Secrecy Performance Review for IoT-based Cognitive Farming System

Article ID: e260523217392 Pages: 10

  • * (Excluding Mailing and Handling)

Abstract

Smart farm management has complex challenges; therefore, there is a need to improve the overall adaptability, profitability, and environmental soundness of the farming systems. Agricultural production can be enhanced with the help of IoT-based cognitive tools. The rapid increase in IoT-based smart systems has raised critical concerns about efficiently utilizing the wireless spectrum. To drastically bring the improvement in the utilization of the wireless spectrum, cognitive radio (CR) has emerged as an effective solution. The inherent openness and broadcast nature of the wireless medium have given rise to many security issues in cooperative networks. Informationtheoretic security or physical layer security (PLS) is evolved as an efficacious wireless prototype for reliable transmissions to avert the eavesdropper from expropriating transmittal data on the wireless connections. Security is the key factor in these networks as they are exposed and active in behavior, thus, are susceptible to fraudulent activities. In this patent study, we investigated the performance of the CR system in terms of secrecy and also examined the system in terms of diversity receipt and selection of relay. The secrecy outcome of channel state information at the sender was also studied. The detrimental effects of fading in cooperative networks were also extensively discussed. Cooperative diversity was examined by deploying MRC and SC strategies at receptors. It has been deduced that CSI knowledge at the sender also has an eloquent concussion on the secrecy of the cognitive system.

Graphical Abstract

[1]
Y. Zou, X. Li, and Y.C. Liang, "Secrecy outage and diversity analysis of cognitive radio systems", IEEE J. Sel. Areas Comm., vol. 32, no. 11, pp. 2222-2236, 2014.
[http://dx.doi.org/10.1109/JSAC.2014.141121]
[2]
K. Chopra, R. Bose, and A. Joshi, "Secrecy performance of threshold-based cognitive relay network with diversity combining", J. Commun. Netw., vol. 20, no. 4, pp. 383-395, 2018.
[http://dx.doi.org/10.1109/JCN.2018.000054]
[3]
K. Chopra, R. Bose, and A. Joshi, "Secrecy performance of threshold‐based decode‐and‐forward cooperative cognitive radio network", IET Commun., vol. 11, no. 9, pp. 1396-1406, 2017.
[http://dx.doi.org/10.1049/iet-com.2016.0917]
[4]
N.T. Do, and B. An, "Secure transmission using decode-and-forward protocol for underlay cognitive radio networks", Proc. IEEE Seventh International Conference on Ubiquitous and Future Networks, pp. 914-918, 2015.
[http://dx.doi.org/10.1109/ICUFN.2015.7182678]
[5]
P.N. Son, and H.Y. Kong, "The underlay cooperative cognitive network with secure transmission", Proc. IEEE 27th Biennial Symposium on Communications (QBSC), pp. 164-167, 2014.
[http://dx.doi.org/10.1109/QBSC.2014.6841206]
[6]
Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks", IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, 2013.
[http://dx.doi.org/10.1109/TCOMM.2013.111213.130235]
[7]
L. Sibomana, H-J. Zepernick, and H. Tran, "Achievable secrecy capacity in an underlay cognitive radio network", In Proc. IEEE Conference on Communications and Network Security (CNS), 2014, pp. 1-6
[http://dx.doi.org/10.1109/CNS.2014.6997458]
[8]
D. Li, "Outage probability of cognitive radio networks with relay selection", IET Commun., vol. 5, no. 18, pp. 2730-2735, 2011.
[http://dx.doi.org/10.1049/iet-com.2011.0216]
[9]
Y. Zou, B. Champagne, W.P. Zhu, and L. Hanzo, "Relay-selection improves the security-reliability trade-off in cognitive radio systems", IEEE Trans. Commun., vol. 63, no. 1, pp. 215-228, 2015.
[http://dx.doi.org/10.1109/TCOMM.2014.2377239]
[10]
Ning Zhang, Ning Lu, Nan Cheng, J.W. Mark, and X.S. Shen, "Cooperative spectrum access towards secure information transfer for CRNs", IEEE J. Sel. Areas Comm., vol. 31, no. 11, pp. 2453-2464, 2013.
[http://dx.doi.org/10.1109/JSAC.2013.131130]
[11]
Q. Gu, G. Wang, R. Fan, and Z. Zhong, "Secure performance analysis of cognitive two-way relay system with an eavesdropper", IEEE/CIC International Conference on Communications in China (ICCC), pp. 176-180, 2014.
[http://dx.doi.org/10.1109/ICCChina.2014.7008267]
[12]
L. Sibomana, H-J. Zepernick, and H. Tran, "On physical layer security for reactive DF cognitive relay networks", Proc. IEEE Globecom Workshops (GC Wkshps), pp. 1290-1295, 2014.
[http://dx.doi.org/10.1109/GLOCOMW.2014.7063611]
[13]
J. Yang, L. Chen, J. Ding, X. Hu, and P.T. Mathiopoulos, "Intercept outage probability analysis of cognitive relay networks in presence of eavesdropping attack", Proc. IEEE21st Asia-Pacific Conference on Communications (APCC), pp. 304-308, 2015.
[http://dx.doi.org/10.1109/APCC.2015.7412531]
[14]
C. Wang, and H.M. Wang, "On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels", IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1814-1827, 2014.
[http://dx.doi.org/10.1109/TIFS.2014.2356339]
[15]
S. Zhihui, Q Yi, and C. Song, "On physical layer security for cognitive radio networks", IEEE Netw., vol. 27, no. 3, pp. 28-33, 2013.
[http://dx.doi.org/10.1109/MNET.2013.6523805]
[16]
H. Jawad, R. Nordin, S. Gharghan, A. Jawad, and M. Ismail, "Energy-efficient wireless sensor networks for precision agriculture: A review", Sensors, vol. 17, no. 8, p. 1781, 2017.
[http://dx.doi.org/10.3390/s17081781] [PMID: 28771214]
[17]
M.W. Rasooli, B. Bhushan, and N. Kumar, "Applicability of wireless sensor networks & IoT in saffron & wheat crops: A smart agriculture perspective", Int. J. Sci. Technol. Res, vol. 9, no. 2, pp. 2456-2461, . INCOMPLETE...
[18]
A. Khattab, E.D.H. Serag, and I. Haythem, "An IoT-based cognitive monitoring system for early plant disease forecast", Comput. Electron. Agric., vol. 166, p. 105028, 2019.
[http://dx.doi.org/10.1016/j.compag.2019.105028]
[19]
A.A. Khan, "A novel cognitive radio enabled IoT system for smart irrigation", Journal of Informatics and Mathematical Sciences, vol. 9, no. 1, pp. 129-136, .
[20]
A.D. Indriyanti, "Design and build smart agriculture using cognitive internet of things (C IoT)", J. Soc. Sci. Res., vol. 1, no. 7, 2022.
[http://dx.doi.org/10.36418/jrssem.v1i7.113]
[21]
M. Pathan, N. Patel, H. Yagnik, and M. Shah, "Artificial cognition for applications in smart agriculture: A comprehensive review", Artii. Intelli. Agri., vol. 4, pp. 81-95, .
[http://dx.doi.org/10.1016/j.aiia.2020.06.001]
[22]
H.N. Saha, "Development of IoT-based smart security and monitoring devices for agriculture", C. Amitava, and B. Arindam, Eds., Agricultural Informatics: Automation Using the IoT and Machine Learning, Wiley, pp. 147-69.
March 19 2021 [http://dx.doi.org/10.1002/9781119769231.ch8]
[23]
M.A. Haque, R. Reek, and C. Monojit, Security enhancement for IoT enabled agricultureAgricultural Informatics: Automation Using the IoT and Machine LearningWiley, .
[http://dx.doi.org/10.1016/j.matpr.2020.12.452]
[24]
E. Kariri, "IoT Powered Agricultural Cyber-Physical System: Security Issue Assessment", J. Inst. Electron. Telecommun. Eng., vol. 1, pp. 1-11, 2022.
[http://dx.doi.org/10.1080/03772063.2022.2032848]
[25]
L. Sibomana, H. Tran, and H-J. Zepernick, "On physical layer security for cognitive radio networks with primary user interference", Proc. IEEE Military Communications Conference (MILCOM) pp. 281-286, 2015 Oct 26, pp. 281-286.
[http://dx.doi.org/10.1109/MILCOM.2015.7357456]
[26]
C. Tang, G. Pan, and T. Li, "Secrecy outage analysis of underlay cognitive radio unit over Nakagami-m fading channels", IEEE Wirel. Commun. Lett., vol. 3, no. 6, pp. 609-612, .
[http://dx.doi.org/10.1109/LWC.2014.2350501]
[27]
T.T. Duy, and V.N.Q. Bao, "Secrecy outage performance of relay networks under interference constraint", Proc. of the International Conference on Advanced Technologies for Communications (ATC2014), pp. 125-130, 2014.
[http://dx.doi.org/10.1109/ATC.2014.7043369]
[28]
H. Ma, K. Niu, W. Wu, S. Li, and G. Chu, "Secrecy transmission capacity of primary network with help of cognitive interference", Proc. IEEE 22nd International Conference on Telecommunications (ICT), pp. 21-25, .
INCOMPLETE… [http://dx.doi.org/10.1109/ICT.2015.7124651]
[29]
L. Fan, S. Zhang, T.Q. Duong, and G.K. Karagiannidis, "Switchand-stay combining relaying for security enhancement in cognitive radio networks", Proc. IEEE Global Communications Conference (GLOBECOM), pp. 1-6, 2015.
[30]
B. Sklar, "Rayleigh fading channels in mobile digital communication systems. I. Characterization", IEEE Commun. Mag., vol. 35, no. 9, pp. 136-146, .
[http://dx.doi.org/10.1109/35.620535]
[31]
J. Proakis, Digital Communications.4th edMcGraw-Hill: New York, NY, USA, .
[32]
K. Chopra, R. Bose, and A. Joshi, "Secrecy outage performance of cooperative relay network with diversity combining", Proc. IEEE International Conference on Signal and Image Processing (ICSIP), 2017.
[33]
Lun Dong, Zhu Han, A.P. Petropulu, and H.V. Poor, "Improving wireless physical layer security via cooperating relays", IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, .
[http://dx.doi.org/10.1109/TSP.2009.2038412]
[34]
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints", IET Commun., vol. 4, no. 15, pp. 1787-1791, .
[http://dx.doi.org/10.1049/iet-com.2009.0634]
[35]
A. Jindal, C. Kundu, and R. Bose, "Secrecy outage of dual-hop AF relay system with relay selection without eavesdropper’s CSI", IEEE Commun. Lett., vol. 18, no. 10, pp. 1759-1762, .
[http://dx.doi.org/10.1109/LCOMM.2014.2339323]
[36]
C. Kundu, S. Ghose, and R. Bose, "Secrecy outage of dual-hop regenerative multi-relay system with relay selection", IEEE Trans. Wirel. Commun., vol. 14, no. 8, pp. 4614-4625, .
[http://dx.doi.org/10.1109/TWC.2015.2423290]
[37]
K. Chopra, R. Bose, and A. Joshi, "Secrecy outage of cooperative relay network with and without eavesdropper’s direct link", In Twenty-third National Conference on Communications (NCC), 2017, pp. 1-6
[http://dx.doi.org/10.1109/NCC.2017.8077065]
[38]
T. Wang, "Comparison of the energy efficiency for decode-and-forward and amplify-and-forward two-way relaying", Proc. IEEE 5th International Conference on Broadband Network & Multimedia Technology (IC-BNMT), pp. 232-236, 2013.
[http://dx.doi.org/10.1109/ICBNMT.2013.6823948]
[39]
G. Levin, and S. Loyka, "Amplify-and-forward versus decode-and-forward relaying: which is better?", Proc. 22nd International Zurich Seminar on Communications (IZS), 2012.
[40]
Z. Shu, Y. Yang, Y. Qian, and R.Q. Hu, "Impact of interference on secrecy capacity in a cognitive radio network", Proc. IEEE Global Telecommunications Conference (GLOBECOM), pp. 1-6, 2011.
[41]
S. Ghose, C. Kundu, and R. Bose, "Secrecy performance of dual‐hop decode‐and‐forward relay system with diversity combining at the eavesdropper", IET Commun., vol. 10, no. 8, pp. 904-914, .
[http://dx.doi.org/10.1049/iet-com.2015.1060]
[42]
W. Yang, X. Xu, Y. Cai, and B. Zheng, "Secrecy outage analysis for cooperative DF underlay CRNs with outdated CSI", Proc. IEEE Wireless Communications and Networking Conference (WCNC), pp. 416-421, 2014.
[http://dx.doi.org/10.1109/WCNC.2014.6952044]
[43]
T.Q. Duong, T.T. Duy, M. Elkashlan, N.H. Tran, and O.A. Dobre, "Secured cooperative cognitive radio networks with relay selection", Proc. IEEE Global Communications Conference (GLOBECOM), pp. 3074-3079, 2014.
[http://dx.doi.org/10.1109/GLOCOM.2014.7037277]
[44]
Y. Liu, L. Wang, T.T. Duy, M. Elkashlan, and T.Q. Duong, "Relay selection for security enhancement in cognitive relay networks", IEEE Wirel. Commun. Lett., vol. 4, no. 1, pp. 46-49, .
[http://dx.doi.org/10.1109/LWC.2014.2365808]
[45]
P. Chakraborty, and S. Prakriya, "Secrecy outage performance of a cooperative cognitive relay network", IEEE Commun. Lett., vol. 21, no. 2, pp. 326-329, .
