Secrecy outage performance of multi-hop LEACH networks using power beacon aided cooperative jamming with jammer selection methods

被引:3
作者
Ha Duy Hung [1 ]
Tran Trung Duy [2 ]
Voznak, Miroslav [1 ]
机构
[1] VSB Tech Univ Ostrava, Ostrava, Czech Republic
[2] Posts & Telecommun Inst Technol, Ho Chi Minh City, Vietnam
关键词
Physical-layer security; Radio frequency energy harvesting; LEACH networks; Cooperative jamming; Secrecy outage probability; PHYSICAL-LAYER SECURITY; RELAY SELECTION; WIRELESS; COMMUNICATION; ALLOCATION; EAVESDROPPERS; TRANSMISSION; PROBABILITY; CAPACITY; PROTOCOL;
D O I
10.1016/j.aeue.2020.153357
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we evaluate secrecy performance of cooperative jamming (CJ) aided secure transmission for Multi-hop Low-Energy Adaptive Clustering Hierarchy (M-LEACH) networks, where data transmission between a source and a destination is performed via cluster heads (CHs) of intermediate clusters, and is overheard by an eavesdropper. To protect the source information at each hop, each CH selects one or many cluster nodes to realize the CJ technique. We propose energy harvesting (EH) based jammer selection methods named MAX-EH, MAX-IP and ALL-CJ, where the selected jammer(s) has to harvest wireless energy from a dedicated power beacon to generate jamming noises. In MAX-EH, the cluster node obtained the MAXimum Energy Harvested from the power beacon is chosen. In MAX-IP, the selected jammer is the cluster node providing the MAXimum Interference Power to the eavesdropper. In ALL-CJ, ALL cluster nodes in the clusters take part in the CJ operation. For performance evaluation, we derive expressions of the end-to-end (e2e) secrecy outage probability (SOP) for the proposed methods over Rayleigh fading channels. We then perform Monte-Carlo based computer simulations to verify the theoretical results. The results presented that the proposed methods outperform the RANDom jammer selection (RAND) and the corresponding method WithOut using the CJ technique (WO-CJ). (C) 2020 Elsevier GmbH. All rights reserved.
引用
收藏
页数:10
相关论文
共 51 条
[1]   Secrecy Performance Analysis of Wireless Sensor Networks [J].
Ai, Yun ;
Cheffena, Michael ;
Ohtsuki, Tomoaki ;
Zhuang, He .
IEEE SENSORS LETTERS, 2019, 3 (05)
[2]   Secure Relaying in Multihop Communication Systems [J].
Alotaibi, Esa R. ;
Hamdi, Khairi A. .
IEEE COMMUNICATIONS LETTERS, 2016, 20 (06) :1120-1123
[3]   Physical-Layer Security in Full-Duplex Multi-Hop Multi-User Wireless Network With Relay Selection [J].
Atapattu, Saman ;
Ross, Nathan ;
Jing, Yindi ;
He, Yuanyuan ;
Evans, Jamie S. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (02) :1216-1232
[4]   Energy-efficient modified LEACH protocol for IoT application [J].
Behera, Trupti Mayee ;
Samal, Umesh Chandra ;
Mohapatra, Sushanta Kumar .
IET WIRELESS SENSOR SYSTEMS, 2018, 8 (05) :223-228
[5]   Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks [J].
Cai, Chunxiao ;
Cai, Yueming ;
Yang, Weiwei ;
Yang, Wendong .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (07) :1340-1343
[6]   Cooperative Jamming for Secure Communication With Finite Alphabet Inputs [J].
Cao, Kuo ;
Cai, Yueming ;
Wu, Yongpeng ;
Yang, Weiwei .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) :2025-2028
[7]   Secrecy Outage Performance of a Cooperative Cognitive Relay Network [J].
Chakraborty, Pratik ;
Prakriya, Shankar .
IEEE COMMUNICATIONS LETTERS, 2017, 21 (02) :326-329
[8]   On the physical layer security over Beaulieu-Xie fading channel [J].
Chauhan, Puspraj Singh ;
Kumar, Sandeep ;
Soni, Sanjay Kumar .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2020, 113
[9]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[10]   Machine Learning based Evaluation of Functional Index for Coronary Lesion Severity [J].
Duc Minh Tran ;
Minh Tuan Nguyen ;
Lee, Sang-Wook .
2ND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND SOFT COMPUTING (ICMLSC 2018), 2015, :1-4