Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2019, Vol 6, Issue 18
Abstract
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.
Authors and Affiliations
Dang The Hung, Tran Trung Duy, Do Quoc Trinh
Parallel Simulation of Queueing Petri Nets
Queueing Petri Nets (QPNs) are a powerful formalism to model the performance of software systems. Such models can be solved using analytical or simulation techniques. Analytical techniques suffer from scalability issues,...
Performance evaluation of composite Web services
Composite Web service architectures are demanding much guarantee on the Quality of Service (QoS) in order to meet user requirements. Performance evaluation of these architectures has become therefore a very challenging i...
Distributed Optimization Framework for Industry 4.0 Automated Warehouses
Robotic automation is being increasingly proselytized in the industrial and manufacturing sectors to increase production efficiency. Typically, complex industrial tasks cannot be satisfied by individual robots, rather co...
VIRTUAL TABLE-SIMULATOR FOR MONITORING DISTRIBUTED OBJECTS
There is presented a determination to the concept of "a distributed subobject for monitoring". There are revealed the common features of such objects. There are analyzed the virtual and hardware cloud computing technolog...
Phase and Time Synchronization for 5G C-RAN: Requirements, Design Challenges and Recent Advances in Standardization
Cloud-RAN is one of the key enablers for 5G. In this paper we present the importance of network synchronization for the fronthaul architectures. The term network synchronization refers to the distribution of time and fre...