Figure - available from: Journal of Sensors
This content is subject to copyright. Terms and conditions apply.
Bit error rate (BER) versus the average system SNR.

Bit error rate (BER) versus the average system SNR.

Source publication
Article
Full-text available
We propose a robust wireless relay scheme in narrow-band communications for IoT access, which matches the typical features of IoT often carrying relatively low data rate with limited bandwidth. This framework is towards offering robustness in QoS guarantees with emphases on security and/or reliability, and we use the security-assured network as the...

Similar publications

Preprint
Full-text available
The problem of enhancing Quality-of-Service (QoS) in power constrained, mobile relay beamforming networks, by optimally and dynamically controlling the motion of the relaying nodes, is considered, in a dynamic channel environment. We assume a time slotted system, where the relays update their positions before the beginning of each time slot. Modeli...
Article
Full-text available
Internet of underground things (IoUTs) and wireless underground sensor networks (WUSNs) are new technologies particularly relevant in agriculture to measure and transmit environmental data, enabling us to optimize both crop growth and water resource management. The sensor nodes can be buried anywhere, including in the passage of vehicles, without i...
Article
Full-text available
In order to improve the energy efficiency (EE) performance of cooperative networks, this study combines non-orthogonal multiple access (NOMA) with simultaneous wireless information and power transfer (SWIPT) technologies to construct a cooperative relay network composed of one base station (BS), multiple near users, and one far user. Based on the n...
Preprint
Full-text available
Multicasting, where a base station (BS) wishes to convey the same message to several user equipments (UEs), represents a common yet highly challenging wireless scenario. In fact, guaranteeing decodability by the whole UE population proves to be a major performance bottleneck since the UEs in poor channel conditions ultimately determine the achievab...
Thesis
Full-text available
With rapid technological innovation in the field of wireless communications, spectrum scarcity has become a critical problem in some of the frequency bands. This has led to the design of cognitive radios, that are able to make opportunistic use of the under utilized spectrum, without affecting the licensed users of this spectrum by deploying some i...

Citations

... At the physical layer, the use of jammers can be employed as in [92], which presents an analysis of an AF relay-aided IoT network having an untrusted relay. To prevent the relay from decoding the signal it is forwarding, the relay's reception is jammed by a dedicated jammer device. ...
... The works in [92], [82] and [93] studied networks with untrusted relays. Whereas jamming with artificial noise is used in [92], the work in [82] used source and relay selection to improve the secrecy of relayed information. ...
... The works in [92], [82] and [93] studied networks with untrusted relays. Whereas jamming with artificial noise is used in [92], the work in [82] used source and relay selection to improve the secrecy of relayed information. Similarly, in both works, relays were modeled to be AF relays instead of DF relays. ...
Article
Full-text available
The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions.
... Given the distributed nature of the network, game theory has been identified as a well-suited mathematical framework to provide effective anti-jamming mechanisms [85],where IoT devices act as the players of a game aiming at either avoiding or mitigating the disruptive attacks of the jammer. Other approaches rely on traditional jamming-proof mechanisms such as relaying [86,87], spread-spectrum [88]and frequency hopping technologies [89]. ...
Article
Full-text available
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible from anywhere, addressing critical IoT security threats is now more important than ever. Traditional approaches where security is applied as an afterthought and as a “patch” against known attacks are insufficient. Indeed, next-generation IoT challenges will require a new secure-by-design vision, where threats are addressed proactively and IoT devices learn to dynamically adapt to different threats. To this end, machine learning and software-defined networking will be key to provide both reconfigurability and intelligence to the IoT devices. In this paper, we first provide a taxonomy and survey the state of the art in IoT security research, and offer a roadmap of concrete research challenges related to the application of machine learning and software-defined networking to address existing and next-generation IoT security threats.
... Given the distributed nature of the network, game theory has been identified as a well-suited mathematical framework to provide effective antijamming mechanisms [108], [109], [110], where IoT devices act as the players of a game aiming at either avoiding or mitigating the disruptive attacks of the jammer. Other approaches rely on traditional jamming-proof mechanisms such as relaying [111], [112], spread-spectrum [113], [114] and frequency hopping technologies [115], [116], [117]. ...
Article
Full-text available
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are deployed just about everywhere, from inside our bodies to the most remote areas of the globe. As the IoT will soon pervade every aspect of our lives and will be accessible from anywhere, addressing critical IoT security threats is now more important than ever. Traditional approaches where security is applied as an afterthought and as a "patch" against known attacks are insufficient. IoT challenges require a new secure-by-design vision, where threats are addressed proactively and IoT devices learn to dynamically adapt to different threats. In this paper, we first provide a taxonomy and survey the state of the art in IoT security research, and offer a roadmap of concrete research challenges to address existing and next-generation IoT security threats.