Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming

Abstract

In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.

Authors and Affiliations

Dang The Hung, Tran Trung Duy, Do Quoc Trinh

Keywords

Related Articles

Data network related to an object manufacturing inside of exerted Intelligent System

Most of today’s information systems are not fully integrated. Companies, suppliers, and customers are rarely closely linked. Functions within a chain from the enterprise to the shop floor level are not fully integrated....

Controlling Sensitivity of Gaussian Bayes Predictions based on Eigenvalue Thresholding

Gaussian Bayes classifiers are widely used in machine learning for various purposes. Its special characteristic has provided a great capacity for estimating the likelihood and reliability of individual classification dec...

Inpainting large missing regions based on Seam Carving

Inpainting techniques are developed to recover missing image information. Existing inpainting approaches are: Partial Differential Equations Based Inpainting (PDE-BI) and Exemplar-Based Inpainting (EBI). PDE-BI methods u...

Modelling of stress field during Submerged Arc Weld surfacing taking into account heat of the weld and phase transformation effect

In work the model of stress calculation and analysis of stress field during single-pass SAW (Submerged Arc Welding) surfacing have been presented. In temperature field solution the temperature changes caused by the heat...

An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems

Anomaly detection is an important aspect of data mining, where the main objective is to identify anomalous or unusual data from a given dataset. However, there is no formal categorization of application-specific anomaly...

Download PDF file
  • EP ID EP46098
  • DOI http://dx.doi.org/10.4108/eai.28-3-2019.157120
  • Views 267
  • Downloads 0

How To Cite

Dang The Hung, Tran Trung Duy, Do Quoc Trinh (2019). Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 6(18), -. https://europub.co.uk/articles/-A-46098