Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming

Abstract

In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.

Authors and Affiliations

Dang The Hung, Tran Trung Duy, Do Quoc Trinh

Keywords

Related Articles

An Application of SMC to continuous validation of heterogeneous systems.

This paper considers the rigorous design of Systems of Systems (SoS), i.e. systems composed of a set of heterogeneous components whose number evolves with time. Such components cooperate to accomplish functions that they...

VIRTUAL TABLE-SIMULATOR FOR MONITORING DISTRIBUTED OBJECTS

There is presented a determination to the concept of "a distributed subobject for monitoring". There are revealed the common features of such objects. There are analyzed the virtual and hardware cloud computing technolog...

A Review of Research on Acoustic Detection of Heat Exchanger Tube

Leakage in heat exchanger tubes can result in unreliable products and dangerous situations, which could cause great economic losses. Along with fast development of modern acoustic detection technology, using acoustic sig...

Performance evaluation of composite Web services

Composite Web service architectures are demanding much guarantee on the Quality of Service (QoS) in order to meet user requirements. Performance evaluation of these architectures has become therefore a very challenging i...

Merging OMG Standards in a General Modeling, Transformation, and Simulation Framework

Test-driven Agile Simulation (TAS) is a general-purpose approach that combines model-driven engineering, simulation, and testing techniques to improve overall quality for the development process. TAS focuses on the const...

Download PDF file
  • EP ID EP46098
  • DOI http://dx.doi.org/10.4108/eai.28-3-2019.157120
  • Views 320
  • Downloads 0

How To Cite

Dang The Hung, Tran Trung Duy, Do Quoc Trinh (2019). Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 6(18), -. https://europub.co.uk/articles/-A-46098