 Research
 Open Access
 Published:
Novel channelhopping patternbased wireless IoT networks in smart cities for reducing multiaccess interference and jamming attacks
EURASIP Journal on Wireless Communications and Networking volume 2021, Article number: 152 (2021)
Abstract
In smart cities, the InternetofThing (IoT) provides an enabling communication infrastructure to support tremendous amount of data exchange. Most IoT applications, e.g., wireless local area network, Bluetooth and so forth, utilize the channelhopping scheme to suppress the transmission security threats. In this paper, to reduce the mutual interference and external jamming attacks, multiple novel channelhopping patterns, i.e., traditional nohitzone (NHZ) hopping pattern and generalized NHZ hopping pattern, are introduced to suit to IoT networks. Particularly the design of probabilistic hopping pattern is first proposed, which has the various usage probabilities with regard to various channels. The properties of these hopping patterns are investigated by the steptostep examples. Then, the errorrate performance of the multinode IoT systems adopting these hopping patterns in the presence of jamming attacks is comprehensively analyzed. The extensive simulations show that the traditional/generalized NHZ hopping patterns are in favor of combating the mutual interference but with the limited capability of reducing jamming attacks, while the probabilistic hopping pattern possesses the opposite feature, that is, it has the predominant merit in suppressing jamming attacks. Thus, the novel channelhopping patternbased IoT could provide the secure transmission for communication applications in smart cities. Note that, as the physicallayer security technique, the channelhopping patterns investigated in this paper are convenient to integrate with the security policies implemented in upper layers (e.g., encryption, authentication and so forth).
1 Introduction
The smart cities contain lots of applications and sensors nodes, such as smart home appliances, smart grid applications, weather and temperature sensors, smart buildings and so forth [1, 2]. Wireless InternetofThings (IoT) networks provide the ubiquitous infrastructure for connecting these massive sensor nodes [3]. The IoT networks are characterized by the open architecture allowing the legitimate nodes to conveniently access to each other; however, this architecture causes the severe cybersecurity issues emitted by the vicious nodes, e.g., denialofservice attacks, eavesdropping, privacy and jamming attacks. The previous solutions to the cyber security mainly focused on encryption and authentication in the upper layers [4,5,6,7,8,9,10], but they are ineffective to the denialofservice attacks (e.g., jamming and interference). Besides, most of wireless IoT applications, such as WiFi, Zigbee, RFID, Bluetooth and forth, operate simultaneously in the unlicensed industrial–scientific–medical (ISM) band [3, 11,12,13]. The legitimate nodes (users) in these applications communicate to the corresponding destinations by sharing the limited spectrum, which lead to the mutual interference when the nodes occupy the same channel. Thus in the physical and media access layers, the mutual interference and the hostile jamming attack are the main impacts on the performance of wireless IoT, which have attracted lots of attentions in industry and academics [14,15,16,17,18,19]. The physicallayer security techniques offer distinct advantages compared to cryptography and authentication, because these techniques have high scalability but are independent on computational complexity.
To deal with the aforementioned issues, the channelhopping scheme is one of the most efficient solutions in the multinode (i.e., multiple legitimate users) IoT networks in the presence of jamming attacks [20,21,22,23,24,25,26]. Since the jammer emits the threat of malicious signal by randomly scanning the channels, the legitimate nodes can avoid such a threat by quickly changing the active channels. Also, for the multiple legitimate users, minimizing amount of mutual channel hits of the employed channelhopping pattern can efficiently suppress the mutual interference. The channelhopping scheme can be implemented, respectively, by the frequencyhopping (FH) or the timehopping (TH) techniques in the spectral domain or time domain. It is noted that the properties of channelhopping pattern determine the capacity of antiinterference and antijamming. These critical properties include Hamming correlations and uniformity [27]. The Hamming correlations describe the number of the channel hits, which imply the level of mutual and selfinterferences. The uniformity denotes how random the hopping rule of channels is, which is related to the capacity of antijamming attacks and antieavesdropping threats. Thus, the design of channelhopping pattern with favorable Hamming correlations and uniformity is the critical challenge in multinode IoT communications.
Up to now, the design of channelhopping patterns including FH/TH patterns (sequences) has been one of hot research topics in the region of information theory [28,29,30,31]. To achieve the optimal design of multinode FH/TH access systems, the optimal tradeoffs with regard to the hopping pattern parameters (e.g., the size of available channels q, the length of hopping pattern L, the number of hopping patterns K, the Hamming correlations of hopping pattern \(H_{c,a}\) , etc.) have been established, such as Lempel–Greenberger bound [32], Peng–Fan bound [33] and Ye–Fan bound [34]. Most optimal channelhopping patterns [28,29,30, 33] have been designed to meet the aforementioned bounds. For example, a series of design algorithms for traditional pseudorandom hopping patterns has been developed using various algebraic or combinational tools to hold Peng–Fan bound (see [28,29,30]). The channel hits of these hopping patterns always follow the (almost) uniform distribution, which may cause a few amount of multipleaccess interference (MAI) and consequently the performance degradation in multiaccess systems. Recently, a novel hopping pattern, called nohitzone hopping pattern (NHZ), was proposed, which owns the orthogonality for small access delays around the origin [34,35,36]. In [37], a generalized NHZ hopping pattern which enjoys orthogonality for small access delays as well as least channel hits otherwise. The traditional/generalized NHZ hopping patterns have the superior capability of mitigating the mutual interference, compared to the other pseudorandom hopping patterns.
Since some of transmitting channels may be attacked by the hostile jammers, the system performance could be degraded if the signals are transmitted on these impaired channels. All existing pseudorandom hopping patterns tread all channels having the same condition (i.e., following the uniformity), without considering the probability of jamming attack on these channels [28,29,30, 33,34,35,36,37]. In this paper, we propose a socalled probabilistic hopping pattern, where the usage probabilities of the channels are changed with the different channel qualities. That is, the channels with the lower probability of jamming attack are utilized with the high probability and vice versa. Under the constraint of the usage probabilities of the channels, minimizing the Hamming correlations of such a hopping pattern is another target of pattern design. This is the first contribution in this paper.
The second objective of this paper is to evaluate the error probability performance of a multinode IoT system employing these hopping patterns in the presence of jamming attacks. For analysis convenience, the multinode IoT system is modeled as FH multiaccess system with the frequencyshift keying modulation (i.e., FSK/FHMA system) in this paper. We derive the analytic expressions of decision variable of the multinode IoT system under a slow Rayleigh fading channel. The biterrorrate (BER) performance of these investigated hopping patterns imposed in multinode IoT systems is evaluated by simulations.
2 Methodology of analysis and experiment
The methodology and the organization of this paper are presented as follows. The definitions of traditional/generalized NHZ hopping patterns are recalled. The traditional/generalized NHZ hopping patterns, which have become the promising pseudorandom hopping patterns recently, are treated as the benchmark in this paper. Then, a novel channelhopping pattern called probabilistic hopping pattern is constructed by using algebraic transformations and replacing algorithm based on prime hopping pattern. Subsequently, by setting the specific parameters, some examples of traditional/generalized NHZ hopping patterns and probabilistic hopping pattern are presented to verify their properties. The properties among these hopping patterns are clearly compared. Subsequently from the viewpoint of system performance, the signal analysis of the multinode IoT system employing with the aforementioned channelhopping patterns is conducted in the presence of jamming attacks. The signal processing is strictly conducted via the stochastic process methods. Based on the signal analysis, the BERs of multinode IoT systems are investigated by Monte Carlo simulations. Finally, we draw some conclusions.
3 Pseudorandom channelhopping patterns
In this section, we will introduce the definitions of several pseudorandom channelhopping patterns (sequences), which have the various properties with each other. These channelhopping patterns include traditional NHZ hopping pattern and generalized NHZ hopping pattern. Before presenting the definitions, some notations with regard to the hopping pattern are explained as follows,

