{"title":"多天线笔记本电脑无线接入物联网网络的安全性","authors":"Juan Zhao, Xiaolong Xu","doi":"10.1109/CYBERC.2018.00095","DOIUrl":null,"url":null,"abstract":"It is very important to assure the security of laptop access to internet of things (IoT) networks, where all the channels are wireless. In this paper, we design an algorithm to select the proper legitimate laptop to access IoT networks with one eavesdropper in the same networks. Both of each legitimate laptop and the eavesdropper laptop are equipped with multiple antennas as widely applied in 4G, 4G and wireless local area networks (WLAN). It is assumed that the maximum ratio transmit (MRT) and the maximum ratio receive (MRC) are respectively applied at the transmitter and the receiver for each legitimate laptop. The MRC receiver is also employed by each eavesdropper laptop. Our objective is to maximize the throughput of the legitimate laptop yet minimizing the throughput of the eavesdropper laptop over the whole networks. Numerical simulations demonstrate the gain of the proposed method as compared to the reference schemes.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security of Multi-antenna Laptop Wirelessly Access to Internet of Things Networks\",\"authors\":\"Juan Zhao, Xiaolong Xu\",\"doi\":\"10.1109/CYBERC.2018.00095\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is very important to assure the security of laptop access to internet of things (IoT) networks, where all the channels are wireless. In this paper, we design an algorithm to select the proper legitimate laptop to access IoT networks with one eavesdropper in the same networks. Both of each legitimate laptop and the eavesdropper laptop are equipped with multiple antennas as widely applied in 4G, 4G and wireless local area networks (WLAN). It is assumed that the maximum ratio transmit (MRT) and the maximum ratio receive (MRC) are respectively applied at the transmitter and the receiver for each legitimate laptop. The MRC receiver is also employed by each eavesdropper laptop. Our objective is to maximize the throughput of the legitimate laptop yet minimizing the throughput of the eavesdropper laptop over the whole networks. Numerical simulations demonstrate the gain of the proposed method as compared to the reference schemes.\",\"PeriodicalId\":282903,\"journal\":{\"name\":\"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYBERC.2018.00095\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERC.2018.00095","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security of Multi-antenna Laptop Wirelessly Access to Internet of Things Networks
It is very important to assure the security of laptop access to internet of things (IoT) networks, where all the channels are wireless. In this paper, we design an algorithm to select the proper legitimate laptop to access IoT networks with one eavesdropper in the same networks. Both of each legitimate laptop and the eavesdropper laptop are equipped with multiple antennas as widely applied in 4G, 4G and wireless local area networks (WLAN). It is assumed that the maximum ratio transmit (MRT) and the maximum ratio receive (MRC) are respectively applied at the transmitter and the receiver for each legitimate laptop. The MRC receiver is also employed by each eavesdropper laptop. Our objective is to maximize the throughput of the legitimate laptop yet minimizing the throughput of the eavesdropper laptop over the whole networks. Numerical simulations demonstrate the gain of the proposed method as compared to the reference schemes.