scholarly journals Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor ? Fading Channels

Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1368
Author(s):  
Srđan Maričić ◽  
Nenad Milošević ◽  
Dejan Drajić ◽  
Dejan Milić ◽  
Jelena Anastasov

In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmission of reliable links impaired by Fisher–Snedecor F fading. The path loss among active nodes is also considered. The exact intercept probability expressions are derived recalling an optimal scheduling scheme (OS), a scheduling policy based on a specific cumulative distribution function (CS), and round-robin scheduling as a baseline. The asymptotic behavior of the intercept metric is also presented in a simpler form with acceptable accuracy. The secrecy diversity orders are defined and the security–reliability tradeoff of WSN is specified. Numerical results are provided to demonstrate the interplay of various main/wiretap channel conditions, the distances among nodes, the number of active sensors, and the average main-to-eavesdropper’s signal ratio in order to upgrade the quality of the WSN secrecy performance. Additionally, the impact of the outage probability on the intercept probability is defined for a variety of scenarios under which either the CS or OS scheme could be selected as suitable for PLS enhancement. The obtained results are verified by independent Monte Carlo simulations.

2020 ◽  
Vol 19 (1) ◽  
pp. 001
Author(s):  
Ivica Marjanović ◽  
Dejan Milić ◽  
Jelena Anastasov ◽  
Aleksandra Cvetković

In this paper, a physical layer security analysis of wireless sensor network in the presence of an attacker, employing opportunistic scheduling approach, is presented. The intended as well as unintended transmission paths experience the Weibull fading. A novel analytical expression for the intercept probability is derived. In order to emphasize the advantages of the opportunistic scheduling approach, a comparative analysis with round-robin and optimal scheduling schemes is also given. The impact of a number of active sensors and the impact of fading channel conditions over main and wiretap channels on the intercept probabilities is obtained. The accuracy of theoretical results is confirmed by independent Monte Carlo simulation results.


2018 ◽  
Vol 2018 ◽  
pp. 1-12
Author(s):  
Weilong Hu ◽  
Jiangbo Si ◽  
Hongyan Li

Cooperative relaying communication is one of the green communication technologies since it shortens the communication distance and saves the transmit power. In this paper, the physical-layer security (PLS) of a multisource multirelay cooperative relaying communication network is investigated by considering the influence of cochannel interference from a security-reliability tradeoff (SRT) perspective. First, the SRT performance is characterized by the outage probability (OP) and the intercept probability (IP). In particular, the IP encountered at the eavesdropper is used to evaluate the security performance, while the reliability performance is analyzed in terms of the OP experienced at the destination. Then, under the impact of multiple cochannel interferers, the intercept probabilities and the outage probabilities of both the conventional direct transmission (DT) strategy and relay selection (RS) strategy are derived in closed-form expressions over Rayleigh fading channels, respectively. Simulation results are provided to validate the theoretical analysis. It is shown that when the OP (reliability) requirement is relaxed, the IP (security) performance improves and vice versa. It confirms that there is an SRT existing between the OP and the IP. Meanwhile, a better SRT performance can be achieved by increasing the number of sources, relays, and cochannel interferers. In addition, it is also shown that the RS strategy generally outperforms the conventional DT strategy in terms of the product of the IP and the OP.


2021 ◽  
Vol 3 (2) ◽  
pp. 59-67
Author(s):  
Abul Bashar ◽  
Smys S

This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.


Author(s):  
Amine Dhraief ◽  
Imen Mahjri ◽  
Abdelfettah Belghith

Wireless Sensor Networks (WSNs) have recently emerged as a prominent technology for lots of civilian and military applications in both rural and urban environments. Area coverage configuration is an efficient method to alleviate the nodes' limited energy supply in high density WSNs. It consists in selecting as few active sensors as possible from all deployed nodes while ensuring sufficient sensing coverage of the monitored region. Several coverage configuration protocols have been developed; most of them presume the availability of precise knowledge about node locations and sensing ranges. Relaxing these conservative assumptions might affect the performance of coverage configuration protocols. In this chapter, the authors examine the impact of location errors, irregular sensing ranges, and packet losses on the Coverage Configuration Protocol (CCP). The authors focus more precisely on the impact of using this protocol on a real application: precision agriculture where farmers need to cover the entire terrain with sensors in order to rapidly detect and localize spots requiring chemical treatment.


