{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:32:26Z","timestamp":1760149946620,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Doctoral Research Start-up Funding of Nanyang Normal University","award":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"],"award-info":[{"award-number":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"]}]},{"name":"Cultivating Fund Project for the National Natural Science Foundation of China of Nanyang Normal University","award":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"],"award-info":[{"award-number":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"]}]},{"name":"Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education","award":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"],"award-info":[{"award-number":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"]}]},{"name":"Key Scientific Research Projects of Colleges and Universities in Henan Province of China","award":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"],"award-info":[{"award-number":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"]}]},{"name":"Key Scientific and Technological Research Projects in Henan Province","award":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"],"award-info":[{"award-number":["2022ZX017","2022PY024","JZNY202107","21A520033","23A520038","23A510001","222102320369","232102210121","232102220101"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB) scheme, null-space artificial noise (NAN) scheme, and transmit antenna selection (TAS) scheme. Assuming Rayleigh fading, we derive new closed-form approximations for the secrecy throughput with finite blocklength coding. To gain further insights, we also analyze the asymptotic performance of the secrecy throughput in the case of infinite blocklength. Furthermore, we investigate the optimization problem in terms of maximizing the secrecy throughput with the latency and reliability constraints to determine the optimal blocklength. Simulation results validate the accuracy of the approximations and evaluate the impact of key parameters such as the jamming power and the number of antennas at the jammer on the secrecy throughput.<\/jats:p>","DOI":"10.3390\/fi15100320","type":"journal-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T08:55:01Z","timestamp":1695718501000},"page":"320","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7169-9563","authenticated-orcid":false,"given":"Dechuan","family":"Chen","sequence":"first","affiliation":[{"name":"College of Physics and Electronic Engineering, Nanyang Normal University, Nanyang 473061, China"},{"name":"Key Lab of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Henan Engineering Research Center for Radio Frequency Front End and Antenna of Millimeter Wave Wireless Communication System, Nanyang 473061, China"}]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"College of Physics and Electronic Engineering, Nanyang Normal University, Nanyang 473061, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0536-6901","authenticated-orcid":false,"given":"Jianwei","family":"Hu","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Complex Systems Simulation, Beijing 100101, China"}]},{"given":"Xingang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanyang Normal University, Nanyang 473061, China"}]},{"given":"Shuai","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Physics and Electronic Engineering, Nanyang Normal University, Nanyang 473061, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/IOTM.2019.1900014","article-title":"IoT as a service for smart cities and nations","volume":"2","author":"Brincat","year":"2019","journal-title":"IEEE Internet Things Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MWC.01.1900529","article-title":"NOMA-assisted secure short-packet communications in IoT","volume":"27","author":"Xiang","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MCOMSTD.2017.1700031","article-title":"Applying device-to-device communication to enhance IoT services","volume":"1","author":"Lianghai","year":"2017","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/IOTM.001.2100178","article-title":"Survey of Secure Communications of Internet of Things with Artificial Intelligence","volume":"5","author":"Ji","year":"2022","journal-title":"IEEE Internet Things Mag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MCOMSTD.121.2100028","article-title":"Secure short-packet communications at the physical layer for 5G and beyond","volume":"5","author":"Feng","year":"2021","journal-title":"IEEE Commun. Stand. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1580","DOI":"10.1109\/TSP.2017.2784412","article-title":"Secure transmission design with feedback compression for the Internet of Things","volume":"66","author":"Hu","year":"2018","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"14672","DOI":"10.1109\/JIOT.2021.3071591","article-title":"On the secure spectral efficiency of URLLC with randomly located colluding eavesdroppers","volume":"8","author":"Farhat","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1913","DOI":"10.1109\/TWC.2021.3108042","article-title":"Reliable and secure short-packet communications","volume":"21","author":"Feng","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1747","DOI":"10.1109\/JPROC.2015.2466548","article-title":"Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints","volume":"103","author":"Mukherjee","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TWC.2021.3094615","article-title":"Secure transmission rate of short packets with queueing delay requirement","volume":"21","author":"Li","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"11921","DOI":"10.1109\/TVT.2022.3194054","article-title":"Optimizing training and transmission overheads for secure URLLC against randomly distributed eavesdroppers","volume":"71","author":"Xie","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Xu, D., Zhao, H., and Zhu, H. (2023). Resource allocation for secure short packet communications in wireless powered IoT networks. IEEE Trans. Veh. Technol., early access.","DOI":"10.1109\/TVT.2023.3259427"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/JSAC.2018.2825483","article-title":"Secure downlink transmission in the Internet of Things: How many antennas are needed?","volume":"36","author":"Hu","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/JIOT.2017.2778185","article-title":"Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things","volume":"5","author":"Hu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"10915","DOI":"10.1109\/JIOT.2019.2943377","article-title":"Secure transmission for SWIPT IoT systems with full-duplex IoT devices","volume":"6","author":"Xu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/TIFS.2020.3005336","article-title":"Enhanced secrecy performance of multihop IoT networks with cooperative hybrid-duplex jamming","volume":"16","author":"Abdullah","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MCOM.2017.1600435CM","article-title":"Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture","volume":"55","author":"Schulz","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"195","DOI":"10.23919\/JCC.fa.2022-0490.202304","article-title":"Covert communication with a spectrum sharing relay in the finite blocklength regime","volume":"20","author":"Ma","year":"2023","journal-title":"China Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.1109\/TIT.2019.2904500","article-title":"Wiretap channels: Nonasymptotic fundamental limits","volume":"65","author":"Yang","year":"2019","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2565","DOI":"10.1109\/TWC.2019.2904968","article-title":"Secure short-packet communications for mission-critical IoT applications","volume":"18","author":"Wang","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"6778","DOI":"10.1109\/TCOMM.2022.3198111","article-title":"Performance analysis of short packet communications with multiple eavesdroppers","volume":"70","author":"Ar","year":"2022","journal-title":"IEEE Trans. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1109\/LWC.2021.3066321","article-title":"Secrecy throughput in full-duplex multiuser MIMO short-packet communications","volume":"10","author":"Wei","year":"2021","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"37","DOI":"10.23919\/JCC.2021.12.002","article-title":"Relay-assisted secure short-packet transmission in cognitive IoT with spectrum sensing","volume":"18","author":"Chen","year":"2021","journal-title":"China Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3405","DOI":"10.1109\/TWC.2020.2973083","article-title":"Physical layer security in the finite blocklength regime over fading channels","volume":"19","author":"Zheng","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"5793","DOI":"10.1109\/TCOMM.2020.2999628","article-title":"Resource allocation for secure URLLC in mission-critical IoT scenarios","volume":"68","author":"Ren","year":"2020","journal-title":"IEEE Trans. Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"11157","DOI":"10.1109\/JIOT.2020.2995609","article-title":"Secure transmission in a NOMA-assisted IoT network with diversified communication requirements","volume":"7","author":"Xiang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2948","DOI":"10.1109\/TWC.2020.3045736","article-title":"Average secure BLER analysis of NOMA downlink short-packet communication systems in flat Rayleigh fading channels","volume":"20","author":"Lai","year":"2021","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1109\/TVT.2021.3133907","article-title":"Energy-efficient secure short-packet transmission in NOMA-assisted mMTC networks with relaying","volume":"71","author":"Lv","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"217","DOI":"10.23919\/JCC.fa.2021-0300.202305","article-title":"Multi-antenna Jammer assisted covert communications in data collected IoT with NOMA","volume":"20","author":"Tao","year":"2023","journal-title":"China Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3785","DOI":"10.1109\/LCOMM.2021.3114231","article-title":"Achieving covert communication in uplink NOMA systems via energy harvesting jammer","volume":"25","author":"Tao","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref_31","unstructured":"Basilevsky, A. (1983). Applied Matrix Algebra in the Statistical Sciences, North-Holland."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"11394","DOI":"10.1109\/TVT.2017.2725643","article-title":"Secrecy enhancement of multiuser MISO networks using OSTBC and artificial noise","volume":"66","author":"Yang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2980","DOI":"10.1109\/TVT.2020.2966538","article-title":"Covert communications in D2D underlaying cellular networks with antenna array assisted artificial noise transmission","volume":"69","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TCOMM.2020.3025578","article-title":"Packet Error Probability and Effective Throughput for Ultra-Reliable and Low-Latency UAV Communications","volume":"69","author":"Wang","year":"2021","journal-title":"IEEE Trans. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"5304","DOI":"10.1109\/TCOMM.2016.2612220","article-title":"Wireless energy and information transmission using feedback: Infinite and finite block-length analysis","volume":"64","author":"Makki","year":"2016","journal-title":"IEEE Trans. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"6182","DOI":"10.1109\/TVT.2019.2912391","article-title":"Cooperative NOMA short-packet communications in flat Rayleigh fading channels","volume":"68","author":"Lai","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_37","first-page":"4059","article-title":"Secure multiantenna cognitive wiretap networks","volume":"66","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_38","unstructured":"Abramowitz, M., and Stegun, I.A. (1972). Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables."},{"key":"ref_39","unstructured":"Gradshteyn, I.S., Ryzhik, I.M., Jeffrey, A., Zwillinger, D., and Technica, S. (2007). Table of Integrals, Series, and Products, Academic. [7th ed.]."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/10\/320\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:58:30Z","timestamp":1760129910000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/15\/10\/320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":39,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["fi15100320"],"URL":"https:\/\/doi.org\/10.3390\/fi15100320","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2023,9,26]]}}}