Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers

  • Van Nhan Vo
  • Tri Gia Nguyen
  • Chakchai So-InEmail author
  • Hung Tran
  • Surasak Sanguanpong


In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.


Energy harvesting Internet of things Wireless sensor networks Security constraint Physical layer security 



This work was supported in part by the Thailand Research Fund, Thai Network Information Center Foundation, under Grant RSA6180067, in part by Khon Kaen University, and in part by the SSF Framework Grant Serendipity.


  1. 1.
    Wan J, Tang S, Shu Z, Li D, Wang S, Imran M, Vasilakos AV (2016) Software-defined industrial internet of things in the context of industry 4.0. IEEE Sens J 16(20):7373–7380CrossRefGoogle Scholar
  2. 2.
    Zhang J, Duong TQ, Woods R, Marshall A (2017) Securing wireless communications of the internet of things from the physical layer, an overview. Entropy 19(8):1–16CrossRefGoogle Scholar
  3. 3.
    Heng S, So-In C, Nguyen TG (2017) Distributed image compression architecture over wireless multimedia sensor networks. Wirel Commun Mob Comput 2017:1–21CrossRefGoogle Scholar
  4. 4.
    Nguyen TG, So-In C, Nguyen NG, Phoemphon S (2017) A novel energy-efficient clustering protocol with area coverage awareness for wireless sensor networks. Peer to Peer Netw Appl 10(3):519–536CrossRefGoogle Scholar
  5. 5.
    Mukherjee A (2015) Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proc IEEE 103(10):1747–1761CrossRefGoogle Scholar
  6. 6.
    Naira AK, Asmib S, Gopakumar A (2016) Analysis of physical layer security via co-operative communication in internet of things. Procedia Technol 24:896–903CrossRefGoogle Scholar
  7. 7.
    Abomhara M, Koien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Proc. IEEE int. conf. privacy security mobile syst., pp 1–8Google Scholar
  8. 8.
    Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun Survey Tuts 17(3):1294–1312CrossRefGoogle Scholar
  9. 9.
    Zhou L, Chao H (2011) Multimedia traffic security architecture for the internet of things. IEEE Netw 25(3):35–40CrossRefGoogle Scholar
  10. 10.
    Jing Q, Vasilakos A, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRefGoogle Scholar
  11. 11.
    Zhang K, Liang X, Lu R, Shen X (2014) Sybil attacks and their defenses in the internet of things. IEEE Internet Things J 1(5):372–383CrossRefGoogle Scholar
  12. 12.
    Abomhara M, Koien GM (2014) Security and privacy in the internet of things: Current status and open issues. In: Proc. IEEE int. conf. privacy security mobile syst., pp 1–8Google Scholar
  13. 13.
    Skarmeta AF, Ramos JLH, Moreno MV (2014) A decentralized approach for security and privacy challenges in the internet of things. In: Proc IEEE world forum internet thing, pp 67–72Google Scholar
  14. 14.
    Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58CrossRefGoogle Scholar
  15. 15.
    Suo H, Wan J, Zou C, Liu J (2012) Security in the tnternet of things: A review. Proc IEEE Int Conf Comput Sci Electron Eng 3:648–651Google Scholar
  16. 16.
    Skarmeta AF, Hernandez-Ramos JL, Moreno MV (2014) A decentralized approach for security and privacy challenges in the internet of things. In: Proc IEEE World Forum Internet Things, no 67–72Google Scholar
  17. 17.
    Soni A, Upadhyay R, Jain A (2017) Internet of things and wireless physical layer security: A survey. Comput Commun Netw Internet Secur 5:115–123CrossRefGoogle Scholar
  18. 18.
