Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming

Abstract

In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.

Authors and Affiliations

Dang The Hung, Tran Trung Duy, Do Quoc Trinh

Keywords

Related Articles

Split and Merge Strategies for Solving Uncertain Equations Using Affine Arithmetic

The behaviour of systems is determined by various parameters. Due to several reasons like e. g. manufacturing tolerances these parameters can have some uncertainties. Corner Case and Monte Carlo simulations are well know...

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture

QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other...

VIRTUAL TABLE-SIMULATOR FOR MONITORING DISTRIBUTED OBJECTS

There is presented a determination to the concept of "a distributed subobject for monitoring". There are revealed the common features of such objects. There are analyzed the virtual and hardware cloud computing technolog...

Energy Efficient Dual Issue Embedded Processor

While energy efficiency is essential to extend the battery life of embedded devices, performance cannot be ignored. High performance superscalar embedded processors are more energy efficient than low performance scalar p...

Improving Customer Behaviour Prediction with the Item2Item model in Recommender Systems

Recommender Systems are the most well-known applications in E-commerce sites. However, the trade-off between runtime and the accuracy in making recommendations is a big challenge. This work combines several traditional t...

Download PDF file
  • EP ID EP46098
  • DOI http://dx.doi.org/10.4108/eai.28-3-2019.157120
  • Views 318
  • Downloads 0

How To Cite

Dang The Hung, Tran Trung Duy, Do Quoc Trinh (2019). Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 6(18), -. https://europub.co.uk/articles/-A-46098