Mushtaq Muhammad Umer, Jiang Hong, Owais Muhammad, Fuad A. Awwad, Emad A. A. Ismail
{"title":"Energy-Efficient and Resilient Secure Routing in Energy Harvesting Wireless Sensor Networks with Transceiver Noises: EcoSecNet Design and Analysis","authors":"Mushtaq Muhammad Umer, Jiang Hong, Owais Muhammad, Fuad A. Awwad, Emad A. A. Ismail","doi":"10.1155/2024/3570302","DOIUrl":null,"url":null,"abstract":"Cooperative energy harvesting wireless sensor networks (EH-WSNs) using energy-harvesting-based physical layer security (PLS) appears to be a promising way to meet information security and energy efficiency goals at the same time. PLS uses energy harvesting (EH) features to protect data while transmitting. This eliminates the need for traditional upper-layer data encryption. However, this method introduces new challenges, particularly in scenarios where potential adversaries can intercept sensitive information through network relays. When it comes to multihop, multipath cooperative EH-WSNs, it becomes even more complicated to optimize transmit power for EH while reducing eavesdropping risk. In this study, three routing protocols, direct route designation (DRD), casual route designation (CRD), and superlative route designation (SRD) are presented. The protocols will improve multihop, multipath cooperative EH-WSNs’ security in the presence of eavesdroppers as well as noises at the transceiver. In this framework, both source nodes and relay nodes use power-beaming techniques to make their data transmission operations easier. This study goes beyond the protocol recommendations by presenting comprehensive closed-form formulas and asymptotic outage probability analysis for each protocol under various eavesdropping attack scenarios, i.e., coordination and noncoordination of eavesdroppers. According to simulation data, the suggested SRD protocol outperforms the CRD and DRD protocols by 19% and 25%, respectively, when eavesdroppers are not coordinating. The suggested SRD protocol outperforms the CRD and DRD protocols by 28% and 32%, respectively, in terms of eavesdropper coordination.","PeriodicalId":48792,"journal":{"name":"Journal of Sensors","volume":"95 1","pages":""},"PeriodicalIF":1.4000,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Sensors","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1155/2024/3570302","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Cooperative energy harvesting wireless sensor networks (EH-WSNs) using energy-harvesting-based physical layer security (PLS) appears to be a promising way to meet information security and energy efficiency goals at the same time. PLS uses energy harvesting (EH) features to protect data while transmitting. This eliminates the need for traditional upper-layer data encryption. However, this method introduces new challenges, particularly in scenarios where potential adversaries can intercept sensitive information through network relays. When it comes to multihop, multipath cooperative EH-WSNs, it becomes even more complicated to optimize transmit power for EH while reducing eavesdropping risk. In this study, three routing protocols, direct route designation (DRD), casual route designation (CRD), and superlative route designation (SRD) are presented. The protocols will improve multihop, multipath cooperative EH-WSNs’ security in the presence of eavesdroppers as well as noises at the transceiver. In this framework, both source nodes and relay nodes use power-beaming techniques to make their data transmission operations easier. This study goes beyond the protocol recommendations by presenting comprehensive closed-form formulas and asymptotic outage probability analysis for each protocol under various eavesdropping attack scenarios, i.e., coordination and noncoordination of eavesdroppers. According to simulation data, the suggested SRD protocol outperforms the CRD and DRD protocols by 19% and 25%, respectively, when eavesdroppers are not coordinating. The suggested SRD protocol outperforms the CRD and DRD protocols by 28% and 32%, respectively, in terms of eavesdropper coordination.
Journal of SensorsENGINEERING, ELECTRICAL & ELECTRONIC-INSTRUMENTS & INSTRUMENTATION
CiteScore
4.10
自引率
5.30%
发文量
833
审稿时长
18 weeks
期刊介绍:
Journal of Sensors publishes papers related to all aspects of sensors, from their theory and design, to the applications of complete sensing devices. All classes of sensor are covered, including acoustic, biological, chemical, electronic, electromagnetic (including optical), mechanical, proximity, and thermal. Submissions relating to wearable, implantable, and remote sensing devices are encouraged.
Envisaged applications include, but are not limited to:
-Medical, healthcare, and lifestyle monitoring
-Environmental and atmospheric monitoring
-Sensing for engineering, manufacturing and processing industries
-Transportation, navigation, and geolocation
-Vision, perception, and sensing for robots and UAVs
The journal welcomes articles that, as well as the sensor technology itself, consider the practical aspects of modern sensor implementation, such as networking, communications, signal processing, and data management.
As well as original research, the Journal of Sensors also publishes focused review articles that examine the state of the art, identify emerging trends, and suggest future directions for developing fields.