Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling...

Full description

Bibliographic Details
Main Authors: Maoqiang Yang, Bangning Zhang, Yuzhen Huang, Nan Yang, Daoxing Guo, Bin Gao
Format: Article
Language:English
Published: MDPI AG 2016-11-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/16/11/1908
_version_ 1811303924653621248
author Maoqiang Yang
Bangning Zhang
Yuzhen Huang
Nan Yang
Daoxing Guo
Bin Gao
author_facet Maoqiang Yang
Bangning Zhang
Yuzhen Huang
Nan Yang
Daoxing Guo
Bin Gao
author_sort Maoqiang Yang
collection DOAJ
description In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.
first_indexed 2024-04-13T07:56:40Z
format Article
id doaj.art-3b6f06759b4d42c1a1aae2eae180b65c
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-13T07:56:40Z
publishDate 2016-11-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-3b6f06759b4d42c1a1aae2eae180b65c2022-12-22T02:55:23ZengMDPI AGSensors1424-82202016-11-011611190810.3390/s16111908s16111908Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative JammingMaoqiang Yang0Bangning Zhang1Yuzhen Huang2Nan Yang3Daoxing Guo4Bin Gao5College of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaCollege of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaCollege of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaResearch School of Engineering, Australian National University, Canberra, ACT 2601, AustraliaCollege of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaCollege of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, ChinaIn this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.http://www.mdpi.com/1424-8220/16/11/1908wireless sensor networksphysical layer securitymultiuser schedulingtransmit antenna selectioncooperative jammingsecrecy outage probabilityeffective secrecy throughput
spellingShingle Maoqiang Yang
Bangning Zhang
Yuzhen Huang
Nan Yang
Daoxing Guo
Bin Gao
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
Sensors
wireless sensor networks
physical layer security
multiuser scheduling
transmit antenna selection
cooperative jamming
secrecy outage probability
effective secrecy throughput
title Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
title_full Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
title_fullStr Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
title_full_unstemmed Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
title_short Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
title_sort secure multiuser communications in wireless sensor networks with tas and cooperative jamming
topic wireless sensor networks
physical layer security
multiuser scheduling
transmit antenna selection
cooperative jamming
secrecy outage probability
effective secrecy throughput
url http://www.mdpi.com/1424-8220/16/11/1908
work_keys_str_mv AT maoqiangyang securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming
AT bangningzhang securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming
AT yuzhenhuang securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming
AT nanyang securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming
AT daoxingguo securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming
AT bingao securemultiusercommunicationsinwirelesssensornetworkswithtasandcooperativejamming