Your browser doesn't support javascript.
loading
Secure transmission for IoT wireless energy-carrying communication systems.
Wang, Pingxin; Jing, Zhen; Zhang, Zhi; Wang, Qing; Li, Congcong; Zhu, Hongxia.
Afiliação
  • Wang P; State Grid Shandong Electric Power Company Marketing Service Center (Measurement Center), Jinan, Shandong, China.
  • Jing Z; State Grid Shandong Electric Power Company Marketing Service Center (Measurement Center), Jinan, Shandong, China.
  • Zhang Z; State Grid Shandong Electric Power Company Marketing Service Center (Measurement Center), Jinan, Shandong, China.
  • Wang Q; State Grid Shandong Electric Power Company Marketing Service Center (Measurement Center), Jinan, Shandong, China.
  • Li C; State Grid Shandong Electric Power Company Marketing Service Center (Measurement Center), Jinan, Shandong, China.
  • Zhu H; State Grid Shandong Electric Power Company Marketing Service Center (Measurement Center), Jinan, Shandong, China.
PLoS One ; 18(8): e0289251, 2023.
Article em En | MEDLINE | ID: mdl-37535589
ABSTRACT
The wireless energy-carrying communication method for the Internet of Things (IoT) presents several difficulties for information security such as eavesdropping or data loss. To solve these issues, this paper presents a new secure transmission method for IoT wireless energy-carrying communication systems. In this method, first the secret message is turned into a word, delivered to the intended recipient and unlawful listener, respectively, and the received message is characterized as an entropy function. The message is iteratively solved using the block coordinate descent technique, and for each iteration, a digital baseband signal containing the receiver's secret message symbol and the matching beamforming vector is delivered. By concurrently optimizing the transmit beamforming vector, the noise covariance matrix, and the receiver power allocation factor based on a design that complies with the security rate and energy acquisition limitations for each receiver, the overall system transmit power is reduced. The Lagrangian method is used to solve the secure transmission problem of the communication system based on an iterative block coordinate descent algorithm, as well as to change the nonconvex problem into a convex problem and precisely derive the upper and lower bounds of the original transmission problem. In comparison to the conventional policy transmission scheme, the experimental results demonstrate that the DIPS (Digital Image Processing System) scheme can increase the STP (Signaling Transfer Point) by approximately 34.16 percent in the eavesdropper independent eavesdropping and joint eavesdropping scenarios. The usefulness of the secure transmission strategy for wireless energy-carrying communication systems is confirmed by this investigation.
Assuntos

Texto completo: 1 Base de dados: MEDLINE Assunto principal: Tecnologia sem Fio / Internet das Coisas Idioma: En Ano de publicação: 2023 Tipo de documento: Article

Texto completo: 1 Base de dados: MEDLINE Assunto principal: Tecnologia sem Fio / Internet das Coisas Idioma: En Ano de publicação: 2023 Tipo de documento: Article