Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
Utilizing a Wristband Sensor to Measure the Stress Level for People with Dementia
Next Article in Special Issue
Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks
Previous Article in Journal
A Dual Frequency Carrier Phase Error Difference Checking Algorithm for the GNSS Compass
Previous Article in Special Issue
3D Tracking via Shoe Sensing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

1
Faculty of Information Technology, Macau University of Science and Technology, Macau, China
2
Big Data Lab, Norwegian University of Science and Technology in Aalesund, 6009 Aalesund, Norway
3
Faculty of Computer, Guangdong University of Technology, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(12), 1987; https://doi.org/10.3390/s16121987
Submission received: 31 October 2016 / Revised: 16 November 2016 / Accepted: 20 November 2016 / Published: 24 November 2016
(This article belongs to the Special Issue New Paradigms in Cyber-Physical Social Sensing)

Abstract

:
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

1. Introduction

Cyber Physical Social Sensing (CPSS) has emerged as a promising paradigm to enable the interactions between humans and the physical environment [1,2,3,4]. As a key component of CPSS systems, wireless sensor networks (WSNs) play an important role in sensing, collecting and transmitting confidential information [5,6]. However, WSNs are also susceptible to various malicious attacks due to the vulnerability of sensor nodes [7]. Eavesdropping attack, as one of typical malicious attacks in WSNs has attracted considerable attention recently. It is difficult to detect eavesdropping behaviours since malicious nodes (also called eavesdroppers) passively wiretap the confidential information without disclosure of their existence.
Encryption has been typically used to protect the confidential communications in wireless networks. For example, Cellular Message Encryption Algorithm has been used in cellular networks [8] and KASUMI has been used in 3G networks [9] while wireless local area networks (WLANs) have adopted Wired Equivalent Privacy (WEP) [10], Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) [11]. However, the traditional cryptographic methods may not be feasible to WSNs due to the following constraints: 1) the limited battery power of sensor nodes; (2) the inferior computational capability of sensor nodes and (3) the difficulty of managing distributed sensor nodes in a centralized way, which is however necessary for many encryption algorithms [12].
In this paper, we propose a novel anti-eavesdropping mechanism to protect confidential communications in WSNs. In particular, we deploy a small number of friendly jammers in WSNs, which can generate sufficient interference to prevent eavesdroppers from snooping legitimate communications. We name such schemes as Friendly-Jamming (Fri-Jam) schemes. Recently, [13,14,15,16,17] also proposed a similar approach named Protective Jamming (Pro-Jam) to prohibit the eavesdropping attacks in RFID-like networks. However, Pro-Jam is mainly designed for the environment with a fence at the boundary of the network, where jammers are placed outside the fence. This assumption is impractical to WSNs since eavesdroppers can appear at any location in WSNs. Besides, most of the study on Pro-Jam scheme have been focused on the power assignment in a specific scenario. To the best of our knowledge, there is a lack of performance analysis on friendly-jamming schemes.
In this paper, we establish a general analytical model to evaluate the performance of Fri-Jam schemes. The primary contributions of this paper can be summarized as follows.
  • In particular, we propose a general theoretical model to quantify the eavesdropping risk (measured by the eavesdropping probability) and evaluate the impact of Fri-Jam schemes on the legitimate communications (measured by the transmission probability).
  • We consider three types of Fri-Jam schemes: random placement of jammers (named FJ-Ran scheme), regular placement of jammers (named FJ-Reg scheme) and FJ-Reg scheme with power control (named FJ-PC scheme).
  • We compare the eavesdropping probability of WSNs without jammers with that with friendly jammers (FJ-Ran, FJ-Reg and FJ-PC schemes). We find that all of three Fri-Jam schemes can effectively reduce the eavesdropping probability in contrast to no-jamming scenarios.
  • Our results also show that the appropriate placement of friendly jammers in WSNs can significantly reduce the eavesdropping probability whilst there is no significant impairment on legitimate communications. Besides, to adjust emitting power of jammers properly can mitigate the eavesdropping risk while has no significant impairment to the legitimate transmission.
The rest of this paper is organized as follows. We summarize the related works in Section 2. Section 3 introduces the models used in this paper. We then analyze the eavesdropping probability of different Fri-Jam schemes in Section 4. We next show the results in Section 5. Finally, Section 6 concludes this paper.