[http://dx.doi.org/10.1109/LCOMM.2016.2564380]
[46]
H. Sakran, O. Nasr, S. El-Rabaie, A.A. El-Azm, and M. Shokair, "Proposed relay selection scheme for physical layer security in cognitive radio networks", IET Commun., vol. 6, no. 16, pp. 2676-2687, .
[http://dx.doi.org/10.1049/iet-com.2011.0638]
[47]
M. Al-jamali, A. Al-Nahari, and M.M. AlKhawlani, "Relay selection scheme for improving the physical layer security in cognitive radio networks", Proc. IEEE 23rd Signal Processing and Communications Applications Conference (SIU), pp. 495-498, 2015.
[http://dx.doi.org/10.1109/SIU.2015.7129868]
[48]
T. He, and T. Zhao, "Relay selection with jamming under security constraints in cognitive radio networks", Proc. IEEE 8th International ICST Conference on Communications and Networking in China (CHINACOM), pp. 63-68, 2013.
[49]
Y. Zou, J. Zhu, L. Yang, Y. Liang, and Y. Yao, "Securing physical-layer communications for cognitive radio networks", IEEE Commun. Mag., vol. 53, no. 9, pp. 48-54, .
[http://dx.doi.org/10.1109/MCOM.2015.7263345]
[50]
M.Z.I. Sarkar, and T. Ratnarajah, "Secrecy capacity over log-normal fading channel with diversity combining techniques", Proc. IEEE Wireless Communications and Networking Conference (WCNC), pp. 2457-2461, 2013.
[http://dx.doi.org/10.1109/WCNC.2013.6554946]
[51]
H. Zhao, Y. Tan, G. Pan, Y. Chen, and N. Yang, "Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks", IEEE Trans. on Veh. Technol., vol. 65, no. 12, .
[http://dx.doi.org/10.1109/TVT.2016.2529704]
[52]
H. Zhao, H. Liu, Y. Liu, C. Tang, and G. Pan, "Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels", Proc. IEEE International Conference on Communications Software and Networks (ICCSN), pp. 201-205, 2015.
[53]
Fangming He, Hong Man, and Wei Wang, "Maximal ratio diversity combining enhanced security", IEEE Commun. Lett., vol. 15, no. 5, pp. 509-511, .
[http://dx.doi.org/10.1109/LCOMM.2011.030911.102343]
[54]
H. Lei, H. Zhang, I. S. Ansari, C. Gao, Y. Guo, G. Pan, and K. A. Qaraqe, "Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-m channels", IEEE Trans. on Veh. Technol., vol. 65, no. 12, pp. 10126-10132, .
[http://dx.doi.org/10.1109/TVT.2016.2536801]
[55]
T. Zhang, Y. Huang, Y. Cai, and W. Yang, "Secure transmission in spectrum sharing relaying networks with multiple antennas", IEEE Commun. Lett., vol. 20, no. 4, pp. 824-827, .
[http://dx.doi.org/10.1109/LCOMM.2016.2537329]
[56]
H. Ding, J. Ge, D.B. da Costa, and Z. Jiang, "Asymptotic analysis of cooperative diversity systems with relay selection in a spectrum-sharing scenario", IEEE Trans. Vehicular Technol., vol. 60, no. 2, pp. 457-472, .
[http://dx.doi.org/10.1109/TVT.2010.2100053]
[57]
J. Xiong, D. Ma, K.K. Wong, and J. Wei, "Robust masked beamforming for miso cognitive radio networks with unknown eavesdroppers", IEEE Trans. Vehicular Technol., vol. 65, no. 2, pp. 744-755, .
[http://dx.doi.org/10.1109/TVT.2015.2400452]
[58]
L. Cui, Y. Qu, G. Xie, D. Zeng, R. Li, S. Shen, and S. Yu, "Security and privacy-enhanced federated learning for anomaly detection in IoT infrastructures", IEEE Trans. Industr. Inform., vol. 18, no. 5, pp. 3492-3500, .
[http://dx.doi.org/10.1109/TII.2021.3107783]
[59]
Y. Qu, S.R. Pokhrel, S. Garg, L. Gao, and Y. Xiang, "A blockchained federated learning framework for cognitive computing in industry 4.0 networks", IEEE Trans. Industr. Inform., vol. 17, no. 4, pp. 2964-2973, .
[http://dx.doi.org/10.1109/TII.2020.3007817]
[60]
Makhzoum A., Venkataraman S., Tremouillaux-Guiller J., and Hefferon K., “Recent patents in agricultural biotechnology; focus on health.,” Recent Patents on Food, Nutri. & Agri., vol. 8, no. 2, pp. 82-90, 2016.