    Wang N, Jiang T, Li W, Lv S (2017) Physical-layer security in internet of things based on compressed sensing and frequency selection. IET Commun 11(9):1431–1437CrossRefGoogle Scholar
  19. 19.
    Xu Q, Ren P, Song H, Du Q (2016) Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 4:2840–2853CrossRefGoogle Scholar
  20. 20.
    Pecorella T, Brilli L, Mucchi L (2016) The role of physical layer security in IoT: A novel perspective. Information 7(3):1–17CrossRefGoogle Scholar
  21. 21.
    Zhong Z, Peng J, Huang K, Zhong Z (2017) Analysis on physical-layer security for internet of things in ultra dense heterogeneous networks. In: Proc. int. conf. on internet of things (iThings) and IEEE green computing and commun. (greencom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 39–43Google Scholar
  22. 22.
    Van NT, Do TN, Bao VNQ, An B (2017) Performance analysis of wireless energy harvesting multihop cluster-based networks over Nakagami-m fading channels. IEEE Access 6:3068–3084CrossRefGoogle Scholar
  23. 23.
    Vo VN, Nguyen TG, So-In C, Baig ZA, Sanguanpong S (2018) Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy, IEEE AccessGoogle Scholar
  24. 24.
    Kamalinejad P, Mahapatra C, Sheng Z, Mirabbasi S, Leung VCM, Guan YL (2015) Wireless energy harvesting for the internet of things. IEEE Commun Mag 53(6):102–108CrossRefGoogle Scholar
  25. 25.
    Hu H, Gao Z, Liao X, Leung VCM (2017) Secure communications in ciot networks with a wireless energy harvesting untrusted relay. Sensors 17(9):1–21CrossRefGoogle Scholar
  26. 26.
    Habibu H, Zungeru AM, Susan AA, Gerald I (2014) Energy harvesting wireless sensor networks: Design and modeling. Int J Wireless Mobile Netw 6(5):17–31CrossRefGoogle Scholar
  27. 27.
    Shaikh FK, Zeadally S (2016) Energy harvesting in wireless sensor networks: A comprehensive review, Renew. Sustain Energy Rev 55:1041–1054CrossRefGoogle Scholar
  28. 28.
    Li T, Dong Y, Fan P, Letaief KB (2017) Wireless communications with RF-based energy harvesting: From information theory to green systems. IEEE Access 5:27538–27550CrossRefGoogle Scholar
  29. 29.
    Smart G, Atkinson J, Mitchell J, Rodrigues M, Andreopoulos Y (2016) Energy harvesting for the internet-of-things: Measurements and probability models. In: Proc int. conf. on telecommun., pp 1–6Google Scholar
  30. 30.
    Mallick S, Habib A-Z, Ahmed AS, Alam SS (2017) Performance appraisal of wireless energy harvesting in IoT. In: Proc int. conf. on elect. inform. and commun. technology, pp 1–6Google Scholar
  31. 31.
    Yang G, Ho CK, Guan YL (2014) Dynamic resource allocation for multiple-antenna wireless power transfer. IEEE Trans Signal Process 62(14):3565–3577MathSciNetCrossRefzbMATHGoogle Scholar
  32. 32.
    Xiao L, Wang P, Niyato D, Kim DI, Han Z (2014) Wireless networks with RF energy har-vesting: A contemporary survey. IEEE Commun Surveys Tutorials 17(2):757–789Google Scholar
  33. 33.
    Chen Z, Ding Z, Dai X, Zhang R (2016) A mathematical proof of the superiority of NOMA compared to conventional OMA. IEEE Trans. Signal Process., pp 1–28. arXiv:1612.01069
  34. 34.
    Vo VN, Nguyen TG, So-In C, Ha D-B (2017) Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer. IEEE Access 5:25196–25206CrossRefGoogle Scholar
  35. 35.
    Wang N, Song X, Cheng J, Leung VCM (2014) Enhancing the security of free-space optical communications with secret sharing and key agreement. J Opt Commun Netw 6(12):1072– 1081CrossRefGoogle Scholar
  36. 36.
    Ha D-B, Nguyen SQ (2017) Outage performance of energy harvesting DF relaying NOMA networks, Mobile Networks and Applicat., pp 1–14. [Online]. Available:
  37. 37.
    Ha D-B, Tran D-D, Truong T-V, Vo N-V (2016) Physical layer secrecy performance of energy harvesting networks with power transfer station selection. In: Proc IEEE Int. Conf. Commun. Electron., pp 451–456Google Scholar
  38. 38.
    Naderi MY, Chowdhury KR, Basagni S (2015) Wireless sensor networks with RF energy harvesting: Energy models and analysis. In: Proc IEEE Wireless Commun. and Networking Conf., pp 1494–1499Google Scholar
  39. 39.
    Oliveira D, Oliveira R (2016) Modeling energy availability in RF energy harvesting networks. In: Proc Int. Symp. on Wireless Commun. Syst., pp 383–387Google Scholar
  40. 40.
    Hoang TM, Duong TQ, Vo NS, Kundu C (2017) Physical layer security in cooperative energy harvesting networks with a friendly jammer. IEEE Wireless Commun Lett 6(2):174– 177CrossRefGoogle Scholar
  41. 41.
    Tran H, Quach TX, Tran H, Uhlemann E (2017) Optimal energy harvesting time and transmit power in cognitive radio network under joint constraints of primary users and eavesdroppers. In: Proc. Int. Symp. on Personal, Indoor and Mobile Radio Commun., pp 1–8Google Scholar
  42. 42.
    Yang N, Yeoh PL, Elkashlan M, Schober R, Collings IB (2013) Transmit antenna selection for security enhancement in mimo wiretap channels. IEEE Trans Commun 61(1):144–154CrossRefGoogle Scholar
  43. 43.
    Deng Y, Elkashlan M, Yeoh PL, Yang N, Mallik RK (2014) Cognitive mimo relay networks with generalized selection combining. IEEE Trans Wireless Commun 13(9):4911–4922CrossRefGoogle Scholar
  44. 44.
    Gradshteyn I, Ryzhik I, Zwillinger D (2007) Table of integrals, series, and products. In: Jeffrey A (ed). Academic Press, USAGoogle Scholar
  45. 45.
    Tran H, Akerberg J, Bjorkman M, Tran H-V (2017) RF energy harvesting: an analysis of wireless sensor networks for reliable communication, Wirel. Netw, pp 1–15Google Scholar
  46. 46.
    Zou Y, Wang G (2016) Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack. IEEE Trans Ind Informat 12(2):780–787CrossRefGoogle Scholar
  47. 47.
    Barros J, Rodrigues MRD (2006) Secrecy capacity of wireless channels, Proc. IEEE Int. Symp. Inf. Theory, pp 356–360.Google Scholar
  48. 48.
    Bhargav N, Cotton SL, Simmons DE (2016) Secrecy capacity analysis over κ-μ fading channels: Theory and applications. IEEE Trans Commun 64(7):1–26CrossRefGoogle Scholar
  49. 49.
    Toan HV, Bao VNQ, Le HN (2017) Cognitive two-way relay systems with multiple primary receivers: exact and asymptotic outage formulation. IET Commun 11(16):2490–2497CrossRefGoogle Scholar
  50. 50.
    Hine G (2017) Proof by mathematical induction: professional practice for secondary teachers. In: Australian Assoc. of Math. Teachers Biennial Conf., pp 1–8Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.International SchoolDuy Tan UniversityDanangVietnam
  2. 2.Applied Network Technology (ANT) Laboratory, Department of Computer Science, Faculty of ScienceKhon Kaen UniversityKhon KaenThailand
  3. 3.Faculty of Information TechnologyDuy Tan UniversityDanangVietnam
  4. 4.School of Innovation, Design and EngineeringMälardalen UniversityVästeråsSweden
  5. 5.Faculty of Information TechnologyNguyen Tat Thanh UniversityHo Chi MinhVietnam
  6. 6.Department of Engineering, Faculty of EngineeringKasetsart UniversityBangkokThailand

Personalised recommendations