Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
-
Altmetric Citations
Yang, Maoqiang; Zhang, Bangning; Huang, Yuzhen; Yang, Nan; Guo, Daoxing; Gao, Bin
Description
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS)...[Show more]
dc.contributor.author | Yang, Maoqiang | |
---|---|---|
dc.contributor.author | Zhang, Bangning | |
dc.contributor.author | Huang, Yuzhen | |
dc.contributor.author | Yang, Nan | |
dc.contributor.author | Guo, Daoxing | |
dc.contributor.author | Gao, Bin | |
dc.date.accessioned | 2018-08-14T01:34:51Z | |
dc.date.available | 2018-08-14T01:34:51Z | |
dc.identifier.issn | 1424-8220 | |
dc.identifier.uri | http://hdl.handle.net/1885/146296 | |
dc.description.abstract | In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance. | |
dc.description.sponsorship | This work was supported by the National Science Foundation of China (No. 61501507), and the Jiangsu Provincial Natural Science Foundation of China (No. BK20150719). The work of Nan Yang is supported by the Australian Research Council Discovery Project (DP150103905). | |
dc.format | 16 pages | |
dc.format.mimetype | application/pdf | |
dc.publisher | MDPI | |
dc.rights | © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/deed.ast | |
dc.source | Sensors (Basel, Switzerland) | |
dc.subject | cooperative jamming | |
dc.subject | effective secrecy throughput | |
dc.subject | multiuser scheduling | |
dc.subject | physical layer security | |
dc.subject | secrecy outage probability | |
dc.subject | transmit antenna selection | |
dc.subject | wireless sensor networks | |
dc.title | Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming | |
dc.type | Journal article | |
local.identifier.citationvolume | 16 | |
dcterms.dateAccepted | 2016-11-08 | |
dc.date.issued | 2016-11-12 | |
local.identifier.ariespublication | u5357342xPUB246 | |
local.publisher.url | http://www.mdpi.com/ | |
local.type.status | Published Version | |
local.contributor.affiliation | Yang, Nan, Research School of Engineering, College of Engineering and Computer Science, The Australian National University | |
dc.relation | http://purl.org/au-research/grants/arc/DP150103905 | |
local.identifier.essn | 1424-8220 | |
local.bibliographicCitation.issue | 11 | |
local.bibliographicCitation.startpage | 1908 | |
local.identifier.doi | 10.3390/s16111908 | |
dcterms.accessRights | Open Access | |
Collections | ANU Research Publications |
Download
File | Description | Size | Format | Image |
---|---|---|---|---|
01 Yang M et al Secure multiuser communications 2016.pdf | 251.31 kB | Adobe PDF |
This item is licensed under a Creative Commons License
Updated: 17 November 2022/ Responsible Officer: University Librarian/ Page Contact: Library Systems & Web Coordinator