Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2019, Vol 6, Issue 18
Abstract
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.
Authors and Affiliations
Dang The Hung, Tran Trung Duy, Do Quoc Trinh
Split and Merge Strategies for Solving Uncertain Equations Using Affine Arithmetic
The behaviour of systems is determined by various parameters. Due to several reasons like e. g. manufacturing tolerances these parameters can have some uncertainties. Corner Case and Monte Carlo simulations are well know...
Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture
QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other...
VIRTUAL TABLE-SIMULATOR FOR MONITORING DISTRIBUTED OBJECTS
There is presented a determination to the concept of "a distributed subobject for monitoring". There are revealed the common features of such objects. There are analyzed the virtual and hardware cloud computing technolog...
Energy Efficient Dual Issue Embedded Processor
While energy efficiency is essential to extend the battery life of embedded devices, performance cannot be ignored. High performance superscalar embedded processors are more energy efficient than low performance scalar p...
Improving Customer Behaviour Prediction with the Item2Item model in Recommender Systems
Recommender Systems are the most well-known applications in E-commerce sites. However, the trade-off between runtime and the accuracy in making recommendations is a big challenge. This work combines several traditional t...