Resource Allocation for Secure Ultra-Reliable Low-Latency-Communication in IoT Applications

Document Type : Research Paper

Authors

Faculty of Electrical and computer Engineering, University of Tabriz, Tabriz, Iran

Abstract

The Internet of Things (IoT) has a significant demand in society due to its features, and it is constantly improving. In the context of wireless technology, Ultra-reliable and low-latency communication (URLLC) is one of the essential and challenging services in fifth-generation (5G) networks and beyond. The research on URLLC is still in its early stages due to its conflicting requirements, regarding high reliability and low latency. In this paper, we study the performance of secure short-packet communications and resource allocation in IoT systems. To this end, we investigate a health center automation, where the goal of the access point is to send critical messages to devices without eavesdropping. In this context, our goal is to maximize the weighted sum throughput and minimize the total transmit power, respectively.The problems of maximizing the weighted sum throughput, and minimizing the total transmit power are non-convex and hard to solve. To overcome this challenge, we use efficient mathematical techniques, such as the block coordinate descent (BCD) method and gradient ascent algorithm; we also use estimation methods such as Ralston, Heun, and forward-backward, in the derivative part of the gradient ascent algorithm. The simulation results show the performance advantages of the BCD algorithm and the gradient ascent in the short packet transmission scheme, also the simulation results show the superiority of the proposed methods in most cases. 

