Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming

Abstract

In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.

Authors and Affiliations

Dang The Hung, Tran Trung Duy, Do Quoc Trinh

Keywords

Related Articles

A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes

Industrial Control Systems (ICS) are getting more vulnerable as they become increasingly interconnected with other systems. Industrial Internet of Things(IIoT) will bring new opportunities to business and society, along...

On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case

One of the most challenging fields in vehicular communications has been the experimental assessment of protocols and novel technologies. Researchers usually tend to simulate vehicular scenarios and/or partially validate...

GRAPP&S, a Peer-to-Peer Middleware for Interlinking and Sharing Educational Resources

This article presents GRAPP&S (Grid APPlication & Services), a specification of an E-learning architecture for the decentralized sharing of educational resources. By dealing with different resources such as files, data s...

Ant Colony Optimization Based Model Checking Extended by Smell-like Pheromone

Model Checking is a technique for automatically checking the model representing software or hardware about whether they satisfy the corresponding specifications. Traditionally, the model checking uses deterministic algor...

Towards an augmented reality guiding system for assisted indoor remote vehicle navigation

Scientific facilities usually require the use of vehicles controlled remotely by an operator relying on the information provided by a camera. However, the operator lacks of depth perception, which makes difficult the nav...

Download PDF file
  • EP ID EP46098
  • DOI http://dx.doi.org/10.4108/eai.28-3-2019.157120
  • Views 301
  • Downloads 0

How To Cite

Dang The Hung, Tran Trung Duy, Do Quoc Trinh (2019). Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 6(18), -. https://europub.co.uk/articles/-A-46098