q: the number of the available channels;

L: the length of the hopping pattern;

K: the number of sequences in the channel pattern;

\({{\mathbb {S}}}\): the channelhopping pattern accommodating K legitimate users, which is denoted as \({\mathbb {S}}=\{{\mathbf {S}}^{(k)},k=1,2,\ldots ,K\}\).

\({\mathbf {S}}^{(k)}\): the channelhopping sequence for the kth legitimate user.
3.1 Hamming correlation of the channelhopping pattern
Hamming correlation is one of the most critical property of FH pattern, i.e., the number of channel hits, will be presented as follows.
Definition 1
Given two channelhopping sequence of length L,
where \({\mathbf {S}}^{(i,j)}\) are selected from the channelhopping pattern \({\mathbb {S}}\). The Hamming crosscorrelation \(H_c(\cdot )\) and Hamming autocorrelation \(H_a(\cdot )\) at the delay \(\tau\) are defined as, respectively
where \(h[x,y]=1\) for \(x=y\) representing the channel slot x colliding with another one y, whilst \(h[x,y]=0\) for \(x\ne y\) representing the hitfree. The subscript addition \((\cdot )_{i+\tau }\) is performed modulo L.
The Hamming correlations are the important properties in IoT systems based on channelhopping scheme, which determine the mutual and selfchannel hits, as well as the capacity of combating multipath fading and so forth.
3.2 Traditional NHZ hopping pattern
Definition 2
Given a channelhopping pattern \({\mathbb {S}}=\{{\mathbf {S}}^{(k)},k=1,2,\ldots ,K\}\) with K sequences, where \({\mathbf {S}}^{(k)}=\{s^{(k)}_l, l=0,1,\ldots ,L1\}\) is the hopping sequence for kth legitimate user and the element \(s^{(k)}_l\) is generated over q available channels. \({\mathbb {S}}\) is called as NHZ hopping pattern with nohit zone Z, when the Hamming auto and crosscorrelations (\(H_{a}(\tau )\) and \(H_{c}(\tau )\)) satisfy, respectively
The NHZ hopping pattern is usually denoted as \({\mathbb {S}}(q, L, K, Z)\) in previous studies. \(\square\)
By the definition of NHZ hopping pattern, it is observed that the Hamming auto and crosscorrelations of NHZ hopping pattern are equal to zero if the delay \(\tau\) is limited within Z. Such properties can guarantee the orthogonality for the multiple legitimate users accessing the network as long as the multiple users are strictly limited in the small access delay. However in the practice, particularly in the presence of jamming attacks, the small access delay is hard to realize due to the synchronization attack; consequently, the NHZ hopping pattern will cause the server performance degradation. The construction of traditional NHZ hopping patterns can be found in [35,36,37].
3.3 Generalized NHZ hopping pattern
Extending the definition of traditional NHZ hopping pattern, we further focus on the maximum Hamming cross and autocorrelations of \({\mathbb {S}}\) when \(\tau\) is outside of Z, i.e., (\(Z_{nh}+1\le \tau \le L1\)), which are shown as
The maximum Hamming correlation outside of Z is defined as
A fundamental tradeoff between \(\{q,L,K,Z,H_m\}\) has been established in [37] as follows.
Theorem 1
The lower bound of generalized NHZ hopping pattern is presented as following [37]:
Definition 3
A NHZ hopping pattern achieving the equality in (6) is called a generalized NHZ hopping pattern, which is denoted by \({\mathbb {S}}(q, L, K, Z, H_m)\) for simplicity [37].
By the above definition, the generalized NHZ hopping pattern satisfies the orthogonality for the small access delays \(\tau \le Z\), whilst having minimum amount of channel collisions for \(\tau  > Z\). Such properties imply that, even if, in the presence of the synchronization attacks, the performance degradation could be minimized. The generalized NHZ hopping patterns have the unique advantage compared to the other pseudorandom hopping patterns.
4 Probabilistic hopping pattern and construction algorithm
In the existing pseudorandom hopping patterns including the traditional/generalized NHZ hopping patterns, the change rule of channel follows the (nearly) uniform distribution over the available channels. These channelhopping patterns cannot take account of the status of jamming attack and cannot learn about the channel state information in advance. The drawback of such hopping schemes is that the legitimate users hop from one channel to another according to the preassigned hopping pattern, no matter what probability of jamming attack is emitted or not.
In this paper, we firstly propose a novel probabilistic hopping pattern (ProbHP), where the usage probabilities of the channels correspond to the occurrence probability of jamming attacks.
4.1 Definition of probabilistic hopping pattern
Definition 4
Given a channelslot set \({{\mathbb{F}}}=\{f_0,f_1,\ldots ,f_{q1}\}\) and its channel quality measured by the index of channelgain \(\mathbb {H}=\{h_0,h_1,\ldots ,h_{q1}\}\), where \(h_i\) denotes the channel gain of the ith channel \(f_i\). In \({{\mathbb{F}}}\), the channel slots are reordered by their qualities (i.e., the channel \(f_0\) has the best quality, and \(f_{q1}\) is the poorest one). We assume that \(p_{i}\) presents the probability of \(f_{i}\) appearing in the hopping pattern. The ProbHP \({\mathbb {S}}\) with length of L and size of K is generated over \({{\mathbb{F}}}\) and should satisfy that
