Analysis of Visible Light Communication using Integrated Avalanche Photodiode
Volume-4 | Issue-2

A Review on Identifying Suitable Machine Learning Approach for Internet of Things Applications
Volume-3 | Issue-3

TOWARDS GHZ METALLIC ACCESS NETWORKS
Volume-1 | Issue-1

Smart WSN-based System for Forest Fire Detection with Reduced False Alarms
Volume-5 | Issue-2

REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3

Process Control Ladder Logic Trouble Shooting Techniques Fundamentals
Volume-1 | Issue-4

TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1

COMPUTATIONAL OFFLOADING FOR PERFORMANCE IMPROVEMENT AND ENERGY SAVING IN MOBILE DEVICES
Volume-1 | Issue-4

ANALYSIS OF ROUTING PROTOCOLS IN FLYING WIRELESS NETWORKS
Volume-1 | Issue-3

Dual Edge-Fed Left Hand and Right Hand Circularly Polarized Rectangular Micro-Strip Patch Antenna for Wireless Communication Applications
Volume-2 | Issue-3

TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1

Hybrid Micro-Energy Harvesting Model using WSN for Self-Sustainable Wireless Mobile Charging Application
Volume-3 | Issue-3

Three Phase Coil based Optimized Wireless Charging System for Electric Vehicles
Volume-3 | Issue-3

Cyber-attack and Measuring its Risk
Volume-3 | Issue-4

REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3

Analysis of Solar Power Generation Performance Improvement Techniques
Volume-4 | Issue-3

Pollination Inspired Clustering Model for Wireless Sensor Network Optimization
Volume-3 | Issue-3

Design of Low Power Cam Memory Cell for the Next Generation Network Processors
Volume-3 | Issue-4

A STUDY OF RESEARCH NOTIONS IN WIRELESS BODY SENSOR NETWORK (WBSN)
Volume-1 | Issue-2

Computation of Constant Gain and NF Circles for 60 GHz Ultra-low noise Amplifiers
Volume-3 | Issue-3

Home / Archives / Volume-3 / Issue-2 / Article-1

Volume - 3 | Issue - 2 | june 2021

Physical Layer Protection Against Sensor Eavesdropper Channels in Wireless Sensor Networks
Pages: 59-67
DOI
10.36548/jsws.2021.2.001
Published
03 June, 2021
Abstract

This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.

Keywords

Wireless Sensor Network Scheduling Schemes Physical layer security Intercept probability

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee 100 USD
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here