| Literature DB >> 27886154 |
Xuran Li1, Hong-Ning Dai2, Hao Wang3, Hong Xiao4.
Abstract
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.Entities:
Keywords: analysis; friendly jamming; security; wireless sensor networks
Year: 2016 PMID: 27886154 PMCID: PMC5190968 DOI: 10.3390/s16121987
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Comparison of related anti-eavesdropping schemes in WSNs.
| Encryption | Artificial Noise | Power Control | |
|---|---|---|---|
| References | [ | [ | [ |
| Limitations | computational intensive and power consuming | too specific (only apply for some specific scenarios) | deteriorate legitimate communications |
Figure 1FJ-Reg Scheme: every jammer is placed at a gray square. Note that we only show a part of the whole network.
Figure 2FJ-Ran Scheme: every jammer is randomly placed according to homogeneous Poisson Point Process (PPP). Note that we only show a part of the whole network.
Figure 3Probability of eavesdropping attacks with FJ-Ran scheme (PPP) versus Non-Jam scheme when with SINR threshold T ranging from to .
Figure 4Probability of eavesdropping attacks with FJ-Reg scheme (Grid) versus Non-Jam scheme when with SINR threshold T ranging from to .
Figure 5Probability of eavesdropping attacks with FJ-PC scheme versus Non-Jam scheme when with SINR threshold T ranging from to .
Eavesdropping deviation and transmission deviation of comparing FJ-Ran scheme with Non-Jam scheme when and .
| Density | Eavesdropping deviation | Transmission deviation |
|---|---|---|
| 0.2 | 0.1120 | 0.0303 |
| 0.8 | 0.3316 | 0.0718 |
| 1.4 | 0.4470 | 0.0880 |
| 2.0 | 0.5178 | 0.0963 |
Eavesdropping deviation and transmission deviation of comparing FJ-Reg scheme with Non-Jam scheme when and .
| Distance d | Eavesdropping deviation | Transmission deviation |
|---|---|---|
| 0.2 | 0.6650 | 0.1143 |
| 0.4 | 0.5195 | 0.0977 |
| 0.6 | 0.3467 | 0.0742 |
| 0.8 | 0.2054 | 0.0500 |
Eavesdropping deviation and transmission deviation of comparing FJ-PC scheme with Non-Jam scheme when , and .
| Distance d | Eavesdropping deviation | Transmission deviation |
|---|---|---|
| 0.4 | 0.4909 | 0.0594 |
| 0.5 | 0.4358 | 0.0362 |
| 0.6 | 0.3788 | 0.0217 |
| 0.7 | 0.3234 | 0.0132 |