Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2016-11-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/16/11/1908 |
_version_ | 1811303924653621248 |
---|---|
author | Maoqiang Yang Bangning Zhang Yuzhen Huang Nan Yang Daoxing Guo Bin Gao |
author_facet | Maoqiang Yang Bangning Zhang Yuzhen Huang Nan Yang Daoxing Guo Bin Gao |
author_sort | Maoqiang Yang |
collection | DOAJ |
description | In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance. |
first_indexed | 2024-04-13T07:56:40Z |
format | Article |
id | doaj.art-3b6f06759b4d42c1a1aae2eae180b65c |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-13T07:56:40Z |
publishDate | 2016-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-3b6f06759b4d42c1a1aae2eae180b65c2022-12-22T02:55:23ZengMDPI AGSensors1424-82202016-11-011611190810.3390/s16111908s16111908Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative JammingMaoqiang Yang0Bangning Zhang1Yuzhen Huang2Nan Yang3Daoxing Guo4Bin Gao5College of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaCollege of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaCollege of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaResearch School of Engineering, Australian National University, Canberra, ACT 2601, AustraliaCollege of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaCollege of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaIn this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.http://www.mdpi.com/1424-8220/16/11/1908wireless sensor networksphysical layer securitymultiuser schedulingtransmit antenna selectioncooperative jammingsecrecy outage probabilityeffective secrecy throughput |
spellingShingle | Maoqiang Yang Bangning Zhang Yuzhen Huang Nan Yang Daoxing Guo Bin Gao Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming Sensors wireless sensor networks physical layer security multiuser scheduling transmit antenna selection cooperative jamming secrecy outage probability effective secrecy throughput |
title | Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming |
title_full | Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming |
title_fullStr | Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming |
title_full_unstemmed | Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming |
title_short | Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming |
title_sort | secure multiuser communications in wireless sensor networks with tas and cooperative jamming |
topic | wireless sensor networks physical layer security multiuser scheduling transmit antenna selection cooperative jamming secrecy outage probability effective secrecy throughput |
url | http://www.mdpi.com/1424-8220/16/11/1908 |
work_keys_str_mv | AT maoqiangyang securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming AT bangningzhang securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming AT yuzhenhuang securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming AT nanyang securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming AT daoxingguo securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming AT bingao securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming |