Exploiting Opportunistic Scheduling Schemes and WPT-Based Multi-Hop Transmissions to Improve Physical Layer Security in Wireless Sensor Networks

This paper studies the secrecy performance of wireless power transfer (WPT)-based multi-hop transmissions in wireless sensors networks (WSNs), where legitimate nodes harvest energy from multiple power beacons (PBs) to support the multi-hop secure data transmission to a destination in the presence of an eavesdropper. Specifically, the PBs not only transfer radio frequency energy to the legitimate nodes but also act as friendly jammers to protect data transmission. To improve secrecy performance, we propose two secure scheduling schemes, named minimum node selection (MNS) scheme and optimal node selection (ONS) scheme. We then evaluate the performance of the proposed schemes in terms of the exact closed-form for secrecy outage probability (SOP) and asymptotic SOP. The developed analyses are verified by Monte-Carlo simulations. The numerical results show that the ONS scheme outperforms the MNS scheme emerging as an effective protocol for secure multi-hop transmission in WSNs. Furthermore, the effects of the number of PBs, number of hops, time switching ratio, and the secure target data rate on the system performance are also investigated.

[1]  Beongku An,et al.  Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).

[2]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[3]  Zhiguo Ding,et al.  3-D Hybrid VLC-RF Indoor IoT Systems With Light Energy Harvesting , 2019, IEEE Transactions on Green Communications and Networking.

[4]  Lin Dai,et al.  Routing Strategies in Multihop Cooperative Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[5]  Caijun Zhong,et al.  Wireless-Powered Communications: Performance Analysis and Optimization , 2015, IEEE Transactions on Communications.

[6]  Dongwoo Kim,et al.  Performance analysis with and without torch node in secure communications , 2015, 2015 International Conference on Advanced Technologies for Communications (ATC).

[7]  Yindi Jing,et al.  Physical-Layer Security in Full-Duplex Multi-Hop Multi-User Wireless Network With Relay Selection , 2019, IEEE Transactions on Wireless Communications.

[8]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[9]  Zhiguo Ding,et al.  Performance Analysis and Optimization for SWIPT Wireless Sensor Networks , 2017, IEEE Transactions on Communications.

[10]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[11]  Tran Trung Duy,et al.  Security enhancement for dual-hop RF protocols with Nth-best partial relay and EH-based jammer , 2015, 2015 International Conference on Communications, Management and Telecommunications (ComManTel).

[12]  Hee Yong Youn,et al.  A Novel Cluster Head Selection Method based on K-Means Algorithm for Energy Efficient Wireless Sensor Network , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[13]  Daniel Benevides da Costa,et al.  A New Efficient Low-Complexity Scheme for Multi-Source Multi-Relay Cooperative Networks , 2011, IEEE Transactions on Vehicular Technology.

[14]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[15]  Gaofeng Pan,et al.  Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.

[16]  Beongku An,et al.  Outage Performance Analysis of Relay Selection Schemes in Wireless Energy Harvesting Cooperative Networks over Non-Identical Rayleigh Fading Channels † , 2016, Sensors.

[17]  Yunyoung Nam,et al.  Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges , 2019, Wirel. Commun. Mob. Comput..

[18]  Dac-Binh Ha,et al.  Physical Layer Secrecy Performance of Multi-hop Decode-and-Forward Relay Networks with Multiple Eavesdroppers , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[19]  Yiwei Thomas Hou,et al.  Wireless power transfer and applications to sensor networks , 2013, IEEE Wireless Communications.

[20]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[21]  Beongku An,et al.  Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks , 2018, Wirel. Commun. Mob. Comput..

[22]  H Vincent Poor,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[23]  Phu Tran Tin,et al.  Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments , 2019, Entropy.

[24]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[25]  Tran Trung Duy,et al.  Exact outage analysis of energy-harvesting multihop cluster-based networks with multiple power beacons over Nakagami-m fading channels , 2018, 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom).

[26]  George K. Karagiannidis,et al.  Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.

[27]  William Lumpkins,et al.  Nikola Tesla's Dream Realized: Wireless power energy harvesting. , 2014, IEEE Consumer Electronics Magazine.

[28]  Tran Dinh Hieu,et al.  Performance Enhancement for Multihop Harvest-to-Transmit WSNs With Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises , 2018, IEEE Sensors Journal.

[29]  M. Soljačić,et al.  Wireless Power Transfer via Strongly Coupled Magnetic Resonances , 2007, Science.

[30]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[31]  Beongku An,et al.  Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks , 2017, Sensors.

[32]  Tran Trung Duy,et al.  Exact outage probability of energy harvesting incremental relaying networks with MRC receiver , 2016, 2016 International Conference on Advanced Technologies for Communications (ATC).

[33]  Nuwan S. Ferdinand,et al.  Secrecy Outage Performance of MIMO Wiretap Channels with Multiple Jamming Signals , 2016 .

[34]  Beongku An,et al.  Performance Analysis of Wireless Energy Harvesting Multihop Cluster-Based Networks Over Nakagami- ${m}$ Fading Channels , 2018, IEEE Access.

[35]  Hongbo Jiang,et al.  Enabling Relay-Assisted D2D Communication for Cellular Networks: Algorithm and Protocols , 2018, IEEE Internet of Things Journal.

[36]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[37]  Pei Liu,et al.  Cooperative wireless communications: a cross-layer approach , 2006, IEEE Wireless Communications.

[38]  Trung Q. Duong,et al.  Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.

[39]  Mubashir Husain Rehmani,et al.  Applications of wireless sensor networks for urban areas: A survey , 2016, J. Netw. Comput. Appl..

[40]  Tran Trung Duy,et al.  Secrecy Performance Analysis of Multihop Transmission Protocols in Cluster Networks , 2015, Wirel. Pers. Commun..

[41]  Daniel Benevides da Costa,et al.  Exploiting Direct Links in Multiuser Multirelay SWIPT Cooperative Networks With Opportunistic Scheduling , 2017, IEEE Transactions on Wireless Communications.

[42]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[43]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.