Abstract

Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.

1. Introduction

The popularization of smart devices and corresponding applications in Internet of Things (IoT) systems, such as smart city, intelligent industry, and security surveillance, has penetrated modern life [1]. We heavily rely on these wireless smart devices for private information transmission. The rapid development of mobile computing prompts smart devices to receive wireless signals without restriction. Due to the broadcast nature of wireless channels, legitimate wireless signals are vulnerable to unauthorized receivers. Wiretap, caused by an eavesdropper, is a passive attack and does not interfere with legitimate transceivers. Though a legitimate receiver can receive untampered signals, the privacy leakage of these signals is unacceptable along with more attention to information security [24].

Multilayer-based mechanisms have been studied to increase the security and integrity of transmitted signals. These mechanisms, designed by traditional cryptography algorithms, are deployed in the high layers of the open system interconnection model [57]. However, the distribution and management of secret keys between wireless devices remain a challenge for cryptography-based security mechanisms [8]. Moreover, low-end IoT devices with limited computing capability and hardware resources cannot adopt highly complex cryptographic approaches [9, 10]. These increase the probability to eavesdrop on legitimate signals. Therefore, we need to introduce complementary or alternative information security measures for IoT devices and applications. Physical layer security (PLS) was first presented in Wyner’s wiretap channel [11] and then extended to a Gaussian degraded wiretap channel in [12] and a general nondegraded wiretap channel in [13]. These works are a vital foundation for the following studies.

PLS exploits physical inherent characteristics of wireless channels to guarantee information security regardless of eavesdropper computing capability. It can provide low-layer protection without compromising the existing cryptographic technique-based security protection. Signal processing techniques such as beamforming, precoding, and diversity approaches contribute to PLS. Besides, cooperative jamming, first proposed in [14], is a mainstream technology of PLS, whose core idea is to hide legitimate signals within artificial noise (AN). Essentially, the inherent randomness of AN is used to stop eavesdropping to guarantee information security. At the same time, to avoid AN from interfering with legitimate receivers, it should be actively controlled.

Most cooperative jamming schemes interfere with eavesdroppers by AN while exploiting beamforming to cancel interference at destination nodes [15]. This idea should lead to much energy consumption. From the energy perspective, we should focus on not only secure performance but also energy efficiency for such security solutions due to massive deployed devices with low power and limited energy [16]. We summarize three reasons to illustrate why energy efficiency must be concerned in the cooperative jamming design. Firstly, IoT devices are usually designed as small, wireless portable electronics, whose batteries need to be recharged frequently. Next, batteries may pose huge safety risks in some deployments. Finally, it is not environment-friendly to dump billions of waste batteries.

Because energy constraints of low-end IoT devices hinder the application of cooperative jamming, recent works introduced an energy harvesting technology [17] and power allocation strategies to increase energy efficiency. However, there remain significant issues to realize efficient cooperative jamming with energy constraints. For example, current energy harvesting technologies only transfer small amounts of dynamic and unpredictable power for a small wireless device. Thus, in this paper, we need to survey numerous studies of cooperative jamming strategies with energy constraints. Our contributions are as follows. (i)We formulate a general cooperative jamming model and present main metrics to measure security levels of signal transmission(ii)We systematically review cooperative jamming strategies for limited energy scenarios in terms of optimal power allocation and wireless-powered methods(iii)We raise a series of interesting open issues that need to be studied in depth to improve secure energy efficiency for physical layer security

The survey is organized as follows. Section 2 provides a general cooperative jamming model and the corresponding security performance metrics. Next, we present typical cooperative jamming schemes based on power allocation and energy harvesting to cope with energy constraints in a wireless transmission scenario in Section 3. We discuss a few interesting open research issues and the corresponding challenges in Section 4, and the conclusion of our survey will be given in Section 5.

2. Basics of Cooperative Jamming Schemes

In this section, we investigate a general cooperative jamming model and summarize typical secrecy metrics of cooperative jamming.

2.1. A General Cooperative Jamming Model

A typical wiretap model consists of a pair of transceivers (Alice and Bob) and an illegal passive eavesdropper (Eve) [18]. Eve intends to passively wiretap legitimate signals between transceivers. A traditional method is to broadcast encrypted signals to prevent Eve from wiretapping. However, the cryptographic method cannot satisfy security requirements of resource-constrained scenarios due to limited computational capabilities and insufficient energy. As a result, a physical layer-based solution provides additional protection via exploiting characteristic differences between a legitimate channel and a wiretapping channel.

