Reference : Performance Enhancement for Multihop Harvest-to-Transmit WSNs With Path-Selection Met... |
Scientific journals : Article | |||
Engineering, computing & technology : Computer science | |||
Computational Sciences | |||
http://hdl.handle.net/10993/44642 | |||
Performance Enhancement for Multihop Harvest-to-Transmit WSNs With Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises | |
English | |
Tran Dinh, Hieu ![]() | |
Tran, Trung Duy ![]() | |
Kim, Bung-Seo ![]() | |
15-Jun-2018 | |
IEEE Sensors Journal | |
Institute of Electrical and Electronics Engineers | |
18 | |
12 | |
5173-5186 | |
Yes (verified by ORBilu) | |
International | |
1530-437X | |
1558-1748 | |
New York | |
NY | |
[en] Energy harvesting ; Power beacon ; wireless sensor networks (WSNs) ; physical-layer security ; randomize-and-forward (RF) ; multi-hop multi-path networks ; path selection ; hardware impairments ; outage probability | |
[en] Energy-harvesting-based physical layer security
(PLS) has become a promising technique, as it not only secures information from eavesdropping without upper layer data encryption, but it also improves the energy efficiency of wireless networks. However, it imposes new challenges, as adversary parties can overhear the transmission of confidential information between the source and destination via a relay. Therefore, the transmit power of the signals must be large enough for energy harvesting, but it must also be small enough to avoid eavesdropping. This is even more challenging with multi-hop multi-path wireless networks. Motivated by these observations, this paper proposes three innovative protocols, namely, the shortest path selection (SPS) protocol, random path selection (RPS) protocol, and best path selection (BPS) protocol. These will enhance the security of multi-hop multi-path randomize-and-forward (RF) cooperative wireless sensor networks (WSNs) under the presence of eavesdroppers and hardware impairment, wherein the source node and relay nodes are capable of harvesting energy from beacon for data transmission. Furthermore, we derive exact closed-form expressions and the asymptotic outage probability for each protocol under multiple eavesdropping attacks. The simulation results validate the theoretical results. | |
Hongik University | |
Researchers ; Professionals ; Students ; General public | |
http://hdl.handle.net/10993/44642 | |
10.1109/JSEN.2018.2829145 |
File(s) associated to this reference | ||||||||||||||
Fulltext file(s):
| ||||||||||||||
All documents in ORBilu are protected by a user license.