DOI QR코드

DOI QR Code

Secure Performance Analysis Based on Maximum Capacity

  • Zheng, Xiuping (School of Electronic Information and Engineering, Taiyuan University of Science and Technology) ;
  • Li, Meiling (School of Electronic Information and Engineering, Taiyuan University of Science and Technology) ;
  • Yang, Xiaoxia (School of Electronic Information and Engineering, Taiyuan University of Science and Technology)
  • 투고 : 2020.06.26
  • 심사 : 2020.09.20
  • 발행 : 2020.12.31

초록

The physical security layer of industrial wireless sensor networks in the event of an eavesdropping attack has been investigated in this paper. An optimal sensor selection scheme based on the maximum channel capacity is proposed for transmission environments that experience Nakagami fading. Comparing the intercept probabilities of the traditional round robin (TRR) and optimal sensor selection schemes, the system secure performance is analyzed. Simulation results show that the change in the number of sensors and the eavesdropping ratio affect the convergence rate of the intercept probability. Additionally, the proposed optimal selection scheme has a faster convergence rate compared to the TRR scheduling scheme for the same eavesdropping ratio and number of sensors. This observation is also valid when the Nakagami channel is simplified to a Rayleigh channel.

키워드

과제정보

This work was supported in part by the National Natural Science Foundation of China (No. 62001320), the Key Research and Development Program of Shanxi (No. 201903D121117), the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi (No. 201802090), Research Project Supported by Shanxi Scholarship Council of China (No. 2020-126), Graduate Education Innovation Project of Shanxi (No. 2020SY419).

참고문헌

  1. G. B. Satrya and S. Y. Shin, "Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks," Journal of King Saud University - Computer and Information Sciences, 2020. https://doi.org/10.1016/j.jksuci.2020.01.014
  2. A. Bagdadee, M. Hoque, and L. Zhang, "IoT based wireless sensor network for power quality control in smart grid," Procedia Computer Science, vol. 167, pp. 1148-1160, 2020. https://doi.org/10.1016/j.procs.2020.03.417
  3. D. Sun and S. Willmann, "Deep Learning-based dependability assessment method for industrial wireless network," IFAC-PapersOnLine, vol. 52, no. 24, pp. 219-224, 2019. https://doi.org/10.1016/j.ifacol.2019.12.411
  4. X. Li, D. Li, J. Wan, A. V. Vasilakos, C. F. Lai, and S. Wang, "A review of industrial wireless networks in the context of Industry 4.0," Wireless Networks, vol. 23, no. 1, pp. 23-41, 2017. https://doi.org/10.1007/s11276-015-1133-7
  5. M. Kumar, R. Tripathi, and S. Tiwari, "QoS guarantee towards reliability and timeliness in industrial wireless sensor networks," Multimedia Tools and Applications, vol. 77, no. 4, pp. 4491-4508, 2018. https://doi.org/10.1007/s11042-017-4832-5
  6. A. Khalil, A. Saadoui, M. Tabaa, M. Chehaitly, F. Moteiro, A. Oukaira, and A. Dandache, "Combined Reed-Solomon and convolutional codes for IWSN based on IDWPT/DWPT architecture," Procedia Computer Science, vol. 155, pp. 666-671, 2019. https://doi.org/10.1016/j.procs.2019.08.095
  7. Z. Liu, J. Wang, R. Sun, and Z. Wang, "Review on physical-layer security techniques of wireless communications," Communications Technology, vol. 47, no. 2, pp. 128-135, 2014. https://doi.org/10.3969/j.issn.1002-0802.2014.02.002
  8. Y. Zou, J. Zhu, X. Wang, and V. C. Leung, "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29, no. 1, pp. 42-48, 2015. https://doi.org/10.1109/MNET.2015.7018202
  9. Q. Lv, G. Han, and X. Fu, "Physical layer security in multi-hop AF relay network based on compressed sensing," IEEE Communications Letters, vol. 22, no. 9, pp. 1882-1885, 2018. https://doi.org/10.1109/lcomm.2018.2853101
  10. W. Zhao, Z. Chen, K. Li, B. Xia, and P. Chen, "Artificial interference aided physical layer security in cacheenabled heterogeneous networks," in Proceedings of 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 2018, pp. 1-5.
  11. G. Cherukuri, S. Sharma, S. D. Roy, and S. Kundu, "Secrecy outage probability of dual hop amplify and forward relay in presence of an eavesdropper," in Proceedings of 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2017, pp. 694-698.
  12. H. Lei, Z. Yang, K. Park, I. S. Ansari, Y. Cao, G. Pan, and M. S. Alouini, "Secrecy outage analysis for cooperative NOMA systems with relay selection scheme," IEEE Transactions on Communications, vol. 67, no. 9, pp. 6282-6298, 2019. https://doi.org/10.1109/tcomm.2019.2916070
  13. S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wiretap channel," IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, 1978. https://doi.org/10.1109/TIT.1978.1055917
  14. Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2653-2661, 2014. https://doi.org/10.1109/TVT.2013.2292903
  15. Y. Zou and G. Wang, "Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack," IEEE Transactions on Industrial Informatics, vol. 12, no. 2, pp. 780-787, 2016. https://doi.org/10.1109/TII.2015.2399691
  16. J. M. Moualeu, W. Hamouda, and F. Takawira, "Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference," IEEE Access, vol. 6, pp. 41490-41503, 2018. https://doi.org/10.1109/access.2018.2854222
  17. D. Lee and B. J. Jeong, "Performance analysis of combining space-time block coding and scheduling over arbitrary Nakagami fading channels" IEEE Transactions on Wireless Communications, vol. 13, no. 5, pp. 2540-2551, 2014. https://doi.org/10.1109/TWC.2014.031920.131810
  18. S. Hussain and X. N. Fernando, "Closed-form analysis of relay-based cognitive radio networks over Nakagami-m fading channels," IEEE Transactions on Vehicular Technology, vol. 63, no. 3, pp. 1193-1203, 2014. https://doi.org/10.1109/TVT.2013.2283078
  19. A. D. Wyner, "The wire-tap channel," Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  20. Y. Wang, T. Liao, and C. Wang, "An anti-eavesdrop transmission scheduling scheme based on maximizing secrecy outage probability in ad hoc networks," China Communications, vol. 13, no. 1, pp. 176-184, 2016. https://doi.org/10.1109/CC.2016.7405714