A cooperative jamming scheme is a typical physical layer-based solution to broadcast artificial noise to block eavesdropping while not degrading the receiving performance of legitimate transceivers. The artificial noise is actively transmitted by the transceiver or a selected jammer, which is defined as self-cooperative jamming and non-self-cooperative jamming, shown in Figure 1. In essence, a transceiver in the self-cooperative jamming mode utilizes multiple antennas to transmit legitimate signals and artificial noise simultaneously while a friendly jammer in the non-self-cooperative jamming mode needs to optimize power allocation and design beamforming vectors to cover legitimate signals.

2.2. Security Metrics

Various metrics, i.e., bit error ratio of received signals, secrecy capacity, secrecy outage probability, and intercept probability, are considered to measure security performances of cooperative jamming schemes in different scenarios. We describe these metrics as follows.

2.2.1. Bit Error Ratio (BER)

It is defined as a ratio of the number of error bits to the number of total transmitted bits in a certain period. It is used in the scenario where it only focuses on the decode error probability at receivers. BER of a receiver is affected by the signal energy per bit, the spectral density of interference and noise, channel fading parameters, and modulation methods. The received BER of an eavesdropper under BPSK modulation, for example, can be represented as follows: where and represent the channel states from Alice and Jammer to Eve, respectively. is the spectral density of the Gaussian white noise, and denotes the time-averaged spectral density of jamming signals. is the complementary distribution function of the standard Gaussian and defined as .

2.2.2. Secrecy Capacity (SC)

It is firstly proposed in [12] and can be defined as the maximum achievable perfect secrecy rate [19], i.e., , where is the error probability of message and is a predefined error probability threshold for a given system. Here, is the original messages and represents the decoded messages at Bob. is the secrecy rate, and denotes the entropy of the confidential messages. The secrecy capacity of the general wiretap channel is given by the following expression [20]: where and are the mutual information of an auxiliary random variable, , and the received variable at Bob, , or the received variable at Eve, , when sending at Alice, respectively. For a given channel, finding the secrecy capacity is equivalent to finding the joint distribution of and , i.e., , which maximizes the difference in (2). As the result, the secrecy capacity for an average power constraint can be calculated as follows: where is the signal-to-interference-plus-noise ratio of , represents , and and , respectively, represent the channel capacities of the main and the wiretap channels. It is used when the state information of both legitimate channels and illegal channels is perfectly known. Note that Eve definitely intercept transmitted signals if the secrecy capacity is negative (i.e., the capacity of a legitimate channel falls below that of a wiretap channel). In this case, signal transmission from Alice to Bob should be insecure [21].

2.2.3. Secrecy Sum Rate (SSR)

It is used to characterize the sum of the secrecy rate for legitimate users when discussing the overall security requirements of a wireless system with several transmitters. It is a metric that optimizes the secrecy rate of the whole system rather than a specific legitimate channel:

2.2.4. Secrecy Outage Probability (SOP)

The SOP metric is a probability that the instantaneous security capacity is less than a nonnegative target secrecy rate . It is also named the outage probability of SC. Considering a fading channel with an eavesdropper, SOP is a mainstream metric to analyze secrecy performance [22]. The SOP metric is formulated as follows:

2.2.5. Connection Outage Probability (COP)

The COP is defined as the probability that the SINR of the legitimate channel falls below the transmission threshold , where represents the transmission minimum target rate [23]. It can be expressed as follows:

2.2.6. Intercept Probability (IP)

This metric is to describe the probability of an intercept event if the SC falls below zero [24]. Intuitively, it is related to the statistical characteristics of a legitimate channel and a wiretap channel when jamming signals are invalid:

2.2.7. Secrecy Energy Efficiency (SEE)

The concept of SEE, , is defined as a ratio of the secrecy rate to the total power consumption, i.e., the number of securely transmitted bits per unit energy [25]. It is an important metric for a scenario that considers both secure transmission and energy efficiency. We can find an optimal equilibrium between the secrecy rate and the total energy consumption when maximizing this metric: where is the total power consumption for the complete transmission.

