Cargando…
Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †
Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the le...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490782/ https://www.ncbi.nlm.nih.gov/pubmed/37688109 http://dx.doi.org/10.3390/s23177653 |
_version_ | 1785103920568205312 |
---|---|
author | Triwidyastuti, Yosefine Perdana, Ridho Hendra Yoga Shim, Kyusung An, Beongku |
author_facet | Triwidyastuti, Yosefine Perdana, Ridho Hendra Yoga Shim, Kyusung An, Beongku |
author_sort | Triwidyastuti, Yosefine |
collection | PubMed |
description | Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the legitimate users’ transmission. Thus, in this paper, we study the secrecy performance of a multihop transmission under various eavesdropping attacks for WSNs. To improve the secrecy performance, we propose two node selection schemes in each cluster, namely, minimum node selection (MNS) and optimal node selection (ONS) schemes. To exploit the impact of the network parameters on the secrecy performance, we derive the closed-form expression of the secrecy outage probability (SOP) under different eavesdropping attacks. From the numerical results, the ONS scheme shows the most robust secrecy performance compared with the other schemes. However, the ONS scheme requires a lot of channel information to select the node in each cluster and transmit information. On the other side, the MNS scheme can reduce the amount of channel information compared with the ONS scheme, while the MNS scheme still provides secure transmission. In addition, the impact of the network parameters on the secrecy performance is also insightfully discussed in this paper. Moreover, we evaluate the trade-off of the proposed schemes between secrecy performance and computational complexity. |
format | Online Article Text |
id | pubmed-10490782 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-104907822023-09-09 Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks † Triwidyastuti, Yosefine Perdana, Ridho Hendra Yoga Shim, Kyusung An, Beongku Sensors (Basel) Article Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the legitimate users’ transmission. Thus, in this paper, we study the secrecy performance of a multihop transmission under various eavesdropping attacks for WSNs. To improve the secrecy performance, we propose two node selection schemes in each cluster, namely, minimum node selection (MNS) and optimal node selection (ONS) schemes. To exploit the impact of the network parameters on the secrecy performance, we derive the closed-form expression of the secrecy outage probability (SOP) under different eavesdropping attacks. From the numerical results, the ONS scheme shows the most robust secrecy performance compared with the other schemes. However, the ONS scheme requires a lot of channel information to select the node in each cluster and transmit information. On the other side, the MNS scheme can reduce the amount of channel information compared with the ONS scheme, while the MNS scheme still provides secure transmission. In addition, the impact of the network parameters on the secrecy performance is also insightfully discussed in this paper. Moreover, we evaluate the trade-off of the proposed schemes between secrecy performance and computational complexity. MDPI 2023-09-04 /pmc/articles/PMC10490782/ /pubmed/37688109 http://dx.doi.org/10.3390/s23177653 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Triwidyastuti, Yosefine Perdana, Ridho Hendra Yoga Shim, Kyusung An, Beongku Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks † |
title | Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks † |
title_full | Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks † |
title_fullStr | Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks † |
title_full_unstemmed | Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks † |
title_short | Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks † |
title_sort | secrecy performance analysis of cooperative multihop transmission for wsns under eavesdropping attacks † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490782/ https://www.ncbi.nlm.nih.gov/pubmed/37688109 http://dx.doi.org/10.3390/s23177653 |
work_keys_str_mv | AT triwidyastutiyosefine secrecyperformanceanalysisofcooperativemultihoptransmissionforwsnsundereavesdroppingattacks AT perdanaridhohendrayoga secrecyperformanceanalysisofcooperativemultihoptransmissionforwsnsundereavesdroppingattacks AT shimkyusung secrecyperformanceanalysisofcooperativemultihoptransmissionforwsnsundereavesdroppingattacks AT anbeongku secrecyperformanceanalysisofcooperativemultihoptransmissionforwsnsundereavesdroppingattacks |