Skip to main content

Secure Short-Packet Communications for Mission-Critical IoT Applications

Author(s): Wang, Hui-Ming; Yang, Qian; Ding, Zhiguo; Poor, H Vincent

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1hh6c592
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWang, Hui-Ming-
dc.contributor.authorYang, Qian-
dc.contributor.authorDing, Zhiguo-
dc.contributor.authorPoor, H Vincent-
dc.date.accessioned2024-02-04T01:49:18Z-
dc.date.available2024-02-04T01:49:18Z-
dc.date.issued2019-03-20en_US
dc.identifier.citationWang, Hui-Ming, Yang, Qian, Ding, Zhiguo, Poor, H Vincent. (2019). Secure Short-Packet Communications for Mission-Critical IoT Applications. IEEE Transactions on Wireless Communications, 18 (5), 2565 - 2578. doi:10.1109/twc.2019.2904968en_US
dc.identifier.issn1536-1276-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1hh6c592-
dc.description.abstractIn applications of the Internet of Things (IoT), the use of short packets is expected to meet the stringent latency requirement in ultra-reliable low-latency communications; however, the incurred security issues and the impact of finite blocklength coding on the physical-layer security are not well understood. This paper investigates the performance of secure short-packet communications in a mission-critical IoT system with an external multi-antenna eavesdropper. An analytical framework is proposed to approximate the average achievable secrecy throughput of the system with finite blocklength coding. To gain more insight, a simple case with a single-antenna access point (AP) is considered first, in which the secrecy throughput is approximated in a closed form. Based on that result, the optimal blocklengths to maximize the secrecy throughput with and without the reliability and latency constraints, respectively, are derived. For the case with a multi-antenna AP, following the proposed analytical framework, closed-form approximations for the secrecy throughput are obtained under both beamforming and artificial-noise-aided transmission schemes. The numerical results verify the accuracy of the proposed approximations and illustrate the impact of the system parameters on the tradeoff between transmission latency and reliability under a secrecy constraint.en_US
dc.format.extent2565 - 2578en_US
dc.language.isoen_USen_US
dc.relation.ispartofIEEE Transactions on Wireless Communicationsen_US
dc.rightsAuthor's manuscripten_US
dc.titleSecure Short-Packet Communications for Mission-Critical IoT Applicationsen_US
dc.typeJournal Articleen_US
dc.identifier.doidoi:10.1109/twc.2019.2904968-
dc.identifier.eissn1558-2248-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
1903.01433.pdf676.4 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.