Skip to main content
Top

2021 | OriginalPaper | Chapter

Adaptability Against Eavesdropping Attack in WSN: Co-Operative Beamforming and Relays Approach

Authors : Somu P. Parande, Jayashree D. Mallapur

Published in: Computer Networks and Inventive Communication Technologies

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security is the major concern in wireless sensor networks. To reduce security threats in WSNs physical layer, each node could be designed with an antenna which forms a MIMO communication system. This research work proposed a novel and effective solution to enhance the security of WSN. The sensor node at the transmitter side are used to transmit the beamforming signal to the receiver while few nodes are used to create artificial noise to jam the eavesdropper. Beamforming is used in WSNs for effective communication which enhances the received signal to noise ratio (SNR) at the receiver side. Based on beamforming, smart antennas are modified to switch the direction and adjusts the transmitted power and phase through intermediate relay nodes and constructively it is used in the destination side to combine the signal. This new beamforming technique needs the information about the channel for security concern in these relay system of destination as well as an eavesdropper. For physical layer security beamforming area along with schemes such as amplify and forward relays, decode and forward relays and also co-operative jamming relays where adopted, to confuse the eavesdropper. Two channels are used in the experimental model such as main/legitimate channel, which is used between the relay node and destination node, and the other one is the wiretap channel which is used between the intermediate relay node and the eavesdropper.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mukherjee, Fakoorian SAA, Huang J, Swindlehurst AL (2014) Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surveys Tutorials 16(3):1550–1573 Mukherjee, Fakoorian SAA, Huang J, Swindlehurst AL (2014) Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surveys Tutorials 16(3):1550–1573
2.
go back to reference Khisti, G Wornell, Secure transmission with multiple antennas part II: the MIMOME wiretap channel. IEEE Trans Inf Theory 56(2):5515–5532 Khisti, G Wornell, Secure transmission with multiple antennas part II: the MIMOME wiretap channel. IEEE Trans Inf Theory 56(2):5515–5532
3.
go back to reference Swindlehurst L (2009) Fixed SINR solutions for the MIMO wiretap channel. In: Acoustics IEEE international conference on speech and signal processing (lCASSP), pp 2437–2440 Swindlehurst L (2009) Fixed SINR solutions for the MIMO wiretap channel. In: Acoustics IEEE international conference on speech and signal processing (lCASSP), pp 2437–2440
4.
go back to reference Zou Y, Wang X, Shen W (2013) Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J Sel Areas Commun 31:2099–2111CrossRef Zou Y, Wang X, Shen W (2013) Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J Sel Areas Commun 31:2099–2111CrossRef
5.
go back to reference Dong L, Han Z, Petropulu AP et al. (2013) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58:1875–1888 Dong L, Han Z, Petropulu AP et al. (2013) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58:1875–1888
6.
go back to reference Bloch M, Barros 1, Rodrigues MRD, McLaughlin SW (2008) Wireless information theoretic security. IEEE Trans Info Theory 54(6):2515–2534 Bloch M, Barros 1, Rodrigues MRD, McLaughlin SW (2008) Wireless information theoretic security. IEEE Trans Info Theory 54(6):2515–2534
7.
go back to reference Guo H, Yang Z, Zhang L et al. (2017) Joint cooperative beamforming and jamming for physical-layer security of decode and forward relay networks. IEEE J 5:19620–19630 Guo H, Yang Z, Zhang L et al. (2017) Joint cooperative beamforming and jamming for physical-layer security of decode and forward relay networks. IEEE J 5:19620–19630
8.
go back to reference Huang Y, Wang J et al. (2016) Secure transmission in cooperative relaying networks with multiple antennas. IEEE Trans Wireless Commun 15(10) Huang Y, Wang J et al. (2016) Secure transmission in cooperative relaying networks with multiple antennas. IEEE Trans Wireless Commun 15(10)
9.
go back to reference Hu L, Wen H, Wu B et al. (2017) Adaptive secure transmission for physical layer security in cooperative wireless networks. IEEE Commun Lett 21(3) Hu L, Wen H, Wu B et al. (2017) Adaptive secure transmission for physical layer security in cooperative wireless networks. IEEE Commun Lett 21(3)
10.
