Gaussian cumulative distribution function.
Journal ArticleDOI

Guaranteeing Secrecy using Artificial Noise

TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Related Papers (5)