Detailed Information

Cited 22 time in webofscience Cited 29 time in scopus
Metadata Downloads

Performance Enhancement for Multihop Harvest-to-Transmit WSNs With Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises

Authors
Tran Dinh HieuTran Trung DuyKim, Byung-Seo
Issue Date
15-Jun-2018
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Energy harvesting; power beacon; wireless sensor networks; physical-layer security; randomize-and-forward (RF); multi-hop multi-path networks; path selection; hardware impairments; outage probability
Citation
IEEE SENSORS JOURNAL, v.18, no.12, pp.5173 - 5186
Journal Title
IEEE SENSORS JOURNAL
Volume
18
Number
12
Start Page
5173
End Page
5186
URI
https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/3554
DOI
10.1109/JSEN.2018.2829145
ISSN
1530-437X
Abstract
Energy-harvesting-based physical-layer security has become a promising technique, as it not only secures information from eavesdropping without upper layer data encryption but also improves the energy efficiency of wireless networks. However, it imposes new challenges, as adversary parties can overhear the transmission of confidential information between the source and destination via a relay. Therefore, the transmit power of the signals must be large enough for energy harvesting, but it must also be small enough to avoid eavesdropping. This is even more challenging with multihop multipath wireless networks. Motivated by these observations, this paper proposes three innovative protocols, namely, the shortest path selection protocol, random path selection protocol, and best path selection protocol. These will enhance the security of multihop multipath randomize-and-forward cooperative wireless sensor networks under the presence of eavesdroppers and hardware impairment, wherein the source node and relay nodes are capable of harvesting energy from beacon for data transmission. Furthermore, we derive exact closed-form expressions and the asymptotic outage probability for each protocol under multiple eavesdropping attacks. The simulation results validate the theoretical results.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Software and Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Byung Seo photo

Kim, Byung Seo
Graduate School (Software and Communications Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE