Abstract
Security is the major concern in wireless sensor networks. To reduce security threats in WSNs physical layer, each node could be designed with an antenna which forms a MIMO communication system. This research work proposed a novel and effective solution to enhance the security of WSN. The sensor node at the transmitter side are used to transmit the beamforming signal to the receiver while few nodes are used to create artificial noise to jam the eavesdropper. Beamforming is used in WSNs for effective communication which enhances the received signal to noise ratio (SNR) at the receiver side. Based on beamforming, smart antennas are modified to switch the direction and adjusts the transmitted power and phase through intermediate relay nodes and constructively it is used in the destination side to combine the signal. This new beamforming technique needs the information about the channel for security concern in these relay system of destination as well as an eavesdropper. For physical layer security beamforming area along with schemes such as amplify and forward relays, decode and forward relays and also co-operative jamming relays where adopted, to confuse the eavesdropper. Two channels are used in the experimental model such as main/legitimate channel, which is used between the relay node and destination node, and the other one is the wiretap channel which is used between the intermediate relay node and the eavesdropper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mukherjee, Fakoorian SAA, Huang J, Swindlehurst AL (2014) Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surveys Tutorials 16(3):1550–1573
Khisti, G Wornell, Secure transmission with multiple antennas part II: the MIMOME wiretap channel. IEEE Trans Inf Theory 56(2):5515–5532
Swindlehurst L (2009) Fixed SINR solutions for the MIMO wiretap channel. In: Acoustics IEEE international conference on speech and signal processing (lCASSP), pp 2437–2440
Zou Y, Wang X, Shen W (2013) Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J Sel Areas Commun 31:2099–2111
Dong L, Han Z, Petropulu AP et al. (2013) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58:1875–1888
Bloch M, Barros 1, Rodrigues MRD, McLaughlin SW (2008) Wireless information theoretic security. IEEE Trans Info Theory 54(6):2515–2534
Guo H, Yang Z, Zhang L et al. (2017) Joint cooperative beamforming and jamming for physical-layer security of decode and forward relay networks. IEEE J 5:19620–19630
Huang Y, Wang J et al. (2016) Secure transmission in cooperative relaying networks with multiple antennas. IEEE Trans Wireless Commun 15(10)
Hu L, Wen H, Wu B et al. (2017) Adaptive secure transmission for physical layer security in cooperative wireless networks. IEEE Commun Lett 21(3)
Wang HM, Luo M, Yin Q, Xia X-G (2013) Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans Inf Forensics Secur 8(12):2007–2020
Wang H-M, Liu F, Yang M (2015) Joint cooperative beamforming, jamming, and power allocation to secure af relay systems. IEEE Trans Veh Technol 64(10):4893–4898
Yang Y, Li Q, Ma W-K, Ge J, Ching P (2013) Cooperative secure beamforming for af relay networks with multiple eavesdroppers. IEEE Signal Process Lett 20(1):35–38
Ali B, Zamir N, Fasih M, Butt U, Ng SX (2016) “Physical layer security: friendly jamming in an untrusted relay scenario In: 2016 24th European signal processing conference (EUSIPCO), Aug 2016, pp 958–962
Mekkawy T, Yao R, Tsiftsis TA, Xu F, Lu Y (2018) Joint beam- forming alignment with suboptimal power allocation for a two-way untrusted relay network. IEEE Trans Inf Forensics Secur 13(10):2464–2474
Khandaker MR, Wong K-K (2014) Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans Inf Forensics Secur 10(1):40–54
Ouyang N, Jiang X-Q, Bai E, Wang H-M (2017) Destination assisted jamming and beamforming for improving the security of af relay systems. IEEE Access 5:4125–4131
Zou Y, Champagne B, Zhu W-P, Hanzo L (2014) Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans Commun 63(1):215–228
Wang C, Wang H-M, Xia X-G (2014) Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans Wireless Commun 14(2):589–605
Zhu J, Schober R, Bhargava VK (2016) Physical layer security for massive MIMO systems impaired by phase noise. In: 2016 IEEE 17th International workshop on signal processing advances in wireless communications (SPAWC), July 2016, pp 1–5
Zhu J, Ng DWK, Wang N, Schober R, Bhargava VK (2017) Analysis and design of secure massive MIMO systems in the presence of hardware impairments. IEEE Trans Wireless Commun 16(3):2001–2016
Li Q, Yang L (2018) Artificial noise aided secure precoding for MIMO untrusted two-way relay systems with perfect and imperfect channel state information. IEEE Trans Inf Forensics Secur 13(10):2628–2638
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Parande, S.P., Mallapur, J.D. (2021). Adaptability Against Eavesdropping Attack in WSN: Co-Operative Beamforming and Relays Approach. In: Smys, S., Palanisamy, R., Rocha, Á., Beligiannis, G.N. (eds) Computer Networks and Inventive Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol 58. Springer, Singapore. https://doi.org/10.1007/978-981-15-9647-6_49
Download citation
DOI: https://doi.org/10.1007/978-981-15-9647-6_49
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9646-9
Online ISBN: 978-981-15-9647-6
eBook Packages: EngineeringEngineering (R0)