where the values of \(\{p_ii=0,1,2,\ldots ,p1\}\) are determined by the corresponding channel gains, that is, \(p_i=\frac{\mathbb {E}\{h_i\}}{\sum _i \mathbb {E}\{h_i\}}\), where \(\mathbb {E}\{\cdot \}\) denotes the expectation operator. The optimal ProbHP \({\mathbb {S}}\) should satisfy that the Hamming correlations \(H_a(\cdot )\) and \(H_c(\cdot )\) are as small as possible.
In particular when the equality is (approximately) hold in (7), it is simplified to be the traditional uniformly distributed hopping pattern. The probability of each channel in the traditional pseudorandom pattern \(p_i\) is (approximately) equal to 1/q.
4.2 Construction algorithm of ProbHP
A construction algorithm of ProbHP consists of two steps, which will be presented as follows.
Step 1 Constructing a prime hopping pattern \({\mathbb {P}}\) over the given a channelslot set \({{\mathbb{F}}}=\{f_0,f_1,\ldots ,f_{q1}\}\) with a prime value q [27]. A new hopping pattern \({\mathbb {Q}}\) is formed by the cascade operation of m items of \({\mathbb {P}}\), i.e., \({\mathbb {Q}}=[{\mathbb {P}},{\mathbb {P}},\ldots ,{\mathbb {P}}]\). The value of m is determined by the intend probability of each channel \(\{p_i\}_i\). The \({\mathbb {Q}}\) can be rewritten row by row as follows:
It is easy to obtain that the probability of each channel appearing in each sequence \(\mathbf {Q}_k\) is \(\overline{p}=1/q\) according to the properties of prime hopping pattern.
Step 2 Assuming that the channel gains of \({{\mathbb{F}}}\) are the prior knowledge to the legitimate transceivers. Then, the set of probabilities \(\{p_ii=0,1,\ldots ,q1\}\), corresponding to channels \({{\mathbb{F}}}\) , is obtained following Definition 4. Based on \(\{p_ii=0,1,\ldots ,q1\}\), we get the value M so that \(p_{M+1} \le \overline{p}\le p_{M}\). Then, the ProbHP \({\mathbb {S}}=\{{\mathbf {S}}_0,{\mathbf {S}}_1,\ldots ,{\mathbf {S}}_{q1}\}\) could be obtained by the replacing algorithm, where \({\mathbf {S}}_k\) is the kth ProbHP sequence.
The replacing algorithm can be described as follows: the channels \(\{f_i, M+1\le i\le q1\}\) in \(\{\mathbf {Q}_k\}_k\) are replaced by those slots \(\{f_i, 0\le i\le M\}\), so that the number of channels appearing in each sequence \({\mathbf {S}}_k, k=0,1,\ldots ,q1\) meets the given \(\{p_ii=0,1,\ldots ,q1\}\). Finally, the proposed ProbHP is obtained.
It is well known that the detailed ProbHP is determined by the specific replacing algorithm. The specific ProbHP can be seen clearly by an example in the next subsection.
5 Examples of channelhopping patterns and properties comparisons
In this section, we will present the examples of the channelhopping patterns mentioned in the previous sections, particularly demonstrate the example of the proposed ProbHP step by step. Then, the randomness and Hamming correlations of these example are studied.
5.1 Example of ProbHP
Assuming that the probabilities of channels \(\{f_i\}\) are obtained as follows based on the given channel gains \(\{h_i\}\).
The above probabilities imply that the channel \(f_4\) has the poorest quality; thus, the usage probability is minimized. The channel \(f_0\) has the best quality, so with the highest probability.
Based on the above probabilities, we set \(q=5\), the prime hopping pattern \({\mathbb {P}}\) is obtained as follows over the channelslot set \({{\mathbb{F}}}=\{f_0,f_1,f_2,f_3,f_4\}\).
Then, a new hopping pattern \({\mathbb {Q}}\) is obtained by the cascade operation of \(m=3\) terms of \({\mathbb {P}}\), i.e.,
We can obtain that the probability of each channel in \(\mathbf {Q}_k\) is \(\bar{p}=1/5\). The specific replacing scheme is shown in Fig. 1. According to this scheme, one of \(f_3\) and one of \(f_4\) in \(\mathbf {Q}_k\) are replaced by \(f_0\), and the other \(f_4\) is replaced by \(f_1\). Finally, the ProbHP is obtained as
5.2 Example of traditional NHZ hopping pattern
In this subsection, we will present an example of the traditional NHZ hopping pattern via the algorithm proposed in [34]. The parameters of algorithm are set as: \(a_1=1,a_2=2, a_3=3\). The seed matrix is given by
Based on the seed matrix \({\mathbb{C}}\) and the parameters \(\{a_i\}_i\), the traditional NHZ hopping pattern \({\mathbb {S}}_1(q, L , K, Z)={\mathbb {S}}_1(15,15,5,2)\) is obtained as
5.3 Example of generalized NHZ hopping pattern
In this subsection, an example of generalized NHZ hopping pattern is presented, of which the construction algorithm has been proposed in [37]. The basic construction procedure of the generalized NHZ hopping pattern consists of two steps. Firstly, constructing multiple seed hopping patterns satisfying the Peng–Fan bound [33] and some specific requirements. Secondly, the constructed seed hopping pattern takes the interleaving operation. Here, we just present the brief construction procedure of the generalized NHZ hopping pattern.
Firstly, selecting three seed hopping patterns \(\{{\mathbb{C}}^{(0)}, {\mathbb{C}}^{(1)}, {\mathbb{C}}^{(2)}\}\) over three nonoverlapped channelslot sets \({{\mathbb{F}}}^0=\{0,1,2,3,4\}\), \({{\mathbb{F}}}^1=\{5,6,7,8,9\}\) and \({{\mathbb{F}}}^2=\{10,11,12,13,14\}\) , respectively, where
It is easy to check that all hopping patterns \(\{{\mathbb{C}}^{(0)}, {\mathbb{C}}^{(1)}, {\mathbb{C}}^{(2)}\}\) are optimal ones with respect to Peng–Fan bound.
Secondly, by the proposed interleaving algorithm, we can obtain the generalized NHZ hopping pattern \({\mathbb {S}}_2(q, L , K, Z, H_m)={\mathbb {S}}_2(15,15,5,2,3)\) as follows
5.4 Properties’ comparisons
In this subsection, we will compare the Hamming cross and autocorrelations of the aforementioned hopping patterns. For the fairness of comparisons, the parameters of hopping patterns (e.g., L and K) are set the same among these patterns.
Firstly, the Hamming cross and autocorrelations of ProbHP \({\mathbb {S}}\) are presented in Table 1. As the benchmark, the completely random hopping pattern is also shown in this Table. For the ProbHP, the amount of channel hits is increased compared to the completely random hopping pattern, but the probability of each channel can be adjusted according to the channel qualities. As to the completely random hopping pattern, the amount of channel hits is identical for the various access delays, i.e., \(H_{c}(\tau )=H_{a}(\tau )=3\). By computing the probability of channel slot, the completely random hopping pattern has the identical usage probability \(\{p_i\}=1/5\), while the ProbHP attains the various usage probabilities according to the channel qualities.
Secondly, the Hamming auto and crosscorrelations of traditional/generalized NHZ patterns are shown in Table 2. It is found that when the delay is constrained within the nohit zone Z (i.e., \(\tau \le Z =2\)), the generalized NHZ hopping pattern maintains zero value of Hamming correlation as same as the traditional NHZ hopping pattern, while outside the nohitzone Z, the maximum crossHamming correlation is \(H_m=3\) which is lower than the traditional one (\(H_m=5\)). The cost of optimal crosscorrelation is the slight increase in autocorrelation, which results to the trivial effect on MAI of multiuser systems. By computing the probability of channel, these two types of hopping patterns have the identical usage probability \(\{p_i\}=1/15\). Thus, these NHZ hopping patterns are the sort of the pseudorandom pattern.
By comparing Tables 1 and 2, it is observed that NHZ patterns can provide the orthogonality for the small access delay, but the ProbHP cannot. The orthogonality is in favor of infrastructureless multinode IoT system to completely avoid the multiaccess interference (MAI). In addition, by comparing the examples of channelhopping patterns as shown in (11), (14) and (15), it is found that the proposed ProbHP can offer the specific usage probabilities matching to the channel qualities, but at the slight cost of degrading the uniformity of channel resource. Observed from the proposed construction of ProbHP, the construction algorithm includes the nonlinear operations (e.g., replacing algorithm), which guarantees that ProbHP is hard to be overheard and estimated by the eavesdroppers, while the most of conventional channelhopping patterns (including NHZ patterns) are constructed by linear transformations.
6 Performance of wireless IoT based on proposed channelhopping patterns under jamming attacks
In this section, the signal analysis will be conducted for the wireless IoT networks employing these types of hopping patterns in the presence of jamming attacks, which is helpful to evaluate the errorrate performance via simulations.
6.1 System model and signal analysis
A massive wireless IoT application (e.g., WiFi, Bluetooth, Zigbee and so forth) is congested within the limited ISM band, which cause severe interference and jamming attacks to the legitimate users. To reduce the impact of jamming/interference, the channel hopping is the common solution by avoiding the channel collisions between the legitimate one and the jammer/interference ones.
The channelhopping transmission procedure can be modeled as the FH system. It is also well known that the WLAN standards (IEEE 802.11b/a/g) and Bluetooth standards utilize the FH technique as the basic transmission infrastructure. In this paper, we follow the FHMA system model with K legitimate users and one jammer, where the legitimate users transmit the signal via the hopped channels according to the proposed hopping pattern, whilst the jammer emits the attacking signal by specifically selecting the channels. For simplicity, we assume an Mary FSK signal is sent by legitimate users and jammers during each hopping interval T. To avoid the intercarrier interference of legitimate users, the minimum spacing of hopped frequency is assumed to be M/T. During each channel (i.e., frequency band in FH systems), we assume that the signal suffers from the flat Rayleigh fading as well as additive white Gaussian noise (AWGN) channel.
Before we analyze the signals, some definitions of the notations are firstly shown as follows.

