Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacksopen access

Authors
Triwidyastuti, YosefinePerdana, Ridho Hendra YogaShim, KyusungAn, Beongku
Issue Date
Sep-2023
Publisher
MDPI
Keywords
cooperative transmission; eavesdropper; multihop relay; node selection; physical layer security; secrecy outage probability
Citation
SENSORS, v.23, no.17
Journal Title
SENSORS
Volume
23
Number
17
URI
https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31697
DOI
10.3390/s23177653
ISSN
1424-8220
Abstract
Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the legitimate users' transmission. Thus, in this paper, we study the secrecy performance of a multihop transmission under various eavesdropping attacks for WSNs. To improve the secrecy performance, we propose two node selection schemes in each cluster, namely, minimum node selection (MNS) and optimal node selection (ONS) schemes. To exploit the impact of the network parameters on the secrecy performance, we derive the closed-form expression of the secrecy outage probability (SOP) under different eavesdropping attacks. From the numerical results, the ONS scheme shows the most robust secrecy performance compared with the other schemes. However, the ONS scheme requires a lot of channel information to select the node in each cluster and transmit information. On the other side, the MNS scheme can reduce the amount of channel information compared with the ONS scheme, while the MNS scheme still provides secure transmission. In addition, the impact of the network parameters on the secrecy performance is also insightfully discussed in this paper. Moreover, we evaluate the trade-off of the proposed schemes between secrecy performance and computational complexity.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Software and Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE