| Literature DB >> 27845753 |
Maoqiang Yang1, Bangning Zhang2, Yuzhen Huang3, Nan Yang4, Daoxing Guo5, Bin Gao6.
Abstract
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.Entities:
Keywords: cooperative jamming; effective secrecy throughput; multiuser scheduling; physical layer security; secrecy outage probability; transmit antenna selection; wireless sensor networks
Year: 2016 PMID: 27845753 PMCID: PMC5134567 DOI: 10.3390/s16111908
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1System model.
Figure 2Secrecy outage probability versus different for , dB, , and .
Figure 3Secrecy outage probability versus different for dB, , dBW, and .
Figure 4Secrecy outage probability versus different for , , dB, and .
Figure 5Secrecy outage probability versus different for dB, , and dB.
Figure 6Effective secrecy throughput versus different for , dB, , , and .
Figure 7Effective secrecy throughput versus different for , dB, , dBW, and .