Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0151

Secure Performance Analysis Based on Maximum Capacity  

Zheng, Xiuping (School of Electronic Information and Engineering, Taiyuan University of Science and Technology)
Li, Meiling (School of Electronic Information and Engineering, Taiyuan University of Science and Technology)
Yang, Xiaoxia (School of Electronic Information and Engineering, Taiyuan University of Science and Technology)
Publication Information
Journal of Information Processing Systems / v.16, no.6, 2020 , pp. 1261-1270 More about this Journal
Abstract
The physical security layer of industrial wireless sensor networks in the event of an eavesdropping attack has been investigated in this paper. An optimal sensor selection scheme based on the maximum channel capacity is proposed for transmission environments that experience Nakagami fading. Comparing the intercept probabilities of the traditional round robin (TRR) and optimal sensor selection schemes, the system secure performance is analyzed. Simulation results show that the change in the number of sensors and the eavesdropping ratio affect the convergence rate of the intercept probability. Additionally, the proposed optimal selection scheme has a faster convergence rate compared to the TRR scheduling scheme for the same eavesdropping ratio and number of sensors. This observation is also valid when the Nakagami channel is simplified to a Rayleigh channel.
Keywords
Intercept Probability; Maximum Capacity; Nakagami Channel; Physical Layer; Safety Performance;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. B. Satrya and S. Y. Shin, "Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks," Journal of King Saud University - Computer and Information Sciences, 2020. https://doi.org/10.1016/j.jksuci.2020.01.014   DOI
2 A. Bagdadee, M. Hoque, and L. Zhang, "IoT based wireless sensor network for power quality control in smart grid," Procedia Computer Science, vol. 167, pp. 1148-1160, 2020.   DOI
3 D. Sun and S. Willmann, "Deep Learning-based dependability assessment method for industrial wireless network," IFAC-PapersOnLine, vol. 52, no. 24, pp. 219-224, 2019.   DOI
4 X. Li, D. Li, J. Wan, A. V. Vasilakos, C. F. Lai, and S. Wang, "A review of industrial wireless networks in the context of Industry 4.0," Wireless Networks, vol. 23, no. 1, pp. 23-41, 2017.   DOI
5 M. Kumar, R. Tripathi, and S. Tiwari, "QoS guarantee towards reliability and timeliness in industrial wireless sensor networks," Multimedia Tools and Applications, vol. 77, no. 4, pp. 4491-4508, 2018.   DOI
6 A. Khalil, A. Saadoui, M. Tabaa, M. Chehaitly, F. Moteiro, A. Oukaira, and A. Dandache, "Combined Reed-Solomon and convolutional codes for IWSN based on IDWPT/DWPT architecture," Procedia Computer Science, vol. 155, pp. 666-671, 2019.   DOI
7 Z. Liu, J. Wang, R. Sun, and Z. Wang, "Review on physical-layer security techniques of wireless communications," Communications Technology, vol. 47, no. 2, pp. 128-135, 2014.   DOI
8 Y. Zou, J. Zhu, X. Wang, and V. C. Leung, "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, 2015.   DOI
9 Q. Lv, G. Han, and X. Fu, "Physical layer security in multi-hop AF relay network based on compressed sensing," IEEE Communications Letters, vol. 22, no. 9, pp. 1882-1885, 2018.   DOI
10 W. Zhao, Z. Chen, K. Li, B. Xia, and P. Chen, "Artificial interference aided physical layer security in cacheenabled heterogeneous networks," in Proceedings of 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 2018, pp. 1-5.
11 G. Cherukuri, S. Sharma, S. D. Roy, and S. Kundu, "Secrecy outage probability of dual hop amplify and forward relay in presence of an eavesdropper," in Proceedings of 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2017, pp. 694-698.
12 H. Lei, Z. Yang, K. Park, I. S. Ansari, Y. Cao, G. Pan, and M. S. Alouini, "Secrecy outage analysis for cooperative NOMA systems with relay selection scheme," IEEE Transactions on Communications, vol. 67, no. 9, pp. 6282-6298, 2019.   DOI
13 S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wiretap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, 1978.   DOI
14 Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2653-2661, 2014.   DOI
15 Y. Wang, T. Liao, and C. Wang, "An anti-eavesdrop transmission scheduling scheme based on maximizing secrecy outage probability in ad hoc networks," China Communications, vol. 13, no. 1, pp. 176-184, 2016.   DOI
16 Y. Zou and G. Wang, "Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack," IEEE Transactions on Industrial Informatics, vol. 12, no. 2, pp. 780-787, 2016.   DOI
17 J. M. Moualeu, W. Hamouda, and F. Takawira, "Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference," IEEE Access, vol. 6, pp. 41490-41503, 2018.   DOI
18 D. Lee and B. J. Jeong, "Performance analysis of combining space-time block coding and scheduling over arbitrary Nakagami fading channels" IEEE Transactions on Wireless Communications, vol. 13, no. 5, pp. 2540-2551, 2014.   DOI
19 S. Hussain and X. N. Fernando, "Closed-form analysis of relay-based cognitive radio networks over Nakagami-m fading channels," IEEE Transactions on Vehicular Technology, vol. 63, no. 3, pp. 1193-1203, 2014.   DOI
20 A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.   DOI