Physical Layer Protection Against Sensor Eavesdropper Channels in Wireless Sensor Networks
PDF
PDF

How to Cite

Bashar, Abul, and S. Smys. 2021. “Physical Layer Protection Against Sensor Eavesdropper Channels in Wireless Sensor Networks”. IRO Journal on Sustainable Wireless Systems 3 (2): 59-67. https://doi.org/10.36548/jsws.2021.2.001.

Keywords

— Wireless Sensor Network
— Scheduling Schemes
— Physical layer security
— Intercept probability
Published: 03-06-2021

Abstract

This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.

References

  1. López, J., & Zhou, J. (Eds.). (2008). Wireless sensor network security (Vol. 1). Ios Press.
  2. Viani, F., Oliveri, G., Donelli, M., Lizzi, L., Rocca, P., & Massa, A. (2010, September). WSN-based solutions for security and surveillance. In The 40th European Microwave Conference (pp. 1762-1765). IEEE.
  3. Deng, Y., Wang, L., Elkashlan, M., Nallanathan, A., & Mallik, R. K. (2016). Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach. IEEE Transactions on Information Forensics and Security, 11(6), 1128-1138.
  4. Yılmaz, M. H., & Arslan, H. (2015, October). A survey: Spoofing attacks in physical layer security. In 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops) (pp. 812-817). IEEE.
  5. Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012, September). Cooperative jamming for physical layer security in wireless sensor networks. In The 15th International Symposium on Wireless Personal Multimedia Communications (pp. 458-462). IEEE.
  6. Senthilkumar, M., Kavitha, V. R., Kumar, M. S., Raj, P. A. C., & Shirley, D. R. A. (2021, March). Routing in a Wireless Sensor Network using a Hybrid Algorithm to Improve the Lifetime of the Nodes. In IOP Conference Series: Materials Science and Engineering (Vol. 1084, No. 1, p. 012051). IOP Publishing.
  7. Chopra, R., Murthy, C. R., & Annavajjala, R. (2019). Physical layer security in wireless sensor networks using distributed co-phasing. IEEE Transactions on Information Forensics and Security, 14(10), 2662-2675.
  8. Gupta, M., Singh, P., & Rani, S. (2015). Optimizing physical layer energy consumption for reliable communication in multi-hop wireless sensor networks. Indian Journal of Science and Technology, 8(13), 1-7.
  9. Chen, J. I. Z., & Smys, S. (2020). Social Multimedia Security and Suspicious Activity Detection in SDN using Hybrid Deep Learning Technique. Journal of Information Technology, 2(02), 108-115.
  10. Barua, M. P., & Indora, M. S. (2013). Overview of security threats in WSN. vol, 2, 422-426.
  11. Tayebi, A., Berber, S., & Swain, A. (2018). Security enhancement of fix chaotic-DSSS in WSNs. IEEE Communications Letters, 22(4), 816-819.
  12. Wen, H. (2013). Physical layer approaches for securing wireless communication systems. Springer Science & Business Media.
  13. Bashar, A. (2020). Sensor cloud based architecture with efficient data computation and security implantation for Internet of Things application. Journal of ISMAC, 2(02), 96-105.
  14. Jacob, I. J., & Darney, P. E. (2021). Artificial Bee Colony Optimization Algorithm for Enhancing Routing in Wireless Networks. Journal of Artificial Intelligence, 3(01), 62-71.