K: the amount of legitimate users in IoT networks. These users share the spectrum and avoid jamming attack by using the channelhopping technique based on the proposed hopping patterns.

\(m^{(k)}(n)\): one Mary symbol transmitted by the kth legitimate user during the nth hopping interval, which follows uniformly distributed over the alphabet set \(\{0,1,\ldots ,M1\}\).

\(s^{(k)}_n\): the instantaneous hopped channel of the kth legitimate user during the nth hopping interval, which depends on the assigned hopping pattern.

\(\eta\): is the complex AWGN with the twosided power spectral density of \(N_0/2\).

\(\sqrt{2P^{(k)}}\): the received signal amplitude of the kth legitimate user under the independent Rayleigh fading channel with the mean square value \(2\Omega\).

\(\sqrt{2P^{(J)}}\): the signal amplitude of the jammer, which is also assumed to be the independent Rayleigh distribution with the mean square value \(2\Omega _J\).

\(s^{(J)}_n\): the contaminated channel of the jammer during the nth interval, which depends on the scanning rule of jammer.

\(\tau _{k}\): the relative access delay of the kth legitimate user caused by the transmission latency, synchronization attack and so forth. \(\tau _{k}\) is assumed to be independently and uniformly distributed within \([DT, DT]\), where D is the maximum delay.
Through the fading channel, the complex received signal during the nth hopping interval can be written as
where \(\varphi _n^{(k)}\) denotes the random phase of the MFSK signal. \(G_T(\cdot )\) is a unit rectangular pulse over an symbol interval T. J(t) is the signal emitted from jammer, which is presented by the specific modulation signal imposed on the pseudorandom channel hopping.
In the legitimate receiver, the received signal is orderly put into dehopper, demodulation and decision blocks as shown in Fig. 1, where the noncoherent MFSK demodulator is adopted which is shown in [38]. Assuming the 1th user as the desired one, the decision variable in the lth branch of the matched filters observed during the nth interval is computed as (17) after some straightforward manipulation
where \(\Gamma ^{(k)}\) follows an i.i.d. Rayleigh distribution with probability density function (pdf) \(f_{\Gamma ^{(k)}}(x)=2x\exp (x^2)\) for \(k=1, 2,\ldots , K\). \(I^{(k)}_l\) denotes as the MAI due to the kth interfering user. \(J'(t)\) is the jamming signal. \(v_l\) is a complex AWGN with mean zero and variance \(\frac{1}{\overline{E}_s/N_0}\), where \(\overline{E}_s=T\Omega\). Over the Rayleigh channels with jamming attack, it is found that the signaltojammer ratio is denoted as \(SJR = \Omega /\Omega _J\). For the distinct channels, the values of \(\Omega\) (or \(\Omega _J\)) are a random variable followed by the Rayleigh distribution under the condition of the channel gains \(\{h_ii=0,1,2,\ldots ,q1\}\).
In (17), the MAI and the jammer signal are the main impact factors on the transmission performance. Due to the applications of channelhopping patterns, the MAI and the jamming attack can be efficiently reduced (Figs. 2, 3).
It is assumed that the access delay among the legitimate users \(\tau _k\) is less than DT, which refers to the quasisynchronous multiple access. Since \(\tau _k\) follows the uniform distribution within \([DT,DT]\), \(\tau _k\) can be rewritten as \(\tau _k=\Delta _kT+\rho _kT\) , where the integer delay \(\Delta _k=\lceil \tau _k/T\rceil\) and the normalized delay \(\rho _k=\tau _k\mod T\) . It is clear that \(\Delta _k\) and \(\rho _k\) satisfy i.i.d. uniform distribution within \(\{\lfloor D/T\rfloor , \lfloor D/T\rfloor +1,\ldots ,\lceil D/T\rceil 1,\lceil D/T\rceil \}\) and [0,1), respectively. Thus, given a time delay \(\tau _k\) of the kth user, the MAI \(I_l^{(k)}(n)\) corresponding to the nth hopping interval \([nT, (n+1)T)\) shown in (17) can be evaluated in two subintervals: \(I^{(k)}_{l+}\) for \(nT\le t<nT+\rho _kT\) and \(I^{(k)}_{l}\) for \(nT+\rho _kT \le t<(n+1)T\). That is [37],
where
In the above equation, \(\hat{n}=n+\Delta _k\) denotes the symbol interval index of the kth interfering user (which is obtained from the delay \(\tau _k\)). \(\varphi ^{(k)}\) denotes the random phase of the MFSK signal. \(\theta _{l}=m^{(k)}(\hat{n})l\), and \(\theta _{l+}=m^{(k)}(\hat{n}+1)l\). The function \(\mathrm {sinc}(x)=\sin (\pi x)/\pi x\) if \(x\ne 0\) and otherwise \(\mathrm {sinc}(x)=1\).
By using the aforementioned hopping patterns, the specific value of \(h[s^{(k)}_{\hat{n}},s^{(1)}_{n}]\) can be obtained. For the traditional and the generalized NHZ hopping patterns, when \(\tau _k\le ZT\) (i.e., under quasisynchronous scenarios), we have \(h[s^{(k)}_{\hat{n}},s^{(1)}_{n}]\equiv 0\). For the generalized NHZ hopping pattern when \(\tau _k> ZT\) (i.e., under asynchronous scenarios), the value of \(h[s^{(k)}_{\hat{n}},s^{(1)}_{n}]\) is minimized compared to the traditional NHZ hopping pattern, as shown in Table 2. For the proposed ProbHP, the value of \(h[s^{(k)}_{\hat{n}},s^{(1)}_{n}]\) is also determined by the specific Hamming correlation property, as shown in Table 1. Note that for proposed ProbHP \({\mathbb {S}}\) shown in (11), we have \(\sum _{n=0}^{L}h[s^{(k)}_{\hat{n}},s^{(1)}_{n}] \le 6\) when \(\tau _k\le 5\) (i.e., under quasisynchronous scenarios).
As for the jamming attacks, we assume the jammer also emits the MFSK signals by specially selecting the channels, where the rule of scanning channels of jammer is uniformly hopped over the q intended channels (q is equal to the size of the channels sets of legitimate user). Thus, the received jamming signal can be rewritten as
where the parameters \(\{\rho _J, \theta _{J},\theta _{J+}, \varphi ^{(J)}\}\) are same as those shown in (19), except that the values are dependent on the status of jammer. From the above equation, the probabilities of the events of \(h[s^{(J)}_{\hat{n}},s^{(1)}_{n}]=1\) and \(h[s^{(J)}_{\hat{n}+1},s^{(1)}_{n}]=1\), i.e., \(p_{J1}\) and \(p_{J2}\), depend on the distributions of \(s^{(J)}_{\hat{n}}\), \(s^{(J)}_{\hat{n}+1}\) and \(s^{(1)}_{n}\). With employing various hopping patterns mentioned in the previous sections, the value of \(p_{J1,J2}\) is obtained as follows.

Completely random hopping pattern: \(p_{J1}= p_{J2}=1/q\).

Traditional NHZ hopping pattern: \(p_{J1}= p_{J2}=1/q\) since the each channel in NHZ hopping pattern follows the uniform distribution.

Generalized NHZ hopping pattern: \(p_{J1}= p_{J2}=1/q\), of which reason is same as the traditional one.

Probabilistic hopping pattern: the values of \(p_{J1}\) and \(p_{J2}\) are determined by the specific structure of the probabilistic hopping pattern.
The detector of receiver computes the M decision variables \(\Psi _l(n), l=0,1,\ldots ,M1\) and chooses the index of the largest decision variable as the estimate of the transmitted symbol, that is,
For the special case of \(M=2\) , as \(\Psi _0(n)>\Psi _1(n)\), the output of the detector is “0”; otherwise, it is “1”. Based on (21), the BER of the wireless multiuser IoT system based on the specific channelhopping patterns can be evaluated by Monte Carlo simulations later.
7 Simulations
In this section, we present the BER of wireless multiuser IoT networks employing the various hopping patterns in the presence of jamming attacks via Monte Carlo simulations. For the convenient comparisons, the parameters of the adopted channelhopping patterns are set to the same with each other. The examples of these channelhopping patterns are shown in the previous sections. Besides, the wireless channels are assumed to be the flat Rayleigh fading with \(E\{\Gamma ^{(k)}\}=1\).
7.1 BER versus K
The BERs of the channelhoppingbased wireless multiuser IoT networks for various number of legitimate users K are shown in Fig. 4. The traditional/generalized NHZ hopping patterns are \({\mathbb {S}}_1(q, M, L, Z)= {\mathbb {S}}_1(15, 5, 15, 2)\) and \({\mathbb {S}}_2(q, M, L, Z, H_m)= {\mathbb {S}}_2(15, 5, 15, 2, 3)\) , respectively. In this simulation, the maximum delay is set as \(D=4\) and the signaltojamming ratio \(\mathrm{SJR}=0\,\mathrm{dB}\). The curves agree with the common behavior that the BER degrades with increasing K. For the case of single user (\(K=1\)), the probabilistic hopping pattern outperforms other patterns. For the large K, its performance gets worse against the others. This phenomenon is due to the fact that, with increasing K, MAI becomes the dominate factor for performance degradations and the Hamming crosscorrelation property of ProbHP is the worst one among these patterns, as shown in Tables 1 and 2. Besides, the BER of generalized NHZ pattern is slightly better than that of traditional NHZ pattern, due to the lower value of Hamming correlation as shown in Table 2.
7.2 BER versus SJR for the single legitimate user
The BERs of the channelhoppingbased wireless multiuser IoT networks for various \(\mathrm{SJR}\)s with \(K=1\) are shown in Fig. 5. For the case when \(K=1\), the jamming attack is the main impact on the performance. From this figure, the BER increases with the decrease of \(\mathrm{SJR}\) since the jamming power increases. Compared to the (generalized) NHZ hopping patterns, the ProbHP attains the best error rate. The reason lies in that the ProbHP has the lower usage probability with regard to the channels attacked by the jammer, while the high usage probability for the other channels.
7.3 BER versus SJR for the multiple legitimate users
The BERs of the channelhoppingbased wireless multiuser IoT networks for various \(\mathrm{SJR}\)s with multiple legitimate users (\(K=3\)) are shown in Fig. 5. In this figure, the MAI and jamming attack are imposed into the wireless communication networks. For the large value of \(\mathrm{SJR}\), e.g., \(\mathrm{SJR}= 0\,\mathrm{dB}\), the curve of ProbHP lies in the middle position of traditional NHZ and generalized NHZ patterns. As increasing \(\mathrm{SJR}\), the jamming attack becomes the main factor on the error rate other than MAI; thus, the BER of ProbHP is the lowest one among these hopping patterns.
From Figs. 4 and 6, we observe that the traditional/generalized NHZ hopping patterns possess the unique advantage to combat the mutual interference contributed from other legitimate users, but with poor capability to avoid the jamming attacks. The ProbHP behaves conversely, that is, it has the superiority in avoiding the jamming attack but with the poor capability of antiinterference.
8 Results and discussion
8.1 Results
In this paper, we have focused on the channelhopping patternbased multinode IoT networks in smart cities for reducing both the mutual interference and the external jamming attacks. To achieve the goal, we have introduced several promising hopping patterns, i.e., traditional NHZ and the generalized NHZ patterns as well as proposed the new ProbHP. The construction algorithm of ProbHP was presented and demonstrated by the steptostep example. The critical properties of hopping patterns, e.g., Hamming correlations and uniformity, were analyzed, which are important to the capacity of combating interference and jamming attack. Observed from the properties, the traditional/generalized NHZ hopping patterns have the quasiorthogonality of Hamming correlations, which imply that there are less channel hits (even collisionfree) for the multiple legitimate users access. For the ProbHP, the usage probabilities of channels match to the occurrence probabilities of jamming attack on such channels. The ProbHP possess merits for actively avoiding the jamming attack.
As a case study, the multiple legitimate users in the IoT networks are assumed to send the MFSK signals by using the proposed hopping patterns. The BER performance of such networks in the presence of jamming attack has been investigated. By the simulations, some interesting conclusions can be drawn. The traditional and generalized NHZ hopping patterns have the lower BER in the case of the massive legitimate users, but with poor capability to combat the jamming attack. The ProbHP has the opposite behaviors, that is, it has the superiority in the presence of strong jamming attack but with relatively poor antiMAI capability. These BER phenomena can be also verified by the Hamming correlations and randomness properties of the hopping patterns.
8.2 Discussion
Time hopping/frequency hopping is the basic technique in IoT communication networks for suppressing denialofservice attacks (e.g., the mutual interference and jamming attacks) in the physical layer. The hopping pattern is the most critical component in TH/FH systems. The traditional/generalized NHZ hopping patterns and ProbHP discussed in this paper can be conveniently deployed in IoTbased smart cities applications and provide favorable merits to guarantee the transmission security and performance. However, it is noted that, in the channelhoppingbased IoT networks, the number of nodes accommodated in IoT networks is strictly subject to the number of channel resources. One of potential solutions is to combine the new multiaccess scheme (for example, nonorthogonal multiaccess) into channelhopping systems to support the massive connectivity. In addition, the performance of the IoT networks is investigated by semianalysis and semisimulation methods in this paper, and the theoretical performance integrating with the security policies in the upper layers with regard to the channelhoppingbased IoT networks still remains open issue, which will be our future works.
Availability of data and materials
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
Abbreviations
 IoT:

Internetofthing
 WLAN:

Wireless local area network
 NHZ:

Nohitzone
 WiFi:

Wireless fidelity
 ISM:

Industrial–scientific–medical
 FH:

Frequencyhopping
 TH:

Timehopping
 MAI:

Multiaccess interference
 FSK:

Frequencyshift keying modulation
 ProbHP:

Probabilistic hopping pattern
 AWGN:

Additive white Gaussian noise
 BER:

Bit error rate
 SJR:

Signaltojamming ratio
References
A. Gharaibeh, M.A. Salahuddin, S.J. Hussini, A. Khreishah et al., Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun. Surv. Tutor. 19, 2456–2501 (2017)
S. Liu, X. Liu, S. Wang, K. Muhammad, Fuzzyaided solution for outofview challenge in visual tracking under IoT assisted complex environment. Neural Comput. Appl. 33, 1055–1065 (2021)
A. AlFuqaha, M. Guizani, M. Mohammadi et al., Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17, 2347–2376 (2015)
K. Zhang, J. Ni, K. Yang, X. Liang et al., Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 1, 122–129 (2017)
A.D. Didolkar, F.I.Z. Zama, SMARTIE: a security solution for a smart city using internet of thingsarchitecture reference model. Int. J. Adv. Res. Innov. Ideas Educ. 2, 1–6 (2016)
K. Ren, Q. Wang, C. Wang, Z. Qin, X. Lin, The security of autonomous driving: threats, defenses, and future directions. Proc. IEEE 8(2), 357–372 (2020)
Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin, K. Ren, Realtime and spatiotemporal crowdsourced social network data publishing with differential privacy. IEEE Trans. Dependable Secure Comput. 15(4), 591–606 (2018)
L. Zhao, S. Hu, Q. Wang, J. Jiang, C. Shen, X. Luo, P. Hu, Shielding collaborative learning: mitigating poisoning attacks through clientside detection. IEEE Trans. Depend. Secure Comput. (Early access)
Y. Zhao, Y. Yang, B. Tian, T. Zhang, An invocation chain test and evaluation method for fog computing. I. Wirel. Commun. Mobile Comput. 2020, 1–11 (2020)
Y. Yu, L. Tan, M. Aloqaily, H. Yang, Y. Jararweh, Blockchainenhanced data sharing with traceable and direct revocation in IIoT. IEEE Trans. Ind. Inform. (Early access)
Bluetooth Special Interest Group (SIG): Bluetooth Specification, 683 Version 5.0 (2016). http://www.bluetooth.org. Accessed 31 Dec 2016
X. Wang, Z. Liu, Y. Gao et al., A nearoptimal protocol for the grouping problem in RFID systems. IEEE Trans. Mobile Comput. 20, 1257–1272 (2019)
S. Liu, C. Guo, F. AlTurjman et al., Reliability of response region: a novel mechanism in visual tracking by edge computing for IIoT environments. Mech. Syst. Signal Process. 138, 1–15 (2020)
K. Pelechrinis, M. Iliofotou, S.V. Krishnamurthy, Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13, 245–257 (2011)
Q. Wang, T. Nguyen, K. Pham, H. Kwon, Mitigating jamming attack: a gametheoretic perspective. IEEE Trans. Veh. Technol. 67, 6063–6074 (2018)
C. Kolias, G. Kambourakis, S. Gritzalis, Attacks and countermeasures on 802.16: analysis and assessment. IEEE Commun. Surv. Tutor. 15, 6487–514 (2013)
N. Nishanth, A. Mujeeb, Modeling and detection of floodingbased denialofservice attack in wireless ad hoc network using Bayesian inference. IEEE Syst. J. (Early access)
L. Jia, Y. Xu, Y. Sun, S. Feng, A. Anpalagan, Stackelberg game approaches for antijamming defence in wireless networks. IEEE Wirel. Commun. 25, 120–128 (2018)
Y. Wu, B. Wang, K.J.R. Liu, T.C. Clancy, Antijamming games in multichannel cognitive radio networks. IEEE J. Sel. Areas Commun. 30, 4–15 (2012)
M. Letafati, A. Kuhestani, H. Behroozi, D.W.K. Ng, Jammingresilient frequency hoppingaided secure communication for internetofthings in the presence of an untrusted relay. IEEE Trans. Commun. 19, 6771–6785 (2020)
Chao, C.M., Lee, W.C., Wang, C.X., et al: A flexible antijamming channel hopping for cognitive radio networkss, in 2018 6th International Symposium on Computing and Networking Workshops: 27–30 Nov 2018, Takayama, ed. by C.M. Chao (2018), pp. 1–6
J. Jeung, S. Jeong, J. Lim, Adaptive rapid channelhopping scheme mitigating smart jammer attacks in secure WLAN, in The 2011 Military Communications Conference: 711 Nov 2011, Baltimore, ed. by C.M. Chao (2011), pp. 1–6