2.2.8. Secrecy Gap (SG)

The secrecy gap is the SNR difference between a legitimate receiver and an eavesdropper. It can be calculated by a tight bound of the maximal secrecy rate [26]:

2.2.9. Worst-Case Secrecy Rate (WCSR)

It is defined as the minimum secrecy rate when there are eavesdroppers in an uncertain region [27], i.e.,

In addition, we use WCSR to optimize beamforming vectors, energy covariance at a transmitter, and AN covariance at a receiver, to minimize the legitimate channel capacity with power constraint [28], where represents the estimated signal fading coefficient affected by the optimized factors mentioned above and is the value range of .

2.2.10. Secrecy Throughput (ST)

This metric determines the average number of bits of confidential information received per unit time. We assume that the secrecy capacity is , and a ratio of the transmission duration to the total time-slot is ; then, the secrecy throughput is calculated as follows [29]:

2.2.11. Power Consumption (PC)

It is a power constraint to secure signal transmission. We can compare system performance when satisfying the same security requirements. Lower power consumption means higher energy efficiency.

3. Cooperative Jamming in Energy-Constraint Scenarios

The stored energy in devices is the key factor to achieve secure signal transmission, especially in an energy-constraint wireless system. Enough energy can ensure the simultaneous transmission of legitimate signals and artificial noise. There are two perspectives to design secure communication strategies with energy constraints, including optimal power allocation and the efficient wireless-powered method. The former focuses on the reasonable utility of limited energy in one period while the latter is aimed at harvesting much energy from wireless environments to support energy consumption.

3.1. Power Allocation-Based Cooperative Jamming Schemes

Power allocation is one of the mainstream solutions to the optimization problem of cooperative jamming-based physical layer security in an energy-constraint scenario. The transmit power and jamming power are the main factors to affect secrecy performance and transmission efficiency when sending legitimate signals to a wireless network. An unreasonable power allocation scheme may cause much decoding errors at a legitimate receiver or low secure transmission performance. Therefore, it is important to design a feasible power allocation scheme to ensure the effectiveness and security of signal transmission.

The existing works to design optimal power allocation are based on two assumptions. The first one is that the global channel state information (CSI) is perfectly available to all legitimate nodes, and the second one is that the CSI of eavesdroppers in the given networks is imperfect. According to these assumptions, the authors in [30] first proposed a scheme to determine antenna weights and optimize transmit power for a relay communication scenario with limited total system power. Then, the authors in [31] further studied a secure transmission strategy for a multiantenna amplify-and-forward (AF) wireless network with one eavesdropper. Their strategy exploited artificial noise sent by the receiver to superimpose legitimate signal broadcast to the relay in the first phase and perfectly removed the noise via the self-interference cancelation (SIC) technology at the receiver when in the forwarding phase. Their investigation on jamming power allocation strategy depended on either the known perfect CSI or the known statistical CSI. Similarly, the authors in [32] presented a half jamming power scheme to achieve secure transmission for a two-hop relaying network with four nodes. They provided the optimal percentage of jamming power to minimize SOP under different SNR scenarios.

Although a relay can forward legitimate signals and emit AN to degrade the receiving quality of Eve [4347], it still has potential secrecy threats for signal transmission. For one thing, numerous eavesdroppers may surround a relay to intercept forwarded signals. In this case, the authors in [48] exploited the relay as a pure cooperative jammer without signal forwarding. They optimized power allocation between information-bearing signals at the transmitter and the AN at the relay to cope with the decreasing SC caused by the correlation between eavesdropping channels and legitimate channels. For another, an untrusted relay may intercept and wiretap confidential signals when forwarding these signals. The work of [49] jointly optimized power allocation for all nodes in an untrusted two-way relay network to maximize SEE subject to power and SC constraints.

In Table 1, we summarize a list of feasible power allocation schemes to achieve cooperative jamming in energy-constraint scenarios. We notice that the known perfect CSI is essential to achieve secure communications through optimal power allocation.

3.2. Wireless-Powered Cooperative Jamming

Although power allocation strategies achieve the optimal secure transmission performance with energy constraints, it is difficult to further increase the SC or decrease SOP by using limited energy. Energy harvesting (EH) is a promising technology to recharge their batteries by converting solar, thermoelectric, or electromagnetic energy into electricity [50]. As this technology realizes the proactive energy replenishment of wireless devices, it has advantages to support further cooperative jamming and achieve a self-sustainable secure communication system [51].

