Cargando…

Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †

Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the le...

Descripción completa

Detalles Bibliográficos
Autores principales: Triwidyastuti, Yosefine, Perdana, Ridho Hendra Yoga, Shim, Kyusung, An, Beongku
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490782/
https://www.ncbi.nlm.nih.gov/pubmed/37688109
http://dx.doi.org/10.3390/s23177653
_version_ 1785103920568205312
author Triwidyastuti, Yosefine
Perdana, Ridho Hendra Yoga
Shim, Kyusung
An, Beongku
author_facet Triwidyastuti, Yosefine
Perdana, Ridho Hendra Yoga
Shim, Kyusung
An, Beongku
author_sort Triwidyastuti, Yosefine
collection PubMed
description Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the legitimate users’ transmission. Thus, in this paper, we study the secrecy performance of a multihop transmission under various eavesdropping attacks for WSNs. To improve the secrecy performance, we propose two node selection schemes in each cluster, namely, minimum node selection (MNS) and optimal node selection (ONS) schemes. To exploit the impact of the network parameters on the secrecy performance, we derive the closed-form expression of the secrecy outage probability (SOP) under different eavesdropping attacks. From the numerical results, the ONS scheme shows the most robust secrecy performance compared with the other schemes. However, the ONS scheme requires a lot of channel information to select the node in each cluster and transmit information. On the other side, the MNS scheme can reduce the amount of channel information compared with the ONS scheme, while the MNS scheme still provides secure transmission. In addition, the impact of the network parameters on the secrecy performance is also insightfully discussed in this paper. Moreover, we evaluate the trade-off of the proposed schemes between secrecy performance and computational complexity.
format Online
Article
Text
id pubmed-10490782
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-104907822023-09-09 Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks † Triwidyastuti, Yosefine Perdana, Ridho Hendra Yoga Shim, Kyusung An, Beongku Sensors (Basel) Article Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the legitimate users’ transmission. Thus, in this paper, we study the secrecy performance of a multihop transmission under various eavesdropping attacks for WSNs. To improve the secrecy performance, we propose two node selection schemes in each cluster, namely, minimum node selection (MNS) and optimal node selection (ONS) schemes. To exploit the impact of the network parameters on the secrecy performance, we derive the closed-form expression of the secrecy outage probability (SOP) under different eavesdropping attacks. From the numerical results, the ONS scheme shows the most robust secrecy performance compared with the other schemes. However, the ONS scheme requires a lot of channel information to select the node in each cluster and transmit information. On the other side, the MNS scheme can reduce the amount of channel information compared with the ONS scheme, while the MNS scheme still provides secure transmission. In addition, the impact of the network parameters on the secrecy performance is also insightfully discussed in this paper. Moreover, we evaluate the trade-off of the proposed schemes between secrecy performance and computational complexity. MDPI 2023-09-04 /pmc/articles/PMC10490782/ /pubmed/37688109 http://dx.doi.org/10.3390/s23177653 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Triwidyastuti, Yosefine
Perdana, Ridho Hendra Yoga
Shim, Kyusung
An, Beongku
Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †
title Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †
title_full Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †
title_fullStr Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †
title_full_unstemmed Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †
title_short Secrecy Performance Analysis of Cooperative Multihop Transmission for WSNs under Eavesdropping Attacks †
title_sort secrecy performance analysis of cooperative multihop transmission for wsns under eavesdropping attacks †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490782/
https://www.ncbi.nlm.nih.gov/pubmed/37688109
http://dx.doi.org/10.3390/s23177653
work_keys_str_mv AT triwidyastutiyosefine secrecyperformanceanalysisofcooperativemultihoptransmissionforwsnsundereavesdroppingattacks
AT perdanaridhohendrayoga secrecyperformanceanalysisofcooperativemultihoptransmissionforwsnsundereavesdroppingattacks
AT shimkyusung secrecyperformanceanalysisofcooperativemultihoptransmissionforwsnsundereavesdroppingattacks
AT anbeongku secrecyperformanceanalysisofcooperativemultihoptransmissionforwsnsundereavesdroppingattacks