Abstract
This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.
Publisher
Inventive Research Organization
Subject
General Materials Science
Reference14 articles.
1. [1] López, J., & Zhou, J. (Eds.). (2008). Wireless sensor network security (Vol. 1). Ios Press.
2. [2] Viani, F., Oliveri, G., Donelli, M., Lizzi, L., Rocca, P., & Massa, A. (2010, September). WSN-based solutions for security and surveillance. In The 40th European Microwave Conference (pp. 1762-1765). IEEE.
3. [3] Deng, Y., Wang, L., Elkashlan, M., Nallanathan, A., & Mallik, R. K. (2016). Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach. IEEE Transactions on Information Forensics and Security, 11(6), 1128-1138.
4. [4] Yılmaz, M. H., & Arslan, H. (2015, October). A survey: Spoofing attacks in physical layer security. In 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops) (pp. 812-817). IEEE.
5. [5] Rohokale, V. M., Prasad, N. R., & Prasad, R. (2012, September). Cooperative jamming for physical layer security in wireless sensor networks. In The 15th International Symposium on Wireless Personal Multimedia Communications (pp. 458-462). IEEE.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献