This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Secure Status Updates under Eavesdropping: Age of Information-based Physical Layer Security Metrics

He Chen, Qian Wang, Parthajit Mohapatra, and Nikolaos Pappas The first two authors contributed equally to this work. The work of H. Chen is supported by the CUHK direct grant under the project code 4055126. H. Chen is with the Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong SAR, China (Email: [email protected]). Q. Wang is with the School of Electrical and Information Engineering, The University of Sydney, NSW 2006, Australia (Email: [email protected]). The work of Q. Wang is done when she is a visiting student at The Chinese University of Hong Kong. P. Mohapatra is with Department of Electrical Engineering, Indian Institute of Technology (IIT) Tirupati, Indian (Email: [email protected]). N. Pappas is with the Department of Science and Technology, Linköping University, SE-60174 Norrköping, Sweden (Email: [email protected]).
Abstract

This letter studies the problem of maintaining information freshness under passive eavesdropping attacks. The classical three-node wiretap channel model is considered, in which a source aims to send its latest status wirelessly to its intended destination, while protecting the message from being overheard by an eavesdropper. Considering that conventional channel capacity-based secrecy metrics are no longer adequate to measure the information timeliness in status update systems, we define two new age of information-based metrics to characterize the secrecy performance of the considered system. We further propose, analyze, and optimize a randomized stationary transmission policy implemented at the source for further enhancing the secrecy performance. Simulation results are provided to validate our analysis and optimization.

Index Terms:
Physical layer security, Age of Information (AoI), information freshness, secrecy age, secrecy age outage probability.

I Introduction

With the quick proliferation of the Internet of Things (IoT) technologies, more and more devices and equipment are connected to the Internet. This brings severe security and privacy concerns considering that a large share of devices will be served by wireless communication technologies [1, 2]. Conventionally, various cryptography techniques have been invented and applied at higher layers to protect the security of computer networks. However, these approaches normally involve intensive computation, which could be time- and energy-consuming for low-cost and low-complexity IoT devices. In this context, physical layer security techniques that leverage the properties of wireless physical channels, such as interference and fading, to further strengthen the security of wireless communication systems, have been regarded as appealing complements or even alternative solutions [3].

The research on physical layer security was pioneered by Wyner in his seminal work [4], where he proved that perfect secrecy can be realized when the channel from source to eavesdropper is a degraded version of that from source to destination. Since then, enormous efforts have been put to confound eavesdropping from either the perspective of information theory (see [5] and references therein) or signal processing (see [6] for a comprehensive literature survey). These studies were mainly built on the secrecy performance metrics like secrecy capacity and secrecy outage probability, that are defined based on the information-theoretic channel capacity concept.

On the other hand, most IoT applications involve remote monitoring, where sensors are deployed to monitor various physical processes, for example, the air pollution level and the health conditions of running machines in a factory. The sensed information is then reported to a remote entity like a cloudlet for further analysis. In these contexts, the information generally has higher value when it is fresher. This represents a strong motivation for a proper characterization of the information freshness. Recent results showed that conventional network metrics like throughput or delay are no longer appropriate for quantifying the information freshness. A new metric, termed age of information (AoI), has been coined in [7] for evaluating the information freshness, which have attracted increasing attentions very recently [8, 9, 10, 11, 12]. The AoI is defined as the time elapsed since the generation time of the last status update received at the destination. In this context, a natural and fundamental question that arises is “how to quantify the secrecy performance of status update systems from the perspective of physical layer?” To the best of our knowledge, this is still an open problem in the literature and this letter serves as the first attempt to answer it. It is worth mentioning here a handful of studies that investigated the problem of maintaining information freshness under active jamming attacks, see e.g., [13, 14], which is fundamentally different from the passive eavesdropping attacks considered in this letter.

In this letter, we consider a status update system consisting of a source, a destination, and an eavesdropper. The source aims to report its latest status to the destination under the risk of being wiretapped by the eavesdropper. From a system security perspective, the source pursues the information at the destination to be much fresher than that at the eavesdropper. To characterize the secrecy performance of such a status update system, we define two new secrecy metrics drawing on the AoI concept, namely secrecy age and secrecy age outage probability. We further propose, analyze, and optimize a randomized stationary transmission policy adopted at the source for enhancing the system secrecy performance. Simulation results are carried out to affirm our analysis and design.

II System Model and New Secrecy Metrics

Consider a status update system consisting of a source (SS), a destination (DD), and an eavesdropper (EE). Specifically, SS aims to report its latest status update to DD via an error-prone wireless channel, while the passive adversary EE attempts to eavesdrop the transmission of SS to grasp its latest status111Note that successful eavesdropping is the first step towards launching other active attacks like replay attacks.. We assume slotted time, time is divided into slots of equal duration, and the transmission of a status updates occupies one slot. The timeliness and freshness of status updates at the receivers including DD and EE is measured by the AoI metric.

The generate-at-will status generation model is considered. That is, a new status update is generated at SS at the beginning of each time slot. However, SS may choose to drop the newly generated status according to different transmission policies to be elaborated later in this section. In this letter, we investigate a challenging scenario, where SS has no knowledge of the channel conditions from itself to both DD and EE. Instead, it only knows the probabilities of its status update transmissions to be successfully received by DD and EE, denoted by pp and qq, respectively. Here, to make it general, we choose not to specify a particular channel fading model for characterizing the successful transmission probabilities. This is because once the channel fading model is given, we can link pp and qq with the average signal-to-noise ratios of the corresponding links.

We use ID(t)I_{D}(t) and IE(t)I_{E}(t) to denote the transmission success indicators of the SDS-D and SES-E, respectively. Specifically, IX(t)=1I_{X}(t)=1, X{D,E}X\in\{D,E\}, if the status update over the SXS-X link is successful during time slot tt, and IX(t)=0I_{X}(t)=0 otherwise. Denote by δD(t)\delta_{D}(t) and δE(t)\delta_{E}(t) the instantaneous ages at DD and EE in the tt-th time slot, respectively. The instantaneous ages of these two receiving nodes in the time slot t+1t+1 can then be expressed as

δX(t+1)={1,ifStransmits,andIX(t)=1,δX(t)+1,otherwise,\delta_{X}\left({t+1}\right)=\left\{\begin{matrix}\begin{split}&{1},\quad\text{if}~{}S~{}{\rm transmits},{~{}\rm and~{}}I_{X}\left(t\right)=1,\\ &{\delta_{X}\left({t}\right)+1},\quad\text{otherwise},\\ \end{split}\end{matrix}\right. (1)

where X{D,E}X\in\{D,E\}.

II-A New Secrecy Metrics

In this letter, we are interested in protecting the status update system against eavesdropping attacks from the perspective of physical layer, which corresponds to the extreme adversary case with no cryptography techniques implemented at higher layers. In this context, SS can only resort to the transmission policy to enhance the system secrecy performance. For conventional channel capacity-based physical layer security metrics, such as secrecy capacity and secrecy outage probability, have been defined and widely investigated for various network setups, see e.g., the comprehensive survey papers [5, 6] and references therein. More specifically, denote by CDC_{D} and CEC_{E} as the instantaneous channel capacity of the SDS-D and SES-E links, respectively. The secrecy capacity and secrecy outage probability can then be defined as Cs=[CDCE]+C_{s}=\left[C_{D}-C_{E}\right]^{+} and Pr(Cs<Rs)\Pr\left(C_{s}<R_{s}\right), respectively, with RsR_{s} representing the target secrecy rate. However, these conventional secrecy metrics are no longer applicable to status update systems as they are inadequate to quantify the information freshness.

As the first attempt to measure the secrecy performance of status update systems, we now define two new secrecy metrics. Intuitively, to enhance the secrecy of the system, we should make the instantaneous age at EE larger than that at DD as much as possible. That is, the information at EE is much staler than that at DD. Motivated by this intuition and inspired by the conventional channel capacity-based secrecy metrics, we devise two new secrecy metrics defined in the following:

Definition 1.

We define the instantaneous secrecy age δs\delta_{s} as

δs=[δEδD]+,\delta_{s}=[\delta_{E}-\delta_{D}]^{+}, (2)

where [.]+[.]^{+} indicates max{δEδD,0}\max\{\delta_{E}-\delta_{D},0\}.

Definition 2.

We then define the secrecy age outage probability as

𝒫out=Pr([δEδD]+ηth),\mathcal{P}_{\rm out}=\Pr\left([\delta_{E}-\delta_{D}]^{+}\leq\eta_{\rm th}\right), (3)

where ηth\eta_{\rm th} is the target information lag between EE and DD.

According to Definition 1-2, larger secrecy age and lower secrecy age outage probability are more desirable.

II-B Transmission Policy

We now describe the transmission policy proposed in this letter. Recall that we consider the challenging case where SS has no knowledge of the instantaneous channel state information of both SDS-D and SES-E links. Furthermore, there is no feedback from DD, and thus SS does not grasp the instantaneous age at DD either. For this case, we propose a randomized stationary policy to be implemented at SS. More specifically, SS transmits a newly generated status update at the beginning of each time slot with a fixed probability ptxp_{\rm tx}. When ptx=1p_{\rm tx}=1, SS always transmits a new status update in each time slot. Note that no retransmission is considered in our policy since we can generate a new status update in each time slot.

III Analysis and Optimization of the Randomized Stationary Policy

III-A Secrecy Performance Analysis

To evaluate the average secrecy performance of the randomized stationary policy, we apply a two-dimension MC to characterize the state transition of the considered system, in which the system state (m,n)\left(m,n\right) indicates that the current age at DD is mm and that at EE is nn. We can readily verify that the considered MC is irreducible and thus it admits a unique steady state distribution. Denote by 𝝅\boldsymbol{\pi} the steady state distribution of the considered system implementing the randomized stationary policy, with the entry πi,j\pi_{i,j} representing the steady probability of the state (i,j)\left(i,j\right).

We first notice that the system can transit from any state to the state (1,1)(1,1) when SS transmits and the transmission is successfully received by both the legitimate receiver DD and the eavesdropper EE. We thus have the following equation

j=1i=1πi,jptxpq=π1,1.\sum_{j=1}^{\infty}\sum_{i=1}^{\infty}\pi_{i,j}p_{\rm tx}pq=\pi_{1,1}. (4)

By noting the fact j=1i=1πi,j=1\sum_{j=1}^{\infty}\sum_{i=1}^{\infty}\pi_{i,j}=1, we then have π1,1=ptxpq\pi_{1,1}=p_{\rm tx}pq. Furthermore,

j=1i=1πi,jptxp=j=1π1,jj=1π1,j=ptxp.\sum_{j=1}^{\infty}\sum_{i=1}^{\infty}\pi_{i,j}p_{\rm tx}p=\sum_{j=1}^{\infty}\pi_{1,j}{\bf\Rightarrow}\sum_{j=1}^{\infty}\pi_{1,j}=p_{\rm tx}p. (5)
j=1i=1πi,jptxq=i=1πi,1i=1πi,1=ptxq.\sum_{j=1}^{\infty}\sum_{i=1}^{\infty}\pi_{i,j}p_{\rm tx}q=\sum_{i=1}^{\infty}\pi_{i,1}\Rightarrow\sum_{i=1}^{\infty}\pi_{i,1}=p_{\rm tx}q. (6)
πi+1,1=j=1πi,jptx(1p)q,\pi_{i+1,1}=\sum_{j=1}^{\infty}\pi_{i,j}p_{\rm tx}(1-p)q, (7)
π1,j+1=i=1πi,jptxp(1q).\pi_{1,j+1}=\sum_{i=1}^{\infty}\pi_{i,j}p_{\rm tx}p(1-q). (8)
πi+1,j+1=πi,j[ptx(1q)(1p)+1ptx].\pi_{i+1,j+1}=\pi_{i,j}\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]. (9)
j=1πi+1,j=j=1πi,j[ptx(1p)+1ptx]\sum_{j=1}^{\infty}\pi_{i+1,j}=\sum_{j=1}^{\infty}\pi_{i,j}\left[p_{\rm tx}(1-p)+1-p_{\rm tx}\right] (10)
i=1πi,j+1=i=1πi,j[ptx(1q)+1ptx]\sum_{i=1}^{\infty}\pi_{i,j+1}=\sum_{i=1}^{\infty}\pi_{i,j}\left[p_{\rm tx}(1-q)+1-p_{\rm tx}\right] (11)

Combining the equalities in (5) and (7), we have π2,1=ptxpptx(1p)q\pi_{2,1}=p_{\rm tx}pp_{\rm tx}(1-p)q. We then jointly consider the equalities in (5) and (10) and attain

j=1π2,j=ptxp[ptx(1q)+1ptx].\sum_{j=1}^{\infty}\pi_{2,j}=p_{\rm tx}p\left[p_{\rm tx}(1-q)+1-p_{\rm tx}\right]. (12)

Then, based on (12), (7) and (10), we can obtain the expressions of π3,1\pi_{3,1} and j=1π3,j\sum_{j=1}^{\infty}\pi_{3,j} given by

π3,1=ptx(1p)qptxp[ptx(1q)+1ptx],\pi_{3,1}=p_{\rm tx}(1-p)qp_{\rm tx}p\left[p_{\rm tx}(1-q)+1-p_{\rm tx}\right],
j=1π3,j=ptxp[ptx(1q)+1ptx]2.\sum_{j=1}^{\infty}\pi_{3,j}=p_{\rm tx}p\left[p_{\rm tx}(1-q)+1-p_{\rm tx}\right]^{2}.

By forward induction, we further have

πi,1=ptxpptx(1p)q(ptx(1p)+1ptx)i2,i2.\pi_{i,1}=p_{\rm tx}pp_{\rm tx}(1-p)q{\left(p_{\rm tx}(1-p)+1-p_{\rm tx}\right)}^{i-2},\;\forall i\geq 2.

Similarly, we obtain π1,2=ptxqptx(1q)p\pi_{1,2}=p_{\rm tx}qp_{\rm tx}(1-q)p, π1,j=ptxqptx(1q)p(ptx(1q)+1ptx)j2\pi_{1,j}=p_{\rm tx}qp_{\rm tx}(1-q)p{\left(p_{\rm tx}(1-q)+1-p_{\rm tx}\right)}^{j-2}, j2\forall j\geq 2, and

πi,j=\displaystyle\pi_{i,j}= πij+1,1[ptx(1q)(1p)+1ptx]j1\displaystyle\pi_{i-j+1,1}{\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]}^{j-1} (13)
=\displaystyle= ptxpptx(1p)q(ptx(1p)+1ptx)ij1×\displaystyle p_{\rm tx}pp_{\rm tx}(1-p)q{\left(p_{\rm tx}(1-p)+1-p_{\rm tx}\right)}^{i-j-1}\times
[ptx(1q)(1p)+1ptx]j1,if i>j,\displaystyle{\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]}^{j-1},\text{if }i>j,
πi,j=\displaystyle\pi_{i,j}= π1,ji+1[ptx(1q)(1p)+1ptx]i1\displaystyle\pi_{1,j-i+1}{\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]}^{i-1} (14)
=\displaystyle= ptxqptx(1q)p(ptx(1q)+1ptx)ji1×\displaystyle p_{\rm tx}qp_{\rm tx}(1-q)p{\left(p_{\rm tx}(1-q)+1-p_{\rm tx}\right)}^{j-i-1}\times
[ptx(1q)(1p)+1ptx]i1,if j>i,\displaystyle{\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]}^{i-1},\text{if }j>i,
πi,i\displaystyle\pi_{i,i} =π1,1[ptx(1q)(1p)+1ptx]i1\displaystyle=\pi_{1,1}{\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]}^{i-1} (15)
=ptxqp[ptx(1q)(1p)+1ptx]i1,if i1.\displaystyle=p_{\rm tx}qp{\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]}^{i-1},\text{if }i\geq 1.

We now can derive closed-form expressions for the average secrecy age and the secrecy age outage probability as follows

𝔼[δs]=𝔼[[δEδD]+]=i=1j=i+1πi,j(ji)\displaystyle\mathbb{E}\left[\delta_{s}\right]=\mathbb{E}\left[[\delta_{E}-\delta_{D}]^{+}\right]=\sum_{i=1}^{\infty}\sum_{j=i+1}^{\infty}\pi_{i,j}(j-i) (16)
=\displaystyle= i=1[ptx(1q)(1p)+1ptx]i1×\displaystyle\sum_{i=1}^{\infty}{\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]}^{i-1}\times
j=i+1π1,2(ptx(1q)+1ptx)ji2(ji)\displaystyle\sum_{j=i+1}^{\infty}\pi_{1,2}{\left(p_{\rm tx}(1-q)+1-p_{\rm tx}\right)}^{j-i-2}(j-i)
=(a)\displaystyle\overset{(a)}{=} 1ptx(p+qpq)ptxqptx(1q)p(ptxq)2=p(1q)ptxq(p+qpq).\displaystyle\frac{1}{p_{\rm tx}(p+q-pq)}\frac{p_{\rm tx}qp_{\rm tx}(1-q)p}{{(p_{\rm tx}q)}^{2}}=\frac{p(1-q)}{p_{\rm tx}q(p+q-pq)}.
𝒫out=Pr([δEδD]+ηth)\displaystyle\mathcal{P}_{\rm out}=\Pr\left([\delta_{E}-\delta_{D}]^{+}\leq\eta_{\rm{th}}\right) (17)
=\displaystyle= 1P([δEδD]+>ηth)=1i=1j=i+1+ηthπi,j\displaystyle 1-P\left([\delta_{E}-\delta_{D}]^{+}>\eta_{\rm{th}}\right)=1-\sum_{i=1}^{\infty}\sum_{j=i+1+\eta_{\rm{th}}}^{\infty}\pi_{i,j}
=\displaystyle= 1i=1[ptx(1q)(1p)+1ptx]i1×\displaystyle 1-\sum_{i=1}^{\infty}{\left[p_{\rm tx}(1-q)(1-p)+1-p_{\rm tx}\right]}^{i-1}\times
j=i+1+ηthπ1,2(ptx(1q)+1ptx)ji2\displaystyle\sum_{j=i+1+\eta_{\rm{th}}}^{\infty}\pi_{1,2}{\left(p_{\rm tx}(1-q)+1-p_{\rm tx}\right)}^{j-i-2}
=(b)\displaystyle\overset{(b)}{=} 1(1q)p(1ptxq)ηth1p+qpq,\displaystyle 1-\frac{(1-q)p{\left(1-p_{\rm tx}q\right)}^{\eta_{\rm{th}}-1}}{p+q-pq},