2021 ◽  
Author(s):  
Saeid Pakravan ◽  
Ghosheh Abed Hodtani

Abstract In this paper, a discrete memoryless wiretap channel with non-causal side information known at the encoder is considered. We (i) characterize capacity region for the Gaussian version of this channel by considering correlation between channel input and side information available at the transmitter; (ii) analyze the impact of correlation on the performance of physical layer security in a Rayleigh fading wiretap channel by deriving closed-form expressions on the average secrecy capacity (ASC) and secrecy outage probability (SOP). Further, to more show the impact of side information, asymptotic behavior of SOP is studied. Numerical evaluation of theoretical results is done finally.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Xiao Jiang ◽  
Peng Li ◽  
Bin Li ◽  
Yulong Zou ◽  
Ruchuan Wang

In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser network with the help of a friendly jammer (J), where multiple eavesdroppers are considered to tap the information transmission from users (Us) to base station (BS). In this system, a power beacon (PB) transmits radio frequency (RF) signals to Us for charging. In order to enhance the security of wireless transmission, we propose non-energy-aware multiuser scheduling (NEAMUS) scheme and energy-aware multiuser scheduling (EAMUS) scheme. For the purpose of comparison, we introduce conventional round robin multiuser scheduling (CRRMUS) scheme. The closed-form outage probability (OP) and intercept probability (IP) expressions of NEAMUS, EAMUS, and CRRMUS schemes are derived over Rayleigh fading channels. Additionally, we analyze the security-reliability tradeoff (SRT) of NEAMUS, EAMUS, and CRRMUS schemes in terms of OP and IP. Numerical results show that the proposed EAMUS scheme is superior to the CRRMUS scheme and NEAMUS scheme in terms of SRT, demonstrating the advantage of the proposed EAMUS scheme in improving the physical-layer security and reliability. Moreover, SRT performance of NEAMUS and EAMUS schemes can also be improved by increasing the number of users.


2018 ◽  
Vol 8 (4) ◽  
pp. 3265-3269 ◽  
Author(s):  
Z. Hussain ◽  
A. ur R. Khan ◽  
H. Mehdi ◽  
S. M. A. Saleem

In this paper, performance of a device-to-device (D2D) communication system is analyzed over double-generalized Gamma (dGG) fading channels. The dGG is a generic distribution for modeling double-scattering fading conditions. Co-channel interference (CCI) caused by various wireless devices in the system is also considered. The CCI fading channel is assumed to be Nakagami distributed. Analytical expressions for important statistical metrics, i.e. probability density function (PDF) and cumulative distribution function (CDF) of signal-to-interference ratio (SIR), are presented. Based on these statistical parameters, expressions for the outage probability, channel capacity and symbol error rate (SER) of the D2D communication system are presented. The performance of D2D system is then discussed and analyzed with the help of numerical results with arbitrary channel fading, path-loss and interference conditions.


2018 ◽  
Vol 7 (3) ◽  
pp. 32 ◽  
Author(s):  
Muhammad Imran ◽  
Haejoon Jung

Distributed antenna systems (DASs) are known to be effective to enhance coverage, spectral efficiency, and reliability in mobile communication systems. Because multiple antennas are physically separated in space, DASs benefit from both micro- and macro-diversity, which makes DASs significantly more robust compared to conventional co-located antenna systems in fading channels. However, when multiple antennas are not dispersed enough, there exists a certain degree of correlation in large-scale fading (shadowing), which degrades the macro-diversity gain. In practice, various measurements indicate a high degree of correlation of shadowing in DASs. However, most of the previous studies on DASs have not considered the correlated shadowing and its corresponding performance loss. Motivated by this limitation, we analyze the impact of the correlated shadowing to better evaluate DAS-based schemes with dual diversity transmitters. Assuming that shadowing correlation is an exponentially decreasing function of the inter-element separation, we derive the outage probability of DAS in composite Rayleigh-lognormal shadowing channels. Also, we present numerical and simulation results, which indicate there exists an optimal inter-separation between antennas that minimizes the outage rate to balance a trade-off between macro-diversity and path loss.


Sign in / Sign up

Export Citation Format

Share Document