Keywords


[1] Kaur, “A Survey on Internet of Things – Architecture, Applications, and Future Trends,” In Computing and Communication (ICSCCC), 2018, First International Conference on Secure Cyber, 2017, pp 581-583.
[2] Kaur, “A Survey on Internet of Things – Architecture, Applications, and Future Trends,” In Computing and Communication (ICSCCC), 2018, First International Conference on Secure Cyber, 2017, pp 581-583.
[3] Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu and W. Nie,” Anatomy of Threats to the Internet of Things,” IEEE Communications Surveys & Tutorials, Second quarter 2019.
[4] Mosenia and N. K. Jha, “A comprehensive study of security of internet-of-things,” IEEE Trans. Emerging Topics in Computing, vol. 5, no. 4, pp. 586–602, Oct. 2017.
[5] A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of things security: A survey,” Journal of Network and Computer Applications, vol. 88, pp. 10-28, June 2017.
[6] Chettri and R. Bera, “A Comprehensive Survey on Internet of Things (IoT) Towards 5GWireless Systems,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16-32, Jan. 2020.
[7] Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, H. V. Poor, “6G Internet of Things: A Comprehensive Survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 359-383, Jan. 2022.
[8] A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz, “A Survey on 5G networks for the internet of things: communication technologies and challenges”, IEEE access, doi 10.1109/access 2017.2778844, 2017.
[9] N. C. Yilmaz, Y.-P. E Wang, N. A. Johansson, N. Brahmi, Sh. A. Ashraf , J. Sachs, “ Analysis of ultra-reliable and low-latency 5G communication for a factory automation use case,” IEEE International Conference on Communication Workshop (ICCW), June 2015, pp. 1190-1195.
[10] -M. Wang, Q. Yang, Z. Ding, and H. V. Poor, “Secure short-packet communications for mission-critical IoT applications,” IEEE Trans. Wireless Communications., vol. 18, no. 5, pp. 2565-2578, May 2019.
[11] Cao et al., “Secure transmission via beamforming optimization for NOMA networks,” IEEE Wireless Communications., vol. 27, no. 1, pp. 193–199, Feb. 2020.
[12] Han, K. Xiao, R. Liu, X. Liu, G. C. Alexandropoulos, and Sh. Jin, “ Dynamic resource allocation schemes for eMBB and URLLC services in 5G wireless networks,” IEEE Intelligent and Converged Networks., vol. 3, no. 2, pp. 145-160, June 2022.
[13] Durisi, T. Koch, and P. Popovski, “Toward massive, Ultrareliable, and low-latency wireless communication with short packets,” in Proceedings of the IEEE, vol. 104, no. 9, pp. 1711–1726, Sept. 2016.
[14] Popovski, Č. Stefanović, J. J. Nielsen, E. Carvalho, M. Angjelichinoski, K. F. Trillingsgaard, and A.-S Bana, “Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC),” IEEE Trans. Commun., vol. 67, no. 8, pp. 5783-5801, Aug. 2019.
[15] Bennis, M. Debbah, H. V. Poor, “Ultra reliable and Low-Latency Wireless Communication: Tail, Risk, and Scale,” Proceedings of the IEEE, vol. 106, no. 10, pp. 1834-1853, sept 2018.
[16] Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Resource allocation for URLLC in 5G mission-critical IoT networks,” in Proc. IEEE Int. Conf. Communications. (ICC), pp. 1–6, May 2019.
[17] Ali, Y. B. Zikria, A.K Bashir, S. Garg and H. S. Kim, “URLLC for 5G and Beyond: Requirements, Enabling Incumbent Technologies and Network Intelligence,” IEEE Access, vol. 9, pp. 67064-67095, April 2021.
[18] Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “ Resource Allocation for Secure URLLC in Mission-Critical IoT Scenarios,” IEEE Trans. Communications., vol. 68, no. 9, pp. 5793-5807, Sept. 2020.
[19] Sun, Ch. She, Ch. Yang, T. Q. S. Quek, Y. Li, and B. Vucetic, “ Optimizing Resource Allocation in the Short Blocklength Regime for Ultra-Reliable and Low-Latency Communications,” IEEE Trans. Wireless Communications., vol. 18, no. 1, pp. 402-415, Jan. 2019.
[20] Khan and S. Coleri, “Resource Allocation for Ultra-Reliable Low-Latency Vehicular Networks in Finite Blocklength Regime,” IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece, pp. 322-327, 2022.
[21] Pan, H. Ren, Y. Deng, M. Elkashlan, and A. Nallanathan, “Joint block length and location optimization for URLLC-enabled UAV relay systems,” IEEE Communications. Lett. vol. 23, no. 3, pp. 498–501, Mar. 2019.
[22] Zhou et al., “Secure communications for UAV-enabled mobile edge computing systems,” IEEE Trans. Commun., vol. 68, no. 1, pp. 376–388, Jan. 2020.
[23] Yang, R. F. Schaefer, and H. V. Poor, “Wiretap channels: Non asymptotic fundamental limits,” IEEE Trans. Inf. Theory, vol. 65, no. 7, pp. 4069–4093, July 2019.
[24] Librino, P. Santi, “ Resource Allocation and Sharing in URLLC for IoT Applications using Shareability Graphs,” IEEE Internet of Things., vol. 7, no. 10, pp. 10511-10526, Oct. 2020.
[25] Bubeck, “ Convex Optimization: Algorithms and Complexity,” Foundations and Trends in Machine Learning, vol. 8, no. 3-4, pp. 231-357, 2015.
[26] Further Advancements for E-UTRA Physical Layer Aspects, E. U. T. R. Access, 3GPP document TR 36.814, 2010.
[27] Makhdoom, M. Abolhasan, J. Lipman, R. P. Liu and W. Nie,” Anatomy of Threats to the Internet of Things,” IEEE Communications Surveys & Tutorials, Second quarter 2019.
[28] Mosenia and N. K. Jha, “A comprehensive study of security of internet-of-things,” IEEE Trans. Emerging Topics in Computing, vol. 5, no. 4, pp. 586–602, Oct. 2017.
[29] A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, “Internet of things security: A survey,” Journal of Network and Computer Applications, vol. 88, pp. 10-28, June 2017.
[30] Chettri and R. Bera, “A Comprehensive Survey on Internet of Things (IoT) Towards 5GWireless Systems,” IEEE Internet of Things Journal, vol. 7, no. 1, pp. 16-32, Jan. 2020.
[31] Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, H. V. Poor, “6G Internet of Things: A Comprehensive Survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 359-383, Jan. 2022.
[32] A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz, “A Survey on 5G networks for the internet of things: communication technologies and challenges”, IEEE access, doi 10.1109/access 2017.2778844, 2017.
[33] N. C. Yilmaz, Y.-P. E Wang, N. A. Johansson, N. Brahmi, Sh. A. Ashraf , J. Sachs, “ Analysis of ultra-reliable and low-latency 5G communication for a factory automation use case,” IEEE International Conference on Communication Workshop (ICCW), June 2015, pp. 1190-1195.
[34] -M. Wang, Q. Yang, Z. Ding, and H. V. Poor, “Secure short-packet communications for mission-critical IoT applications,” IEEE Trans. Wireless Communications., vol. 18, no. 5, pp. 2565-2578, May 2019.
[35] Cao et al., “Secure transmission via beamforming optimization for NOMA networks,” IEEE Wireless Communications., vol. 27, no. 1, pp. 193–199, Feb. 2020.
[36] Han, K. Xiao, R. Liu, X. Liu, G. C. Alexandropoulos, and Sh. Jin, “ Dynamic resource allocation schemes for eMBB and URLLC services in 5G wireless networks,” IEEE Intelligent and Converged Networks., vol. 3, no. 2, pp. 145-160, June 2022.
[37] Durisi, T. Koch, and P. Popovski, “Toward massive, Ultrareliable, and low-latency wireless communication with short packets,” in Proceedings of the IEEE, vol. 104, no. 9, pp. 1711–1726, Sept. 2016.
[38] Popovski, Č. Stefanović, J. J. Nielsen, E. Carvalho, M. Angjelichinoski, K. F. Trillingsgaard, and A.-S Bana, “Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC),” IEEE Trans. Commun., vol. 67, no. 8, pp. 5783-5801, Aug. 2019.
[39] Bennis, M. Debbah, H. V. Poor, “Ultra reliable and Low-Latency Wireless Communication: Tail, Risk, and Scale,” Proceedings of the IEEE, vol. 106, no. 10, pp. 1834-1853, sept 2018.
[40] Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “Resource allocation for URLLC in 5G mission-critical IoT networks,” in Proc. IEEE Int. Conf. Communications. (ICC), pp. 1–6, May 2019.
[41] Ali, Y. B. Zikria, A.K Bashir, S. Garg and H. S. Kim, “URLLC for 5G and Beyond: Requirements, Enabling Incumbent Technologies and Network Intelligence,” IEEE Access, vol. 9, pp. 67064-67095, April 2021.
[42] Ren, C. Pan, Y. Deng, M. Elkashlan, and A. Nallanathan, “ Resource Allocation for Secure URLLC in Mission-Critical IoT Scenarios,” IEEE Trans. Communications., vol. 68, no. 9, pp. 5793-5807, Sept. 2020.
[43] Sun, Ch. She, Ch. Yang, T. Q. S. Quek, Y. Li, and B. Vucetic, “ Optimizing Resource Allocation in the Short Blocklength Regime for Ultra-Reliable and Low-Latency Communications,” IEEE Trans. Wireless Communications., vol. 18, no. 1, pp. 402-415, Jan. 2019.
[44] Khan and S. Coleri, “Resource Allocation for Ultra-Reliable Low-Latency Vehicular Networks in Finite Blocklength Regime,” IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece, pp. 322-327, 2022.
[45] Pan, H. Ren, Y. Deng, M. Elkashlan, and A. Nallanathan, “Joint block length and location optimization for URLLC-enabled UAV relay systems,” IEEE Communications. Lett. vol. 23, no. 3, pp. 498–501, Mar. 2019.
[46] Zhou et al., “Secure communications for UAV-enabled mobile edge computing systems,” IEEE Trans. Commun., vol. 68, no. 1, pp. 376–388, Jan. 2020.
[47] Yang, R. F. Schaefer, and H. V. Poor, “Wiretap channels: Non asymptotic fundamental limits,” IEEE Trans. Inf. Theory, vol. 65, no. 7, pp. 4069–4093, July 2019.
[48] Librino, P. Santi, “ Resource Allocation and Sharing in URLLC for IoT Applications using Shareability Graphs,” IEEE Internet of Things., vol. 7, no. 10, pp. 10511-10526, Oct. 2020.
[49] Bubeck, “ Convex Optimization: Algorithms and Complexity,” Foundations and Trends in Machine Learning, vol. 8, no. 3-4, pp. 231-357, 2015.
[50] Further Advancements for E-UTRA Physical Layer Aspects, E. U. T. R. Access, 3GPP document TR 36.814, 2010.