scholarly journals Exploiting Opportunistic Scheduling Schemes and WPT-Based Multi-Hop Transmissions to Improve Physical Layer Security in Wireless Sensor Networks

Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5456 ◽  
Author(s):  
Kyusung Shim ◽  
Toan-Van Nguyen ◽  
Beongku An

This paper studies the secrecy performance of wireless power transfer (WPT)-based multi-hop transmissions in wireless sensors networks (WSNs), where legitimate nodes harvest energy from multiple power beacons (PBs) to support the multi-hop secure data transmission to a destination in the presence of an eavesdropper. Specifically, the PBs not only transfer radio frequency energy to the legitimate nodes but also act as friendly jammers to protect data transmission. To improve secrecy performance, we propose two secure scheduling schemes, named minimum node selection (MNS) scheme and optimal node selection (ONS) scheme. We then evaluate the performance of the proposed schemes in terms of the exact closed-form for secrecy outage probability (SOP) and asymptotic SOP. The developed analyses are verified by Monte-Carlo simulations. The numerical results show that the ONS scheme outperforms the MNS scheme emerging as an effective protocol for secure multi-hop transmission in WSNs. Furthermore, the effects of the number of PBs, number of hops, time switching ratio, and the secure target data rate on the system performance are also investigated.

In wireless data transmission, providing security over communication channels has become a growing concern. Traditionally cryptography is used to provide secrecy. However, physical layer studies show that it allows a huge potential in providing secrecy. In this paper, secrecy outage probability is derived for Rician fading channels. A new secrecy metric Generalized Secrecy Outage Probability(GSOP) derivation is considered to overcome the limitation of traditional Outage probability for both passive and active cases of eavesdropping.


2020 ◽  
Vol 2020 ◽  
pp. 1-11 ◽  
Author(s):  
Xiaohui Shang ◽  
Hao Yin ◽  
Aijun Liu ◽  
Mu Li ◽  
Yida Wang ◽  
...  

In this paper, we consider the secure green-oriented multiuser scheduling for the wireless-powered Internet of Things (IoT) scenario, in which multiple source sensors communicate with a controller assisted by an intermediate sensor with the existence of a passive tapping device. Due to the limited energy, all sensors must acquire energy from external power beacons (PBs). Specifically, for the security improvement, we introduce two multiuser scheduling schemes possessing the optimal PB chosen by the relay, i.e., the best source sensor is scheduled in a random way (BSR), while the best source sensor is decided by the best PB (BSBP). Furthermore, for every scheme, we derive the analytical expressions for the secrecy outage probability (SOP) and investigate the secure energy efficiency (SEE) optimization problem with constricted transmission power in PBs. Simulation results reveal that the BSBP scheme provides better secrecy performance, and elevating the PBs quantity or reducing both the ratio of distance from PBs to source users and the total communication distance to some extent is helpful for improving SEE. In addition, the time-switching factor shows an important effect upon secrecy performance of the considered system.


2018 ◽  
Vol 14 (1) ◽  
pp. 155014771875472 ◽  
Author(s):  
Dechuan Chen ◽  
Weiwei Yang ◽  
Jianwei Hu ◽  
Weifeng Mou ◽  
Yueming Cai

We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential information from the source. The secrecy outage probability and connection outage probability are respectively derived in closed-form to evaluate the security and reliability for three energy harvesting strategies, for example, time switching relaying strategy, power splitting relaying strategy, and ideal relaying receiver strategy. Subsequently, the effective secrecy throughput is conducted to characterize the overall efficiency, and the asymptotic analysis of the secrecy throughput is given to determine the optimal energy harvesting strategies in different operating regimes. Furthermore, in order to achieve the optimal effective secrecy throughput performance, a switching threshold between time switching relaying and power splitting relaying is designed. Numerical results verify the accuracy of the analytical expressions and reveal that the effective secrecy throughput of the system can be effectively promoted by the threshold switching energy harvesting strategy.


2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Yan Huo ◽  
Yuqi Tian ◽  
Chunqiang Hu ◽  
Qinghe Gao ◽  
Tao Jing

This paper aims to improve security performance of data transmission with a mobile eavesdropper in a wireless network. The instantaneous channel state information (CSI) of the mobile eavesdropper is unknown to legitimate users during the communication process. Different from existing work, we intend to reduce power consumption of friendly jamming signals. Motivated by the goal, this work presents a location-based prediction scheme to predict where the eavesdropper will be later and to decide whether a friendly jamming measure should be selected against the eavesdropper. The legitimate users only take the measure when the prediction result shows that there will be a risk during data transmission. According to the proposed method, system power can be saved to a large degree. Particularly, we first derive the expression of the secrecy outage probability and set a secrecy performance target. After providing a Markov mobile model of an eavesdropper, we design a prediction scheme to predict its location, so as to decide whether to employ cooperative jamming or not, and then design a power allocation scheme and a fast suboptimal helper selection method to achieve targeted and efficient cooperative jamming. Finally, numerical simulation results demonstrate the effectiveness of the proposed schemes.


2011 ◽  
Vol E94-B (11) ◽  
pp. 3172-3174 ◽  
Author(s):  
Takashi MARUYAMA ◽  
Tatsuya SHIMIZU ◽  
Mamoru AKIMOTO ◽  
Kazuki MARUTA

2021 ◽  
Vol 11 (3) ◽  
pp. 1235
Author(s):  
Su Min Yun ◽  
Moohyun Kim ◽  
Yong Won Kwon ◽  
Hyobeom Kim ◽  
Mi Jung Kim ◽  
...  

The development of wearable sensors is aimed at enabling continuous real-time health monitoring, which leads to timely and precise diagnosis anytime and anywhere. Unlike conventional wearable sensors that are somewhat bulky, rigid, and planar, research for next-generation wearable sensors has been focused on establishing fully-wearable systems. To attain such excellent wearability while providing accurate and reliable measurements, fabrication strategies should include (1) proper choices of materials and structural designs, (2) constructing efficient wireless power and data transmission systems, and (3) developing highly-integrated sensing systems. Herein, we discuss recent advances in wearable devices for non-invasive sensing, with focuses on materials design, nano/microfabrication, sensors, wireless technologies, and the integration of those.


Sign in / Sign up

Export Citation Format

Share Document