| Literature DB >> 31941050 |
Tao Li1, Chaozheng Xue1, Yongzhao Li1, Octavia A Dobre2.
Abstract
The security problem in wireless sensor networks faces severe challenges, due to the openness of the sensor network channel and the mobility and diversity of the terminals. When facing randomly located eavesdroppers, the situation is much more complex. This paper studies the security performance of a wireless sensor network where randomly located passive and active eavesdroppers are both considered. Compared to a passive eavesdropper, an active eavesdropper can perform both eavesdropping and malicious jamming simultaneously in a wireless sensor network. Based on beamforming and artificial noise (AN), we propose a practical way to defend against the eavesdropper by establishing a protecting region. An appropriate metric, the hybrid outage probability, which takes both the transmission outage probability and the secrecy outage probability into consideration, is utilized to evaluate the security performance. In addition, the concept of safe transmission range is defined to evaluate the security performance. Simulation results are provided to depict the insecure region and verify the harm of the active eavesdropper to the transmission in the wireless sensor network.Entities:
Keywords: eavesdropper; insecure region; outage probability; physical layer security
Year: 2020 PMID: 31941050 PMCID: PMC7013809 DOI: 10.3390/s20020438
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1System model.
Figure 2Safe transmission range.
Simulation Parameters.
| Parameters | Values |
|---|---|
| Number of antennas in Alice | 4 |
| Distance between Alice and Bob | 100 m |
| Total transmission power | 10 W |
| Power allocation factor | 0.1 |
| Jamming signal power | 15 dBm |
| Secrecy transmission rate | 0.3 bps/Hz |
| Threshold | 0.2 |
| Path loss exponent | 2 |
| Linear residual coefficient |
|
Figure 3Insecure region with dBm, and .
Figure 4Insecure region with dBm, and .
Figure 5Insecure region with dBm, and .
Figure 6Insecure region with dBm, and .
Figure 7Insecure region with passive Eve and and .
Figure 8The influence of on the outage probability.
Figure 9The influence of on the outage probability.
Figure 10The influence of , , and on the hybrid outage probability .
Figure 11The influence of and on .