Radio frequency-based energy harvesting (RF-EH) is a feasible method to help wireless devices acquire energy from ambient radio signals. A generalized RF-EH network consists of RF energy sources (e.g., Powercast or even TV Tower), nodes (end users like sensors), and an information gateway (e.g., relay and base stations). The RF energy sources, whose spectrum to carry electromagnetic signals is from  kHz to  GHz, are the common infrastructures in daily lives. It attracts much attention as a viable solution to extend the lifetime of energy-constrained wireless networks. Though the fact that RF waves are available almost anywhere, the density in the environment is low. For example, the power density of Wi-Fi is only . In addition, the efficiency of energy harvesting is inversely proportional to the signal propagation distance. As a result, it is much more efficient to exploit a dedicated source as well as multiple-antenna techniques to transfer energy [52, 53].

Simultaneous wireless information and power transfer (SWIPT) is an efficient technology to broadcast information and RF energy signals to communicate with information nodes and power energy receivers [54]. Different from traditional energy harvesting methods, SWIPT harvests dedicated RF energy rather than other environmental energy. Using alternative patterns of information transmission and energy transfer, it prolongs the lifetime for an energy-constrained system with hardware limitations. In particular, three modes are designed to implement SWIPT in a practical scenario, i.e., the time switching (TS) mode, the power splitting (PS) mode, and the antenna switching (AS) mode, which are intuitively compared in Figure 2. The first mode exploits an orthogonal time-slot to receive signals and energy alternately by periodical switching antennas between an EH receiver and an information decoder. The second one splits received signals into two individual streams with different power levels. Last, the AS mode assigns a part of antennas for decoding signals while using the rest of the antennas to harvesting energy.

The SWIPT technology is usually used in a relay node to extend transmission ranges and provide additional services, e.g., cooperative jamming-based secure transmission. The relay node with SWIPT ensures legitimate signal forwarding and AN transmission via continuous energy replenishment. In particular, the existing works on SWIPT-based secure transmission include scenarios of static relay communications and unmanned aerial vehicle- (UAV-) enabled dynamic relay communications.

For static relay communications, the authors of [66] analyzed the impact of the number of antennas of the source, relay, and destination nodes on the secure performance of cooperative jamming for different multiantenna models. Then, the authors in [67] proposed an accumulate-then-transmit communication protocol. They employed a multiantenna power beacon to establish a secure wireless link for energy-constrained sources. In [68], the authors studied an RF-EH power splitting technique for a multiuser multiple-input-single-output interference channel. They designed beamforming vectors and the power allocation strategy to minimize the total transmitted power subject to the quality of service requirements and energy constraints. Similarly, the authors in [69] employed power splitting to design a robust secure transmission scheme for a multiple-input-single-output channel to minimize the WCSR under transmit power constraints and additional worst-case EH constraints.

Yet, the above schemes are based on the half-duplex signal transmission that cannot receive and transmit signals simultaneously. To improve energy efficiency, some studies proposed full-duplex-based cooperative jamming methods because a jammer can broadcast AN and harvest energy simultaneously. A three-part energy-constrained SWIPT system with full-duplex self-jamming was proposed in [70]. They apply the TS SWIPT technology at the destination to extend battery lifetime. The source transmits the energy-bearing signals to the destination using maximal ratio transmission (MRT) to increase harvested energy in the EH phase. Based on their analysis, they derived the closed-form expressions of SOP and ST and then provided the optimal duration allocation and the maximum ST. Coincidentally, a wireless-powered full-duplex jammer in a four-node system is introduced in [71]. The authors employed the accumulate-and-jam protocol and discussed the impact of antenna allocation at the jammer on secure performance. They believed that increasing the number of antennas used for energy harvesting can enhance security when a source sends legitimate signals with low power.

For dynamic relay communications, relay nodes are deployed based on physical layer characteristics, such as channel state information (CSI), received signal strength (RSS), channel phase response, and channel impulse response (CIR). In [72], the authors considered a novel scenario that has no direct link between transceivers due to heavy shadow fading. They employed an energy-constrained UAV-enabled mobile relay to receive information and harvest energy simultaneously. The UAV exploits PS and TS protocols while the full-duplex destination can simultaneously receive forwarded signals from UAV and transmit AN signals to confuse eavesdroppers without perfect CSI. Their scheme can achieve a significant improvement in the max–min SC compared to the benchmark schemes.

