Quality of Protection in Cloud-Assisted Cognitive Machine-to-Machine Communications for Industrial Systems

Cloud-assisted cognitive machine-to-machine co- mmunications (CM2M) is a new paradigm to improve the mobile services, which have drawn considerable attention in industry and academia. In this paper, we consider the quality of protection (QoP) of information transmission in cloud-assisted CM2M commun...

Full description

Saved in:
Bibliographic Details
Published inMobile networks and applications Vol. 21; no. 6; pp. 1032 - 1042
Main Authors Jiang, Li, Tian, Hui, Shen, Jian, Maharjan, Sabita, Zhang, Yan
Format Journal Article
LanguageEnglish
Published New York Springer US 01.12.2016
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Cloud-assisted cognitive machine-to-machine co- mmunications (CM2M) is a new paradigm to improve the mobile services, which have drawn considerable attention in industry and academia. In this paper, we consider the quality of protection (QoP) of information transmission in cloud-assisted CM2M communications. In such an environment, the secondary M2M system intends to share the primary spectrum on the condition that the secondary transmitter (ST) has to relay the primary message. However, the ST is a low-energy device which adopts the energy harvesting technique to power itself. In particular, we focus on secure information transmission for the primary system when the secondary users (SUs) are the potential eavesdroppers. We aim to jointly design power splitting and secure beamforming to maximize the secondary M2M system data rate subject to the secrecy requirement of the primary system and the ST power constraint. To solve this non-convex problem, we propose a computationally efficient two-stage optimization approach. Simulation results demonstrate that our proposed scheme achieves a significant transmission rate of the secondary M2M system while provides a high secrecy rate for the primary system compared to the scheme without energy harvesting.
Bibliography:SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
ISSN:1383-469X
1572-8153
DOI:10.1007/s11036-016-0769-6