Energy-Efficient and Resilient Secure Routing in Energy Harvesting Wireless Sensor Networks with Transceiver Noises: EcoSecNet Design and Analysis

被引:3
作者
Muhammad Umer, Mushtaq [1 ]
Hong, Jiang [1 ]
Muhammad, Owais [1 ]
Awwad, Fuad A. [2 ]
Ismail, Emad A. A. [2 ]
机构
[1] SWUST, Sch Informat Engn, Mianyang, Peoples R China
[2] King Saud Univ, Coll Business Adm, Dept Quantitat Anal, POB 71115, Riyadh 11362, Saudi Arabia
关键词
PHYSICAL-LAYER SECURITY; SELECTION; COMMUNICATION; INTERFERENCE; DIVERSITY; ALGORITHM; PROTOCOLS; TRADEOFF; CHANNELS; OUTAGE;
D O I
10.1155/2024/3570302
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cooperative energy harvesting wireless sensor networks (EH-WSNs) using energy-harvesting-based physical layer security (PLS) appears to be a promising way to meet information security and energy efficiency goals at the same time. PLS uses energy harvesting (EH) features to protect data while transmitting. This eliminates the need for traditional upper-layer data encryption. However, this method introduces new challenges, particularly in scenarios where potential adversaries can intercept sensitive information through network relays. When it comes to multihop, multipath cooperative EH-WSNs, it becomes even more complicated to optimize transmit power for EH while reducing eavesdropping risk. In this study, three routing protocols, direct route designation (DRD), casual route designation (CRD), and superlative route designation (SRD) are presented. The protocols will improve multihop, multipath cooperative EH-WSNs' security in the presence of eavesdroppers as well as noises at the transceiver. In this framework, both source nodes and relay nodes use power-beaming techniques to make their data transmission operations easier. This study goes beyond the protocol recommendations by presenting comprehensive closed-form formulas and asymptotic outage probability analysis for each protocol under various eavesdropping attack scenarios, i.e., coordination and noncoordination of eavesdroppers. According to simulation data, the suggested SRD protocol outperforms the CRD and DRD protocols by 19% and 25%, respectively, when eavesdroppers are not coordinating. The suggested SRD protocol outperforms the CRD and DRD protocols by 28% and 32%, respectively, in terms of eavesdropper coordination.
引用
收藏
页数:14
相关论文
共 46 条
[1]   Energy replenishment using renewable and traditional energy resources for sustainable wireless sensor networks: A review [J].
Akhtar, Fayaz ;
Rehmani, Mubashir Husain .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2015, 45 :769-784
[2]   Performance Analysis of Uplink IM-OFDMA Systems in the Presence of CFO and Rx-IQI [J].
Alaca, Ozgur ;
Althunibat, Saud ;
Yarkan, Serhan ;
Miller, Scott L. ;
Qaraqe, Khalid A. .
2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, :168-173
[3]   Optimal Best Path Selection Algorithm for Cluster-Based Multi-Hop MIMO Cooperative Transmission for Vehicular Communications [J].
Alam, Md Zahangir ;
Adhicandra, Iwan ;
Jamalipour, Abbas .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (09) :8314-8321
[4]   A Distance Vector Hop-Based Secure and Robust Localization Algorithm for Wireless Sensor Networks [J].
Asif, Rameez ;
Farooq-i-Azam, Muhammad ;
Chaudary, Muhammad Hasanain ;
Husen, Arif ;
Hassan, Syed Raheel .
ELECTRONICS, 2023, 12 (10)
[5]   Physical-Layer Security in Full-Duplex Multi-Hop Multi-User Wireless Network With Relay Selection [J].
Atapattu, Saman ;
Ross, Nathan ;
Jing, Yindi ;
He, Yuanyuan ;
Evans, Jamie S. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (02) :1216-1232
[6]   Performance Analysis of Energy Harvesting-Based Full-Duplex Decode-and-Forward Vehicle-to-Vehicle Relay Networks with Nonorthogonal Multiple Access [J].
Ba Cao Nguyen ;
Tran Manh Hoang ;
Xuan Nghia Pham ;
Tran, Phuong T. .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
[7]   Distributed Power Splitting for SWIPT in Relay Interference Channels Using Game Theory [J].
Chen, He ;
Li, Yonghui ;
Jiang, Yunxiang ;
Ma, Yuanye ;
Vucetic, Branka .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (01) :410-420
[8]   Security-Reliability Tradeoff for Friendly Jammer Assisted User-Pair Selection in the Face of Multiple Eavesdroppers [J].
Ding, Xiaojin ;
Song, Tiecheng ;
Zou, Yulong ;
Chen, Xiaoshu .
IEEE ACCESS, 2016, 4 :8386-8393
[9]   Dynamic Provisioning of Random Access Capacity in mMTC Slice Based on Beam Splitting/Merging [J].
Fu, Xiao ;
Shen, Qingguo ;
Yang, Baofeng ;
Gao, Xiqi .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) :3331-3347
[10]   Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers [J].
Geraci, Giovanni ;
Singh, Sarabjot ;
Andrews, Jeffrey G. ;
Yuan, Jinhong ;
Collings, Iain B. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (05) :2931-2943