Table 2 lists wireless-powered cooperative jamming schemes for energy-constrained systems.

4. Open Issues and Challenges

In this section, we first discuss a few interesting open research issues and novel technologies to improve energy efficiency and then present challenges to be solved.

4.1. Open Research Issues
4.1.1. The Optimal Friendly Jammer Selection

The optimal jammer selection leads to the best secure performance (the maximal SC or the minimal SOP) with the same energy consumption. The optimal jammer performs better than the other candidate jammers under energy constraints. Therefore, optimal jammer selection is an effective method to improve energy efficiency. In [73], the authors considered a wireless network with multiple sources and multiple relay nodes. Each relay node is equipped with a rechargeable battery. A novel minimum bottleneck matching algorithm and a suboptimal relay selection algorithm are proposed for the group lifetime maximization policy. For an EH-enabled secondary system in cooperative cognitive radio-based IoT, the authors of [74] presented a Vickrey auction-based relay selection strategy. This strategy can select an SU from several EH-enabled candidate SUs as a relay node while the unselected SUs keep harvesting energy. Moreover, works of [75, 76] demonstrate that joint power allocation and relay selection schemes can obtain better secrecy performance than the conventional jamming power allocation. Based on the existing studies, we note that it is a fundamental issue to select the optimal relay and jammer from a set of candidate nodes to extend the lifetime and improve the energy efficiency of a secure transmission system.

4.1.2. Intermittent Friendly Jamming

The optimal design of friendly jamming schemes is the core issue to achieve the best secure transmission performance and energy efficiency. Traditional continuous friendly jamming schemes can maximize SC or minimize SOP under the given energy constraints. However, these algorithms may waste energy to broadcast AN even though there is no legitimate signal transmission. Thus, some researchers studied intermittent jamming schemes to cope with issues of low SEE. Different from continuous jamming, an intermittent jammer transmits jamming signals on demand [77, 78]. Despite energy constraints, we can exploit intermittent jamming to ensure secure transmission and energy efficiency for it utilizes the idle duration of legitimate signal transmission to keep sleeping and harvest energy to improve SEE. The intermittent jammer can theoretically strike a tradeoff between the jamming effectiveness and energy savings by appropriately adjusting durations of transmission and sleeping and, finally, increase the lifetime of devices in an energy-constraint IoT system.

Take an intermittent jamming strategy proposed in [79] as an example. Different from traditional continuous jamming strategies, the intermittent jamming strategy proposed in this article is aimed at increasing the system security by shortening the jamming time but strengthening the jamming power. They compared the BER of intermittent jamming strategies and continuous jamming strategies and developed a new metric to jointly measure security requirements and energy cost, formulated an optimization problem with respect to the jamming duration proportion and jamming power, and examined the feasibility of intermittent jamming for different modulation methods. Accordingly, intermittent jamming is a feasible scheme to satisfy the requirements of secure performance and energy constraints. After solving the issues of when to jam and how to jam, it will surely become one of the practical cooperative jamming solutions.

4.1.3. Unknown CSI of an Eavesdropper

Almost all the existing cooperative jamming schemes are based on the assumptions of available perfect CSI or statistical CSI of all nodes in a wireless system. Yet, it is difficult to estimate the CSI of an eavesdropper perfectly especially when it is in the passive wiretapping mode. As a result, the performance with energy constraints in a practical scenario may be worse than its theoretical performance. Thus, the authors of [80] employed the space power synthesis technology to design a multijammer-based model to minimize synthetic jamming power at a legitimate receiver while satisfying predefined interference temperature in other locations. Although this scheme can securely transmit signals for an unknown CSI scenario within a fixed small area, multijammer-based cooperative jamming for a large-scale scenario may highly waste energy, which is difficult to achieve in an energy-limited system. As a result, future studies should consider how to design a cooperative jamming scheme for an unknown CSI scenario with energy constraints.

4.1.4. Cooperative Jamming for Intelligent Reflecting Surface

Intelligent reflecting surface (IRS) is a promising technology to engineer the radio signal propagation in wireless networks. IRS can dynamically alter a wireless channel to enhance communication performance via tuning massive reflecting elements. Different from the AF technology that uses energy to transmit signals, IRS only reflects signals by passive elements rather than generating new signals via a transmitter module. Thus, IRS adapts to an energy-constrained scenario well. In [81], the authors studied an IRS-assisted multiple-input-single-output system with cooperative jamming. They designed jamming beamforming matrices and the IRS phase-shift matrix to maximize energy efficiency. Considering the changeable CSI, the authors of [82] formulated a secure energy efficiency maximization problem subject to available power and the lowest rate constraints. Intuitively, IRS is envisioned to have abundant applications in future wireless networks. We need to consider issues such as how to integrate IRS into existing wireless systems, how to balance between signal transmission and energy consumption, and how many reflecting elements should be introduced.

4.1.5. Polar Code-Based Secure Transmission

The polar code has been regarded as a candidate technology for forward-error-correction (FEC) in the 5G air interfaces due to its excellent encoding/decoding capability and high reliability. Because using the polar code is able to improve the reliability of legitimate signals, a friendly jammer can consume less energy to ensure the transmission. Therefore, we can guarantee secure transmission by an energy-limited friendly jammer. For a discrete memoryless multiple-access wiretap channel, the authors in [83] proved that any feasible rate pair is achievable under strong secrecy with a low-complexity polar coding scheme. In essence, the reason for using polar codes to ensure physical layer security is that polarization creates a series of independent linear deterministic multiple access channels. These channels make it possible to design a resolvability-based code and thus achieve strong secure transmission. In [84], the authors minimized the number of cooperative helpers to fulfill a feasible SC requirement. They employed Tal-Sharov-Vardy implementation of polar codes to implement secure polar coding for a two-user Gaussian wiretap channel. Note that many modules and applications of a digital wireless communication system have the polarization effect that can improve ST and the received signal quality. Thus, it is one of the urgent issues to jointly optimize physical layer technologies with polar codes of future wireless communications to achieve optimal transmission performance.

4.2. Challenges of Future Works

Although the existing works on cooperative jamming with energy constraints have made progress, there are still many challenges unsolved.

Firstly, the study in [40] proved that a friendly jammer cannot contribute to the enhancement of system security in the presence of an important number of eavesdroppers. The reason is that cooperative jamming is to ensure that the average legitimate channel state is better than the wiretap channel state. Yet, multiple eavesdroppers may collude to achieve a better wiretap channel than a legitimate channel. As a result, the number, location, power, and social attributes [85] of selected jammers should be appropriately designed to protect from collusion eavesdropping.

Next, most current studies focus on static system models. Yet, a practical scenario with mobile nodes, such as intelligent industry or smart home, causes a dynamic wireless channel [86], which leads to inaccurate prediction or even difficult to predict. This indicates that the assumption of a perfect/statistical channel state is unrealistic. In addition, a mobile scenario results in wireless-powered nodes without sufficient energy supply [87]. The Doppler shift causes the mismatch between a cooperative node and a receiver, which impacts the performance of cooperative jamming cancelation [88]. Thus, one crux to use cooperative jamming in a practical application is how to design secure transmission for legitimate signals using various characteristics of changeable wireless transmission scenarios.

Finally, recent works merely design the management of harvested energy but ignore feasible scheme design to decide when to switch a relay as a transceiver or to keep idle. Besides, researches on SWIPT-based remote communications remain vacant. The battery power may be insufficient due to low harvesting efficiency caused by long distances.

5. Conclusion

In this article, we investigate cooperative jamming schemes for physical layer security for an IoT system with energy constraints. Our work starts with the necessity of physical layer security and introduces the basic knowledge and security metrics of cooperative jamming. Next, considering limited energy scenarios, we discuss the typical security optimization strategies from two aspects of power allocation and energy harvesting. In essence, the power allocation-based secure transmission focuses on the effective utilization of device energy while the energy harvesting is aimed at employing external energy to recharge. We believe that a feasible cooperative jamming scheme should exploit these two methods to jointly optimize so as to deal with the bottleneck of energy shortage in an IoT system. Finally, we propose related open issues as well as challenges to study cooperative jamming with novel technologies in the future for an IoT system with limited energy.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported in part by the Fundamental Research Funds for the Central Universities under Grant 2019JBZ001, in part by the Beijing Natural Science Foundation under Grant 4202054, and in part by the National Natural Science Foundation of China under Grant 61871023 and Grant 61931001.