2018
DOI: 10.1186/s13638-018-1281-4
|View full text |Cite
|
Sign up to set email alerts
|

A novel secure relay selection strategy for energy-harvesting-enabled Internet of things

Abstract: In this article, we focus on the problem of relay selection for the cooperative cognitive radio-based Internet of things. In such systems, a pair of primary user devices (PUs) can only communicate with each other through a relay. The relay is selected from a set of multi-slot energy-harvesting (EH)-enabled secondary user devices (SUs). The charging and discharging process of an SD's battery is formulated as a finite state Markov chain, and we can derive the corresponding analytical expression of steady-state d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 48 publications
0
12
0
Order By: Relevance
“…A novel minimum bottleneck matching algorithm and a suboptimal relay selection algorithm are proposed for the group lifetime maximization policy. For an EH-enabled secondary system in cooperative cognitive radio-based IoT, the authors of [74] presented a Vickrey auction-based relay selection strategy. This strategy can select an SU from several EH-enabled candidate SUs as a relay node while the unselected SUs keep harvesting energy.…”
Section: Open Research Issuesmentioning
confidence: 99%
“…A novel minimum bottleneck matching algorithm and a suboptimal relay selection algorithm are proposed for the group lifetime maximization policy. For an EH-enabled secondary system in cooperative cognitive radio-based IoT, the authors of [74] presented a Vickrey auction-based relay selection strategy. This strategy can select an SU from several EH-enabled candidate SUs as a relay node while the unselected SUs keep harvesting energy.…”
Section: Open Research Issuesmentioning
confidence: 99%
“…Papers [12,13] use the traversal method to cluster terminals. However, the computational complexity is high.…”
Section: Related Workmentioning
confidence: 99%
“…Considering information security in cognitive radio-based IoT systems, Salameh et al [27] presented a novel algorithm for channel allocation with time-sensitive data under the scenario of jamming attacks. A secure relay selection scheme based on channel state information and battery state information was proposed for energy harvesting-based cognitive radio networks in IoT networks [28].…”
Section: Related Workmentioning
confidence: 99%
“…Unlike the abovementioned literates [27,28], we consider an actual application scenarios for sanatorium or hospital under the cognitive radio-based IoTM networks to protect the patients' sensitive medical information. Consider an indoor environment for sanatorium or hospital, where the PT intends to transmit its sensitive medical data to the PR, while the ST performs data monitoring and transfer to the SR.…”
Section: Motivation and Contributionsmentioning
confidence: 99%