Skip navigation
Skip navigation

Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

Yang, Maoqiang; Zhang, Bangning; Huang, Yuzhen; Yang, Nan; Guo, Daoxing; Gao, Bin

Description

In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS)...[Show more]

dc.contributor.authorYang, Maoqiang
dc.contributor.authorZhang, Bangning
dc.contributor.authorHuang, Yuzhen
dc.contributor.authorYang, Nan
dc.contributor.authorGuo, Daoxing
dc.contributor.authorGao, Bin
dc.date.accessioned2018-08-14T01:34:51Z
dc.date.available2018-08-14T01:34:51Z
dc.identifier.issn1424-8220
dc.identifier.urihttp://hdl.handle.net/1885/146296
dc.description.abstractIn this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.
dc.description.sponsorshipThis work was supported by the National Science Foundation of China (No. 61501507), and the Jiangsu Provincial Natural Science Foundation of China (No. BK20150719). The work of Nan Yang is supported by the Australian Research Council Discovery Project (DP150103905).
dc.format16 pages
dc.format.mimetypeapplication/pdf
dc.publisherMDPI
dc.rights© 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/deed.ast
dc.sourceSensors (Basel, Switzerland)
dc.subjectcooperative jamming
dc.subjecteffective secrecy throughput
dc.subjectmultiuser scheduling
dc.subjectphysical layer security
dc.subjectsecrecy outage probability
dc.subjecttransmit antenna selection
dc.subjectwireless sensor networks
dc.titleSecure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
dc.typeJournal article
local.identifier.citationvolume16
dcterms.dateAccepted2016-11-08
dc.date.issued2016-11-12
local.identifier.ariespublicationu5357342xPUB246
local.publisher.urlhttp://www.mdpi.com/
local.type.statusPublished Version
local.contributor.affiliationYang, Nan, Research School of Engineering, College of Engineering and Computer Science, The Australian National University
dc.relationhttp://purl.org/au-research/grants/arc/DP150103905
local.identifier.essn1424-8220
local.bibliographicCitation.issue11
local.bibliographicCitation.startpage1908
local.identifier.doi10.3390/s16111908
dcterms.accessRightsOpen Access
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01 Yang M et al Secure multiuser communications 2016.pdf251.31 kBAdobe PDFThumbnail


This item is licensed under a Creative Commons License Creative Commons

Updated:  17 November 2022/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator