Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications
- Authors: Li, Xuran , Dai, Hong-Ning , Shukla, Mahendra , Li, Dengwang , Xu, Huaqiang , Imran, Muhammad
- Date: 2021
- Type: Text , Journal article
- Relation: Computer Standards and Interfaces Vol. 78, no. (2021), p.
- Full Text: false
- Reviewed:
- Description: The security vulnerabilities are becoming the major obstacle to prevent the wide adoption of ultra-reliable and low latency communications (URLLC) in 5G and beyond communications. Current security countermeasures based on cryptographic algorithms have a stringent requirement on the centralized key management as well as computational capabilities of end devices while it may not be feasible for URLLC in 5G and beyond communications. In contrast to cryptographic approaches, friendly jamming (FJ) as a promising physical layer security method can enhance wireless communications security while it has less resource requirement on end devices and it can be applied to the full distribution environment. In order to protect wireless communications, FJ signals are introduced to degrade the decoding ability of eavesdroppers who maliciously wiretap confidential information. This article presents a state-of-the-art survey on FJ schemes to enhance network security for IoT networks with consideration of various emerging wireless technologies and different types of networks. First, we present various secrecy performance metrics and introduce the FJ method. The interference caused by FJ signals on legitimate communication is the major challenge of using FJ schemes. In order to overcome this challenge, we next introduce the integration of FJ schemes with various communication technologies, including beamforming, multiple-input multiple-output, full duplex, and relay selection. In addition, we also integrate FJ schemes with different types of communication networks. Finally, a case study of FJ schemes is illustrated and future research directions of FJ schemes have been outlined. © 2021 Elsevier B.V.
Is blockchain for internet of medical things a panacea for COVID-19 pandemic?
- Authors: Li, Xuran , Tao, Bishenghui , Dai, Hong-Ning , Imran, Muhammad , Wan, Dehuan , Li, Dengwang
- Date: 2021
- Type: Text , Journal article
- Relation: Pervasive and Mobile Computing Vol. 75, no. (2021), p.
- Full Text: false
- Reviewed:
- Description: The outbreak of the COVID-19 pandemic has deeply influenced the lifestyle of the general public and the healthcare system of the society. As a promising approach to address the emerging challenges caused by the epidemic of infectious diseases like COVID-19, Internet of Medical Things (IoMT) deployed in hospitals, clinics, and healthcare centers can save the diagnosis time and improve the efficiency of medical resources though privacy and security concerns of IoMT stall the wide adoption. In order to tackle the privacy, security, and interoperability issues of IoMT, we propose a framework of blockchain-enabled IoMT by introducing blockchain to incumbent IoMT systems. In this paper, we review the benefits of this architecture and illustrate the opportunities brought by blockchain-enabled IoMT. We also provide use cases of blockchain-enabled IoMT on fighting against the COVID-19 pandemic, including the prevention of infectious diseases, location sharing and contact tracing, and the supply chain of injectable medicines. We also outline future work in this area. © 2021 Elsevier B.V.
Securing internet of medical things with friendly-jamming schemes
- Authors: Li, Xuran , Dai, Hong-Ning , Wang, Qubeijian , Imran, Muhammad , Li, Dengwang
- Date: 2020
- Type: Text , Journal article , Review
- Relation: Computer Communications Vol. 160, no. (2020), p. 431-442
- Full Text: false
- Reviewed:
- Description: The Internet of Medical Things (IoMT)-enabled e-healthcare can complement traditional medical treatments in a flexible and convenient manner. However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional cryptographic approaches, which are often computationally-complicated. In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT. In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges. We then propose using Fri-jam schemes to protect the confidential medical data of patients collected by medical sensors from being eavesdropped. We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity. Moreover, we present two case studies of Fri-jam schemes in IoMT. The results of these two case studies indicate that the Fri-jam method will significantly decrease the eavesdropping risk while leading to no significant influence on legitimate transmission. © 2020