scholarly journals Defending Against Randomly Located Eavesdroppers by Establishing a Protecting Region

Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 438
Author(s):  
Tao Li ◽  
Chaozheng Xue ◽  
Yongzhao Li ◽  
Octavia A. Dobre

The security problem in wireless sensor networks faces severe challenges, due to the openness of the sensor network channel and the mobility and diversity of the terminals. When facing randomly located eavesdroppers, the situation is much more complex. This paper studies the security performance of a wireless sensor network where randomly located passive and active eavesdroppers are both considered. Compared to a passive eavesdropper, an active eavesdropper can perform both eavesdropping and malicious jamming simultaneously in a wireless sensor network. Based on beamforming and artificial noise (AN), we propose a practical way to defend against the eavesdropper by establishing a protecting region. An appropriate metric, the hybrid outage probability, which takes both the transmission outage probability and the secrecy outage probability into consideration, is utilized to evaluate the security performance. In addition, the concept of safe transmission range is defined to evaluate the security performance. Simulation results are provided to depict the insecure region and verify the harm of the active eavesdropper to the transmission in the wireless sensor network.

2018 ◽  
Vol 7 (3.12) ◽  
pp. 779
Author(s):  
Senthamil Selvan ◽  
Wahidabanu .

Wireless sensor network is noticed as bulk aggregation of slender sensor knobs that can characterize themselves in a decentralized system. Wireless communications assist these trades to increase plant knowledge by acquiring additional measurements from processes and apparatus when wired communication would be infeasible. The merits of the space diversity and transmit nature of wireless transmissions to adopt combined accession in which node transmit the host, that recover the lost host with long credibility by overhearing the transmission of its acquaintance.Article represents an indicating flexible unified management. On the basis of regular set code, the aspect of overall managed flexible WSN activity, local action conversion is protected.  


Entropy ◽  
2019 ◽  
Vol 21 (4) ◽  
pp. 427 ◽  
Author(s):  
Yi Song ◽  
Weiwei Yang ◽  
Zhongwu Xiang ◽  
Yiliang Liu ◽  
Yueming Cai

Millimeter-wave (mmWave) communication is one of the key enabling technologies for fifth generation (5G) mobile networks. In this paper, we study the problem of secure communication in a mmWave wiretap network, where directional beamforming and link blockages are taken into account. For the secure transmission in the presence of spatially random eavesdroppers, an adaptive transmission scheme is adopted, for which sector secrecy guard zone and artificial noise (AN) are employed to enhance secrecy performance. When there exists no eavesdroppers within the sector secrecy guard zone, the transmitter only transmits information-bearing signal, and, conversely, AN along with information-bearing signal are transmitted. The closed-form expressions for secrecy outage probability (SOP), connection outage probability (COP) and secrecy throughput are derived under stochastic geometry. Then, we evaluate the effect of the sector secrecy guard zone and AN on the secrecy performance. Our results reveal that the application of the sector secrecy guard zone and AN can significantly improve the security of the system, and blockages also can be utilized to improve secrecy performance. An easy choice of transmit power and power allocation factor is provided for achieving higher secrecy throughput. Furthermore, increasing the density of eavesdroppers not always deteriorates the secrecy performance due to the use of the sector secrecy guard zone and AN.


Sign in / Sign up

Export Citation Format

Share Document