C. Li, P. Qi, D. Wang et al., On the antiinterference tolerance of cognitive frequency hopping communication systems. IEEE Trans. Reliab. (Early Access) 1–12(2021)
Y. Zhao, X. Fang, Z. Zhao, Interference coordination in compact frequency reuse for multihop cellular networks. IEICE Trans. Fund. Electron. 93A, 2312–2319 (2010)
Y. Zhao, X. Fang, R. Huang, Y. Fang, Joint interference coordination and load balancing for OFDMA multihop cellular networks. IEEE Trans. Mobile Comput. 13, 89–101 (2014)
S. Liu, S. Wang, X. Liu et al., Fuzzy detection aided realtime and robust visual tracking under complex environments. IEEE Trans. Fuzzy Syst. 29, 90–102 (2021)
S.W. Golomb, G. Gong, Signal Designs With Good Correlation: For Wireless Communications, Cryptography and Radar Applications (Cambridge University Press, Cambridge, 2005)
J. Bao, L. Ji, New families of optimal frequency hopping sequence sets. IEEE Trans. Inf. Theory 62, 5209–5224 (2016)
J.H. Chung, G. Gong, K. Yang, New families of optimal frequencyhopping sequences of composite lengths. IEEE Trans. Inf. Theory 60, 3688–3697 (2014)
Z. Zhou, X. Tang, D. Peng, U. Parampalli, New constructions for optimal sets of frequencyhopping sequences. IEEE Trans. Inf. Theory 57, 3831–3840 (2011)
P. Fan, M.H. Lee, D. Peng, New family of hopping sequences for time/frequencyhopping CDMA systems. IEEE Trans. Wirel. Commun. 4, 2836–2842 (2005)
A. Lempel, H. Greenbergerg, Families of sequences with optimal hamming correlation properties. IEEE Trans. Inf. Theory IT 20, 90–94 (1974)
D.Y. Peng, P.Z. Fan, Lower bounds on the hamming auto and cross correlations of frequencyhopping sequences. IEEE Trans. Inf. Theory 50, 2149–2153 (2004)
W.X. Ye, P.Z. Fan, E.M. Gabidulin, Construction of nonrepeating frequencyhopping sequences with nohit zone. Electron. Lett. 42, 681–682 (2006)
X. Liu, L. Zhou, Q. Zeng, Nohitzone frequency hopping sequence sets with respect to aperiodic hamming correlation. Electron. Lett. 54, 212–213 (2018)
Q. Zeng, X. Liu, P.F. Du, Multilevel sequencebased frequencyhopping in multicell networks. IEEE Trans. Veh. Technol. 69, 16282–16287 (2020)
Q. Zeng, Z.Z. Zhou, X. Liu, Z.L. Liu, Strong nohitzone sequences for improved quasiorthogonal FHMA systems: sequence design and performance analysis. IEEE Trans. Commun. 67, 5336–5345 (2019)
M.K. Simon et al., Spread Spectrum Communications Handbook (McGrawHill, New York, 2001)
Acknowledgements
Not applicable.
Funding
This work is supported in part by Sichuan Province Science and Technology Support Program under Grant 2020YFG0292.
Author information
Authors and Affiliations
Contributions
YL and YZ conceived of the solution of the hopping patterns to the cybersecurity issue in the IoTbased smart cities and carried out the designs of the multiple hopping patterns, participated in the system analysis and drafted the manuscript. QZ participated in the traditional and generalized NHZ patterns designs, conducted the signal processing of IoT networks and helped to draft the manuscript. KW and YH partly participated in MATLAB simulations with regard to the error rate of IoT systems. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval and consent to participate
Not applicable.
Consent for publication
All authors read and approved the final manuscript.
Competing interests
The affiliations of authors claim that the results and the analysis methodologies in this paper will not be implemented into productions and will not be applied into the patent.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Liu, Y., Zeng, Q., Zhao, Y. et al. Novel channelhopping patternbased wireless IoT networks in smart cities for reducing multiaccess interference and jamming attacks. J Wireless Com Network 2021, 152 (2021). https://doi.org/10.1186/s13638021020298
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638021020298
Keywords
 Wireless IoT networks
 Jamming attacks
 Interference
 Design of channelhopping patterns
 System analysis