where the equalities (a) and (b) follow by adopting the infinite sum equation given by [15, Eq. 0.231].

Remark 1.

Based on the attained closed-from expressions given in (16) and (17), we can readily verify that the average secrecy age 𝔼[δs]\mathbb{E}\left[\delta_{s}\right] and the secrecy age outage probability 𝒫out\mathcal{P}_{\rm out} are decreasing and increasing functions of the transmission probability ptx{p_{{\rm{tx}}}}, respectively. We can also see from (17) that when q0q\rightarrow 0, 𝒫out0\mathcal{P}_{\rm out}\rightarrow 0.

III-B Optimization of the Transmission Probability

We now formulate a problem to optimize the transmission probability ptx{p_{{\rm{tx}}}} at SS. Intuitively, the age at DD is statistically smaller if SS transmits more frequently with a larger ptx{p_{{\rm{tx}}}}, which, on the other hand, will cause a higher secrecy age outage probability (See Remark 1). Motivated by this intuition, we formulate the following optimization problem

𝐏𝐫𝐨𝐛𝐥𝐞𝐦𝟏:maxptx(0,1]ptx[1𝒫out(ptx)].{\rm\bf{Problem~{}1}}:\;\mathop{\max}\limits_{{p_{{\rm{tx}}}}\in(0,1]}{p_{{\rm{tx}}}}\left[{1-{{\cal P}_{{\rm{out}}}\left(p_{{\rm{tx}}}\right)}}\right]. (18)

To resolve the above optimization problem, we calculate the first-order derivative of the objective function with respect to ptx{p_{{\rm{tx}}}} and set it equal to zero. After some mathematical manipulations, we can obtain that the optimal ptx{p_{{\rm{tx}}}} is given by

ptx=min{1/(qηth),1}.{p^{*}_{{\rm{tx}}}}=\min\left\{{1}/({q{\eta_{\rm{th}}}}),1\right\}. (19)

We note that the optimal transmission probability does not depend on pp.

IV Simulations and Discussions

We now present simulation results to validate the theoretical analysis conducted above and illustrate the impacts of various parameters on the system secrecy performance.

We plot the curves of the average secrecy age versus the ratio p/qp/q for different combinations of qq and ptxp_{\rm{tx}} in Fig. 1. We can see from the figure that the simulation results match well with their analytical counterparts, which verifies the correctness of our theoretical analysis in Section III. Moreover, for fixed qq and ptxp_{\rm{tx}}, the average secrecy age increases as pp increases. This is expected since a larger pp means a higher successful transmission probability over the SDS-D link. On the other hand, when pp and ptxp_{\rm{tx}} are given, the larger the value of qq, the smaller the average secrecy age. This is because EE can eavesdrop the status updates from SS with a higher success probability. We can also observe from Fig. 1 that the average secrecy age decreases as the transmission probability ptxp_{\rm{tx}} increases, which coincides with our analysis in Remark 1.

Refer to caption
Figure 1: The average secrecy age versus the the ratio p/qp/q for different values of qq and ptxp_{\rm{tx}}.
Refer to caption
Figure 2: The curves of the term ptx[1𝒫out(ptx)]{p_{{\rm{tx}}}}\left[{1-{{\cal P}_{{\rm{out}}}\left(p_{{\rm{tx}}}\right)}}\right], versus the transmission probability ptx{p_{{\rm{tx}}}} with varying secrecy age outage threshold ηth\eta_{\rm th} and qq, where p=0.8p=0.8 and the values of ptx[1𝒫out(ptx)]{p^{*}_{{\rm{tx}}}}\left[{1-{{\cal P}_{{\rm{out}}}\left(p^{*}_{{\rm{tx}}}\right)}}\right] corresponding to the optimal solution given in (19) are labelled by *.

We depict in Fig. 2 the curves of the objective function in Problem 1, ptx[1𝒫out(ptx)]{p_{{\rm{tx}}}}\left[{1-{{\cal P}_{{\rm{out}}}\left(p_{{\rm{tx}}}\right)}}\right], versus the transmission probability ptx{p_{{\rm{tx}}}} with varying secrecy age outage threshold ηth\eta_{\rm th} and qq. As we can see from the figure, the simulation and analytical results once again coincide. In addition, there is an optimal ptx{p_{{\rm{tx}}}} in all simulated cases. Furthermore, the optimal values corresponding to the closed-form solution to Problem 1 appear at the peaks of the curves, which validates the attained solution. We also can observe from Fig. 2 that the optimal value of ptx{p_{{\rm{tx}}}} shifts to the left as either ηth\eta_{\rm th} or qq increases, which again affirms the expression of the optimal ptx{p_{{\rm{tx}}}} given by ptx=min{1/(qηth),1}{p^{*}_{{\rm{tx}}}}=\min\left\{{1}/({q{\eta_{\rm{th}}}}),1\right\}.

V Conclusions

This letter studied the problem of maintaining information freshness of status update systems under eavesdropping attacks. To that end, we studied the classical three-node wiretap channel. Considering that the conventional channel capacity-based secrecy metrics are no longer adequate to characterize the secrecy performance of status update systems, we proposed two new age of information-based secrecy metrics, termed secrecy age and secrecy age outage probability. We also derived the closed-form expressions of the average secrecy age and the secrecy age outage probability for the considered three-node system by applying a two-dimensional Markov chain to model the dynamic age evolutions at both the destination and the eavesdropper. We further designed and optimized a randomized stationary policy implemented at the source for enhancing the system secrecy performance. Simulation results were finally provided to validate and substantiate our design and analysis.

References

  • [1] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in internet of things: The road ahead,” Computer networks, vol. 76, pp. 146–164, 2015.
  • [2] Ericsson, “Cellular networks for massive IoT,” Tech. Rep., Jan 2016.
  • [3] A. Mukherjee, “Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints,” Proc. of IEEE, vol. 103, no. 10, pp. 1747–1761, Oct 2015.
  • [4] A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.
  • [5] M. Bloch and J. Barros, Physical-layer security: from information theory to security engineering.   Cambridge University Press, 2011.
  • [6] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Commun. Surv., vol. 16, no. 3, pp. 1550–1573, 2014.
  • [7] S. Kaul, M. Gruteser, V. Rai, and J. Kenney, “Minimizing age of information in vehicular networks,” in 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2011, pp. 350–358.
  • [8] A. Kosta, N. Pappas, and V. Angelakis, “Age of information: A new concept, metric, and tool,” Foundations and Trends® in Networking, vol. 12, no. 3, pp. 162–259, 2017.
  • [9] Y. Sun, I. Kadota, R. Talak, and E. Modiano, “Age of information: A new metric for information freshness,” Synthesis Lectures on Communication Networks, vol. 12, no. 2, pp. 1–224, 2019.
  • [10] Y. Gu, H. Chen, Y. Zhou, Y. Li, and B. Vucetic, “Timely status update in internet of things monitoring systems: An age-energy tradeoff,” IEEE Internet of Things J., vol. 6, no. 3, pp. 5324–5335, June 2019.
  • [11] M. A. Abd-Elmagid, N. Pappas, and H. S. Dhillon, “On the role of age of information in the internet of things,” IEEE Commun. Mag., vol. 57, no. 12, pp. 72–77, December 2019.
  • [12] H. Chen, Y. Gu, and S.-C. Liew, “Age-of-information dependent random access for massive IoT networks,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).   IEEE, 2020.
  • [13] Y. Xiao and Y. Sun, “A dynamic jamming game for real-time status updates,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).   IEEE, 2018.
  • [14] A. Garnaev, W. Zhang, J. Zhong, and R. D. Yates, “Maintaining information freshness under jamming,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).   IEEE, 2019.
  • [15] I. S. Gradshteyn and I. M. Ryzhik, Table of integrals, series, and products.   Academic press, 2014.