Skip to main content

Adaptability Against Eavesdropping Attack in WSN: Co-Operative Beamforming and Relays Approach

  • Conference paper
  • First Online:
Computer Networks and Inventive Communication Technologies

Abstract

Security is the major concern in wireless sensor networks. To reduce security threats in WSNs physical layer, each node could be designed with an antenna which forms a MIMO communication system. This research work proposed a novel and effective solution to enhance the security of WSN. The sensor node at the transmitter side are used to transmit the beamforming signal to the receiver while few nodes are used to create artificial noise to jam the eavesdropper. Beamforming is used in WSNs for effective communication which enhances the received signal to noise ratio (SNR) at the receiver side. Based on beamforming, smart antennas are modified to switch the direction and adjusts the transmitted power and phase through intermediate relay nodes and constructively it is used in the destination side to combine the signal. This new beamforming technique needs the information about the channel for security concern in these relay system of destination as well as an eavesdropper. For physical layer security beamforming area along with schemes such as amplify and forward relays, decode and forward relays and also co-operative jamming relays where adopted, to confuse the eavesdropper. Two channels are used in the experimental model such as main/legitimate channel, which is used between the relay node and destination node, and the other one is the wiretap channel which is used between the intermediate relay node and the eavesdropper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mukherjee, Fakoorian SAA, Huang J, Swindlehurst AL (2014) Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun Surveys Tutorials 16(3):1550–1573

    Google Scholar 

  2. Khisti, G Wornell, Secure transmission with multiple antennas part II: the MIMOME wiretap channel. IEEE Trans Inf Theory 56(2):5515–5532

    Google Scholar 

  3. Swindlehurst L (2009) Fixed SINR solutions for the MIMO wiretap channel. In: Acoustics IEEE international conference on speech and signal processing (lCASSP), pp 2437–2440

    Google Scholar 

  4. Zou Y, Wang X, Shen W (2013) Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J Sel Areas Commun 31:2099–2111

    Article  Google Scholar 

  5. Dong L, Han Z, Petropulu AP et al. (2013) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58:1875–1888

    Google Scholar 

  6. Bloch M, Barros 1, Rodrigues MRD, McLaughlin SW (2008) Wireless information theoretic security. IEEE Trans Info Theory 54(6):2515–2534

    Google Scholar 

  7. Guo H, Yang Z, Zhang L et al. (2017) Joint cooperative beamforming and jamming for physical-layer security of decode and forward relay networks. IEEE J 5:19620–19630

    Google Scholar 

  8. Huang Y, Wang J et al. (2016) Secure transmission in cooperative relaying networks with multiple antennas. IEEE Trans Wireless Commun 15(10)

    Google Scholar 

  9. Hu L, Wen H, Wu B et al. (2017) Adaptive secure transmission for physical layer security in cooperative wireless networks. IEEE Commun Lett 21(3)

    Google Scholar 

  10. Wang HM, Luo M, Yin Q, Xia X-G (2013) Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans Inf Forensics Secur 8(12):2007–2020

    Article  Google Scholar 

  11. Wang H-M, Liu F, Yang M (2015) Joint cooperative beamforming, jamming, and power allocation to secure af relay systems. IEEE Trans Veh Technol 64(10):4893–4898

    Article  Google Scholar 

  12. Yang Y, Li Q, Ma W-K, Ge J, Ching P (2013) Cooperative secure beamforming for af relay networks with multiple eavesdroppers. IEEE Signal Process Lett 20(1):35–38

    Article  Google Scholar 

  13. Ali B, Zamir N, Fasih M, Butt U, Ng SX (2016) “Physical layer security: friendly jamming in an untrusted relay scenario In: 2016 24th European signal processing conference (EUSIPCO), Aug 2016, pp 958–962

    Google Scholar 

  14. Mekkawy T, Yao R, Tsiftsis TA, Xu F, Lu Y (2018) Joint beam- forming alignment with suboptimal power allocation for a two-way untrusted relay network. IEEE Trans Inf Forensics Secur 13(10):2464–2474

    Article  Google Scholar 

  15. Khandaker MR, Wong K-K (2014) Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans Inf Forensics Secur 10(1):40–54

    Article  Google Scholar 

  16. Ouyang N, Jiang X-Q, Bai E, Wang H-M (2017) Destination assisted jamming and beamforming for improving the security of af relay systems. IEEE Access 5:4125–4131

    Article  Google Scholar 

  17. Zou Y, Champagne B, Zhu W-P, Hanzo L (2014) Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans Commun 63(1):215–228

    Article  Google Scholar 

  18. Wang C, Wang H-M, Xia X-G (2014) Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks. IEEE Trans Wireless Commun 14(2):589–605

    Article  Google Scholar 

  19. Zhu J, Schober R, Bhargava VK (2016) Physical layer security for massive MIMO systems impaired by phase noise. In: 2016 IEEE 17th International workshop on signal processing advances in wireless communications (SPAWC), July 2016, pp 1–5

    Google Scholar 

  20. Zhu J, Ng DWK, Wang N, Schober R, Bhargava VK (2017) Analysis and design of secure massive MIMO systems in the presence of hardware impairments. IEEE Trans Wireless Commun 16(3):2001–2016

    Article  Google Scholar 

  21. Li Q, Yang L (2018) Artificial noise aided secure precoding for MIMO untrusted two-way relay systems with perfect and imperfect channel state information. IEEE Trans Inf Forensics Secur 13(10):2628–2638

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Parande, S.P., Mallapur, J.D. (2021). Adaptability Against Eavesdropping Attack in WSN: Co-Operative Beamforming and Relays Approach. In: Smys, S., Palanisamy, R., Rocha, Á., Beligiannis, G.N. (eds) Computer Networks and Inventive Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol 58. Springer, Singapore. https://doi.org/10.1007/978-981-15-9647-6_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9647-6_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9646-9

  • Online ISBN: 978-981-15-9647-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics