Physical layer security of energy harvesting machine-to-machine communication system

Furqan Jameel, Muhammad Awais Javed, Dushantha Nalin K. Jayakody

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Machine-to-machine (M2M) communication is emerging as a new paradigm to realize the concept of smart cities. In this chapter, we provide a comprehensive introduction to M2M communications, discuss its applications, and highlight its critical challenges. The chapter also provides a discussion of the energy harvesting techniques and their importance in modern wireless communication systems. Here, we mainly focus on RF energy harvesting due to its dual use in energy harvesting and information transfer. Next, a detailed discussion on recent trends of physical layer security (PLS) is presented. Using this basic knowledge of PLS and RF energy harvesting, we analyze the secrecy performance of an M2M communication system under the imperfect knowledge of wireless channel state. Later, the chapter provides a comparison of two jamming techniques, namely, full duplex (FD) jamming and dedicated jamming. It is shown that the dedicated jamming performs better than the FD jamming at the cost of introducing an additional node with additional power requirements. The results also show that by increasing the energy harvesting duration of devices, the FD destination-assisted jamming can also perform very close to dedicated jamming.

Original languageEnglish
Title of host publication5G Enabled Secure Wireless Networks
PublisherSpringer International Publishing
Pages123-153
Number of pages31
ISBN (Electronic)9783030035082
ISBN (Print)9783030035075
DOIs
Publication statusPublished - 1 Jan 2019

Fingerprint

Energy harvesting
Jamming
Communication systems
Machine-to-machine communication

Keywords

  • Energy harvesting
  • Full duplex
  • Machine-to-machine
  • Physical layer security

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Science(all)

Cite this

Jameel, F., Javed, M. A., & Jayakody, D. N. K. (2019). Physical layer security of energy harvesting machine-to-machine communication system. In 5G Enabled Secure Wireless Networks (pp. 123-153). Springer International Publishing. https://doi.org/10.1007/978-3-030-03508-2_5

Physical layer security of energy harvesting machine-to-machine communication system. / Jameel, Furqan; Javed, Muhammad Awais; Jayakody, Dushantha Nalin K.

5G Enabled Secure Wireless Networks. Springer International Publishing, 2019. p. 123-153.

Research output: Chapter in Book/Report/Conference proceedingChapter

Jameel, F, Javed, MA & Jayakody, DNK 2019, Physical layer security of energy harvesting machine-to-machine communication system. in 5G Enabled Secure Wireless Networks. Springer International Publishing, pp. 123-153. https://doi.org/10.1007/978-3-030-03508-2_5
Jameel F, Javed MA, Jayakody DNK. Physical layer security of energy harvesting machine-to-machine communication system. In 5G Enabled Secure Wireless Networks. Springer International Publishing. 2019. p. 123-153 https://doi.org/10.1007/978-3-030-03508-2_5
Jameel, Furqan ; Javed, Muhammad Awais ; Jayakody, Dushantha Nalin K. / Physical layer security of energy harvesting machine-to-machine communication system. 5G Enabled Secure Wireless Networks. Springer International Publishing, 2019. pp. 123-153
@inbook{9ee557cbda414279a68f7d8a69720c22,
title = "Physical layer security of energy harvesting machine-to-machine communication system",
abstract = "Machine-to-machine (M2M) communication is emerging as a new paradigm to realize the concept of smart cities. In this chapter, we provide a comprehensive introduction to M2M communications, discuss its applications, and highlight its critical challenges. The chapter also provides a discussion of the energy harvesting techniques and their importance in modern wireless communication systems. Here, we mainly focus on RF energy harvesting due to its dual use in energy harvesting and information transfer. Next, a detailed discussion on recent trends of physical layer security (PLS) is presented. Using this basic knowledge of PLS and RF energy harvesting, we analyze the secrecy performance of an M2M communication system under the imperfect knowledge of wireless channel state. Later, the chapter provides a comparison of two jamming techniques, namely, full duplex (FD) jamming and dedicated jamming. It is shown that the dedicated jamming performs better than the FD jamming at the cost of introducing an additional node with additional power requirements. The results also show that by increasing the energy harvesting duration of devices, the FD destination-assisted jamming can also perform very close to dedicated jamming.",
keywords = "Energy harvesting, Full duplex, Machine-to-machine, Physical layer security",
author = "Furqan Jameel and Javed, {Muhammad Awais} and Jayakody, {Dushantha Nalin K.}",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-3-030-03508-2_5",
language = "English",
isbn = "9783030035075",
pages = "123--153",
booktitle = "5G Enabled Secure Wireless Networks",
publisher = "Springer International Publishing",

}

TY - CHAP

T1 - Physical layer security of energy harvesting machine-to-machine communication system

AU - Jameel, Furqan

AU - Javed, Muhammad Awais

AU - Jayakody, Dushantha Nalin K.

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Machine-to-machine (M2M) communication is emerging as a new paradigm to realize the concept of smart cities. In this chapter, we provide a comprehensive introduction to M2M communications, discuss its applications, and highlight its critical challenges. The chapter also provides a discussion of the energy harvesting techniques and their importance in modern wireless communication systems. Here, we mainly focus on RF energy harvesting due to its dual use in energy harvesting and information transfer. Next, a detailed discussion on recent trends of physical layer security (PLS) is presented. Using this basic knowledge of PLS and RF energy harvesting, we analyze the secrecy performance of an M2M communication system under the imperfect knowledge of wireless channel state. Later, the chapter provides a comparison of two jamming techniques, namely, full duplex (FD) jamming and dedicated jamming. It is shown that the dedicated jamming performs better than the FD jamming at the cost of introducing an additional node with additional power requirements. The results also show that by increasing the energy harvesting duration of devices, the FD destination-assisted jamming can also perform very close to dedicated jamming.

AB - Machine-to-machine (M2M) communication is emerging as a new paradigm to realize the concept of smart cities. In this chapter, we provide a comprehensive introduction to M2M communications, discuss its applications, and highlight its critical challenges. The chapter also provides a discussion of the energy harvesting techniques and their importance in modern wireless communication systems. Here, we mainly focus on RF energy harvesting due to its dual use in energy harvesting and information transfer. Next, a detailed discussion on recent trends of physical layer security (PLS) is presented. Using this basic knowledge of PLS and RF energy harvesting, we analyze the secrecy performance of an M2M communication system under the imperfect knowledge of wireless channel state. Later, the chapter provides a comparison of two jamming techniques, namely, full duplex (FD) jamming and dedicated jamming. It is shown that the dedicated jamming performs better than the FD jamming at the cost of introducing an additional node with additional power requirements. The results also show that by increasing the energy harvesting duration of devices, the FD destination-assisted jamming can also perform very close to dedicated jamming.

KW - Energy harvesting

KW - Full duplex

KW - Machine-to-machine

KW - Physical layer security

UR - http://www.scopus.com/inward/record.url?scp=85074313205&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85074313205&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-03508-2_5

DO - 10.1007/978-3-030-03508-2_5

M3 - Chapter

AN - SCOPUS:85074313205

SN - 9783030035075

SP - 123

EP - 153

BT - 5G Enabled Secure Wireless Networks

PB - Springer International Publishing

ER -