go back to reference Wang HM, Luo M, Yin Q, Xia X-G (2013) Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans Inf Forensics Secur 8(12):2007–2020CrossRef Wang HM, Luo M, Yin Q, Xia X-G (2013) Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans Inf Forensics Secur 8(12):2007–2020CrossRef
11.
go back to reference Wang H-M, Liu F, Yang M (2015) Joint cooperative beamforming, jamming, and power allocation to secure af relay systems. IEEE Trans Veh Technol 64(10):4893–4898CrossRef Wang H-M, Liu F, Yang M (2015) Joint cooperative beamforming, jamming, and power allocation to secure af relay systems. IEEE Trans Veh Technol 64(10):4893–4898CrossRef
12.
go back to reference Yang Y, Li Q, Ma W-K, Ge J, Ching P (2013) Cooperative secure beamforming for af relay networks with multiple eavesdroppers. IEEE Signal Process Lett 20(1):35–38CrossRef Yang Y, Li Q, Ma W-K, Ge J, Ching P (2013) Cooperative secure beamforming for af relay networks with multiple eavesdroppers. IEEE Signal Process Lett 20(1):35–38CrossRef
13.
go back to reference Ali B, Zamir N, Fasih M, Butt U, Ng SX (2016) “Physical layer security: friendly jamming in an untrusted relay scenario In: 2016 24th European signal processing conference (EUSIPCO), Aug 2016, pp 958–962 Ali B, Zamir N, Fasih M, Butt U, Ng SX (2016) “Physical layer security: friendly jamming in an untrusted relay scenario In: 2016 24th European signal processing conference (EUSIPCO), Aug 2016, pp 958–962
14.
go back to reference Mekkawy T, Yao R, Tsiftsis TA, Xu F, Lu Y (2018) Joint beam- forming alignment with suboptimal power allocation for a two-way untrusted relay network. IEEE Trans Inf Forensics Secur 13(10):2464–2474CrossRef Mekkawy T, Yao R, Tsiftsis TA, Xu F, Lu Y (2018) Joint beam- forming alignment with suboptimal power allocation for a two-way untrusted relay network. IEEE Trans Inf Forensics Secur 13(10):2464–2474CrossRef
15.
go back to reference Khandaker MR, Wong K-K (2014) Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans Inf Forensics Secur 10(1):40–54CrossRef Khandaker MR, Wong K-K (2014) Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans Inf Forensics Secur 10(1):40–54CrossRef
16.
go back to reference Ouyang N, Jiang X-Q, Bai E, Wang H-M (2017) Destination assisted jamming and beamforming for improving the security of af relay systems. IEEE Access 5:4125–4131CrossRef Ouyang N, Jiang X-Q, Bai E, Wang H-M (2017) Destination assisted jamming and beamforming for improving the security of af relay systems. IEEE Access 5:4125–4131CrossRef
17.
go back to reference Zou Y, Champagne B, Zhu W-P, Hanzo L (2014) Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans Commun 63(1):215–228CrossRef Zou Y, Champagne B, Zhu W-P, Hanzo L (2014) Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans Commun 63(1):215–228CrossRef
18.
go back to reference Wang C, Wang H-M, Xia X-G (2014) Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans Wireless Commun 14(2):589–605CrossRef Wang C, Wang H-M, Xia X-G (2014) Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans Wireless Commun 14(2):589–605CrossRef
19.
go back to reference Zhu J, Schober R, Bhargava VK (2016) Physical layer security for massive MIMO systems impaired by phase noise. In: 2016 IEEE 17th International workshop on signal processing advances in wireless communications (SPAWC), July 2016, pp 1–5 Zhu J, Schober R, Bhargava VK (2016) Physical layer security for massive MIMO systems impaired by phase noise. In: 2016 IEEE 17th International workshop on signal processing advances in wireless communications (SPAWC), July 2016, pp 1–5
20.
go back to reference Zhu J, Ng DWK, Wang N, Schober R, Bhargava VK (2017) Analysis and design of secure massive MIMO systems in the presence of hardware impairments. IEEE Trans Wireless Commun 16(3):2001–2016CrossRef Zhu J, Ng DWK, Wang N, Schober R, Bhargava VK (2017) Analysis and design of secure massive MIMO systems in the presence of hardware impairments. IEEE Trans Wireless Commun 16(3):2001–2016CrossRef
21.
go back to reference Li Q, Yang L (2018) Artificial noise aided secure precoding for MIMO untrusted two-way relay systems with perfect and imperfect channel state information. IEEE Trans Inf Forensics Secur 13(10):2628–2638CrossRef Li Q, Yang L (2018) Artificial noise aided secure precoding for MIMO untrusted two-way relay systems with perfect and imperfect channel state information. IEEE Trans Inf Forensics Secur 13(10):2628–2638CrossRef
Metadata
Title
Adaptability Against Eavesdropping Attack in WSN: Co-Operative Beamforming and Relays Approach
Authors
Somu P. Parande
Jayashree D. Mallapur
Copyright Year
2021
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_49