2. Related Work

It is difficult to detect eavesdropping attacks in WSNs since eavesdroppers passively snoop the confidential communications with concealment of their presence. Encryption is one of the most commonly used techniques to protect confidential communications, which is shown to work effectively in WLANs (e.g., WEP [10], WPA and WPA2 [11]), in cellular networks (e.g., CMEA [8] and KASUMI [9]) and in wireless personal area networks (WPANs) [18]. However, applying such cryptography-based techniques help hiding the meaning of the information being transmitted, but not the existence of the information itself. In addition, the techniques are designed to make it computationally difficult for the adversary to understand the true meaning of the information while the adversary is still able to access all the information [19]. Furthermore, it is quite challenging to apply the conventional ciphers (encryption algorithms) to WSNs due to the following inherent constraints of WSNs [12]: (a) the inferior computational capability of wireless nodes; (b) the limited battery power of wireless nodes; (c) the difficulty of managing the distributed sensor nodes in the centralized manner. In addition, the cryptographic authentication and identification in higher layer will introduce a significant computational overhead [20].
There are a number of anti-eavesdropping counter-measures in WSNs. We roughly categorize them into three types: (i) lightweight encryption schemes [21,22,23,24]; (ii) generating artificial noise to limit the amount of information that can be extracted by eavesdroppers [25,26,27]; and (iii) mitigating the eavesdropping risk by controlling the transmitting power [28]. Table 1 summarizes these schemes. In particular, a number of lightweight encryption schemes based on physical layer features of wireless networks have been proposed [21,22,23,24]. The main idea of physical-layer encryption schemes is to exploit the inherent randomness of communication channels so that the amount of information that can be extracted by an eavesdropper is mitigated. However, the encryption schemes are still computational intensive and power-consuming.
Some recent studies [25,27] exploit the artificial noise generated by RFID readers to alleviate the eavesdropping capability of malicious nodes. However, these schemes can only be applied to the scenarios of Internet-of-Things (IoT) based on RFID. Besides, a transmitting power control method is proposed in [28] to mitigate the eavesdropping risk while to adjust the transmitting power may deteriorate the legitimate communications [29].
Although [15,16,17] also proposed an approach similar to our Fri-Jam schemes, their methods are mainly designed for the IoT scenario, in which jammers are placed outside the fence surrounding the boundary of the network. These schemes are not feasible to WSNs since eavesdroppers can appear at any location in WSNs. Besides, most of the studies on protective jamming schemes [15,16,17] are mainly focused on a specific scenario.

3. System Models

This section first presents three kinds of Fri-Jam schemes in Section 3.1. Then, Section 3.2 gives the channel model used in this paper. Section 3.3 presents the definitions on eavesdropping probability and transmission probability.

3.1. Fri-Jam Schemes

In this paper, we assume that the network is placed in a torus [30]. In this manner, the border effect can be ignored. We consider three types of users in our network: legitimate users, eavesdroppers and friendly jammers. The legitimate users are distributed according to homogeneous Poisson point process (PPP). Legitimate users transmit data packets, which might be passively snooped by eavesdroppers while legitimate users are unaware of the reconnaissance. Similar to [28], we assume that the eavesdropper is located at the center of the network without loss of generality since the network is placed in a symmetric torus.
The interference caused by friendly jammers heavily depends on the location of jammers and the emitting power of each jammer. In this paper, we consider two placement strategies of friendly jammers in WSNs: (i) FJ-Reg scheme, in which jammers are regularly placed at deterministic locations and (ii) FJ-Ran scheme, in which jammers are regularly placed at random locations. Specifically, in the FJ-Reg scheme, friendly jammers are regularly placed in a grid manner, as shown in Figure 1. In the FJ-Ran scheme, friendly jammers are randomly distributed according to according to PPP, as shown in Figure 2. In addition to FJ-Reg and FJ-Ran schemes, we also consider adjusting the emitting power of jammers. In particular, we consider a modified FJ-Reg scheme with power control (named FJ-PC scheme) in this paper.

3.2. Channel Model

We assume that the radio channel experiences Rayleigh fading and path loss. The received power of a receiver (i.e., a legitimate user or an eavesdropper) at a distance r from its nearest transmitter (legitimate user or friendly jammer) is h r α , where h is a random variable following an exponential distribution with mean 1 μ and α is the path loss factor. More specifically, we denote h exp ( μ ) .
We then consider the Signal to Interference plus Noise Ratio (SINR) model. The SINR of the receiver at a random distance r from its transmitter is expressed as
SINR = P t h r α σ 2 + I t + I j ,
where σ 2 is the noise power, I t = i Φ / t 0 P t h i R i α denotes the cumulative interference from all the legitimate users except for the transmitter denoted by t 0 , Φ denotes the set of legitimate users, P t denotes the transmitting power of the legitimate transmitter and I j denotes the cumulative interference generated by friendly jammers. The value of I j heavily depends on the placements of friendly jammers, which will be analyzed in Section 4.
We then define the eavesdropping condition to determine whether the transmission from a certain legitimate user can be wiretapped by an eavesdropper.
Definition 1.
Eavesdropping Condition. A confidential transmission can be snooped by an eavesdropper if and only if SINR > T , where T is the received power threshold that an eavesdropper can successfully decode the transmission.

3.3. Problem Definition

Based on the eavesdropping condition, we then define the eavesdropping probability denoted by P ( E ) as follows.
Definition 2.
Eavesdropping Probability is the probability that at least one transmission has been wiretapped by an eavesdropper.
From the definition we know P ( E ) is the probability to show how likely is any transmission eavesdropped. In order to derive P ( E ) , we need to calculate the probability that one transmission has been eavesdropped, which is denoted by P e . Considering the situation that no transmission being eavesdropped will be easier than considering all the situations that a certain number of transmissions being eavesdropped. Then, we find that P ( E ) can be expressed by P e as follows,
P ( E ) = 1 ( 1 P e ) N ,
where N is the expected number of legitimate users in the network.
Another concern of this paper is to investigate the impacts of our Fri-Jam schemes on the legitimate communications. Thus, we define the transmission probability denoted by P ( C ) as follows.
Definition 3.
Transmission Probability is the probability that a legitimate user (transmitter) can successfully transmit with another legitimate user (receiver).
To ensure the legitimate transmission, we require SINR > β at the legitimate receiver, where β is the threshold value of the receiving power for a successful reception. Thus, we have P ( C ) = Δ P ( SINR > β ) . Following a similar approach to [31], we can obtain P ( C ) .

4. Analysis on Eavesdropping Probability

We first present the analytical results on the eavesdropping probability of Non-Jam scheme in Section 4.1 and then present the results on the eavesdropping probability of Fri-Jam schemes in Section 4.2.

4.1. Analysis of Non-Jam Scheme

According to the definition of the eavesdropping probability P ( E ) , we need to derive the probability P e that one transmission has been eavesdropped first. In particular, we have P e of Non-Jam scheme as follows.
Theorem 1.
In Non-Jam scheme, the eavesdropping probability P e that one transmission has been eavesdropped is
P e = r > 0 e μ T p r α σ 2 π r 2 λ ( ρ ( T , α ) + 1 ) 2 π λ r d r ,
where ρ ( T p , α ) = T p 2 / α T p 2 / α 1 1 + μ α / 2 d μ and T p = T P t for simplicity.
Proof. 
We denote the distance between the eavesdropper and its nearest transmitter by r. Since the transmitters are distributed according to PPP, the probability density function (PDF) of r can be derived as the following steps.
Firstly, we have the probability that no transmitter is closer than R given by
P [ r > R ] = P [ No transmitter closer than R ] = e λ π R 2 .
Then, the cumulative distribution function (CDF) of r is P [ r R ] = F R ( R ) = 1 e λ π R 2 . We next have the PDF of r as follows,
f r ( r ) = d F r ( r ) d r = e λ π r 2 2 π λ r .
Since the channel gain is h, the SINR at eavesdropper is
SINR = P t h r α σ 2 + I t ,
where I t = i Φ / t 0 P t h i R i α .
Then, the eavesdropping probability P e that one transmission has been eavesdropped is
P e = E r [ P ( SINR > T | r ) ] = r > 0 P P t h r α σ 2 + I t > T | r e λ π r 2 2 π λ r d r = r > 0 P [ h > T p r α ( σ 2 + I t ) | r ] e λ π r 2 2 π λ r d r .
Since h is a random variable following an exponential distribution with mean 1 μ , the probability becomes
P [ h > T p r α ( σ 2 + I t ) | r ] = E I t [ P [ h > T p r α ( σ 2 + I t ) | r ] ] = E I t [ exp [ μ T p r α ( σ 2 + I t ) ] | r ] = e μ T p r α σ 2 · E I t [ exp ( μ T p r α I t ) ] = e μ T p r α σ 2 · L ( μ T p r α ) ,
where L ( · ) denotes the Laplace transform.
More specifically, we have
L I t ( s ) = E I t [ e s I t ] = E Φ , { h i } exp ( s i Φ / b 0 h i R i α ) = E Φ i Φ / b 0 μ μ + s R i α = exp 2 π λ r ( 1 μ μ + s v α ) v d v .
Replacing variable μ with ( v r T p 1 / α ) 2 , we then have
L [ μ T p r α ] = exp ( π r 2 λ ρ ( T p , α ) ) ,
where ρ ( T p , α ) = T p 2 / α T p 2 / α 1 1 + μ α / 2 d μ . ☐
It is shown in Theorem 1 that the eavesdropping probability P e heavily depends on the channel conditions (such as the path loss and Rayleigh fading).

4.2. Analysis of Fri-Jam Schemes

Recall that we consider three Fri-Jam schemes: FJ-Reg, FJ-Ran and FJ-PC schemes. Thus, we categorize our analysis into the following cases.

4.2.1. Case I: FJ-Reg Scheme

We first analyze the case of FJ-Reg, in which all the jammers are regularly placed in grid manner as shown in Figure 1. We denote the expectation of the cumulative interference generated by jammers by E [ I j ] , which is given by Lemma 1.
Lemma 1.
The expectation of the cumulative interference of regular placed jammers is
E [ I j ] = 1 μ m = 1 n E [ I j ( m ) ] .
We present the proof in Appendix A.
We then derive the probability P e that one transmission has been eavesdropped, which is given by Theorem 2.
Theorem 2.
In FJ-Reg scheme, the probability P e that one transmission has been eavesdropped is
P e = r > 0 e μ T p r α ( σ 2 + E [ I j ) π r 2 λ ( ρ ( T p , α ) + 1 ) 2 π λ r d r ,
where ρ ( T p , α ) = T p 2 / α T p 2 / α 1 1 + μ α / 2 d μ and E [ I j ] is given by Equation (8).
Proof. 
First, the SINR at a random distance r from its nearest transmitter can be expressed as SINR = h r α σ 2 + I t + I j . Then, from the definition of P e , we have
P e = r > 0 P h r α σ 2 + I t + I j > T p | r e λ π r 2 2 π λ r d r = r > 0 P [ h > T p r α ( σ 2 + I t + I j ) | r ] e λ π R 2 2 π λ r d r .
According to the channel model (given in Section 3.2), we have
P [ h > T p r α ( σ 2 + I t + I j ) | r ] = E I t [ exp ( μ T p r α ) ( σ 2 + I t + I j ) | r ] = e μ T p r α ( σ 2 + E [ I j ] ) · E I t [ exp ( μ T p r α I t ) ] = e μ T p r α ( σ 2 + E [ I j ] ) · L ( μ T p r α ) ,
where L ( μ T p r α ) = exp ( π r 2 λ ρ ( T p , α ) ) , ρ ( T p , α ) = T p 2 / α T p 1 1 + ( μ ) α / 2 d μ and E [ I j ] is given by Equation (8). ☐
It is shown in Theorem 2 that the probability P e heavily depends on the path loss factor α, the Rayleigh fading factor μ, the noise σ and the placement parameter d. Section 5 will give the numerical results that will further confirm this observation.

4.2.2. Case II: FJ-Ran Scheme

We then analyze the case of FJ-Ran, in which all the jammers are randomly distributed in the network. Recall that both jammers and legitimate users are distributed according to PPP while they have the different distribution parameters. In particular, we denote the density of legitimate users by λ 1 and the density of friendly jammers by λ 2 . Based on the well-known stochastic geometric results [31], we can obtain Theorem 3 on the probability P e that one transmission has been eavesdropped as follows.
Theorem 3.
In FJ-Ran scheme, the probability P e that one transmission has been eavesdropped is
P e = r > 0 e μ T p r α σ 2 · L I t ( μ T p r α ) · L I j ( μ T p r α ) e λ 1 π R 2 2 π λ 1 r d r ,
where L I t [ μ T p r α ] = exp ( π r 2 λ 1 ρ ( T p , α ) ) , L I j [ μ T p r α ] = exp ( π r 2 λ 2 ρ ( T p , α ) ) and ρ ( T p , α ) = T p 2 / α T p 2 / α 1 1 + μ α / 2 d μ .
Proof. 
According to the channel model defined in Section 3.2, we have the
P e = r > 0 P P t h r α σ 2 + I t + I j > T | r e λ π r 2 2 π λ r d r = r > 0 P [ h > T p r α ( σ 2 + I t + I j ) | r ] e λ 1 π R 2 2 π λ 1 r d r .
Following the similar analysis procedure to [31], we then have
P [ h > T p r α ( σ 2 + I t + I j ) | r ] = e μ T p r α σ 2 · L I t ( μ T p r α ) · L I j ( μ T p r α ) .
Substituting P [ h > T p r α ( σ 2 + I t + I j ) | r ] in Equation (10) by RHS of Equation (11), we finally prove the above result. ☐
It is shown in Theorem 3 that the probability P e heavily depends on both the node density λ 1 of legitimate users and the node density λ 2 of jammers, and the channel conditions.

4.2.3. Case III: FJ-PC Scheme

We next analyze the case of FJ-PC scheme, in which jammers are placed in grid as the same as FJ-Reg scheme. We then assign the emitting power of jammers according to the different layers (as shown in Figure 1). We denote the layer number by k, which is ranging from 1 to n. The emitting power of jammers at the same layer is assigned with the same value. Specifically, we assign the emitting power at jammers in FJ-Reg scheme according to the following rule.
Property 1.
We assign the emitting power of jammers at the kth layer according to the following equation:
P j ( k ) = P J · ζ 1 k ,
where P J is the transmitting power of the jammers at the first layer and ζ is the power control factor.
In FJ-PC scheme, the transmission probability of a legitimate user cannot be derived directly by using the existing approaches in [31,32,33,34] since the cumulative interference from jammers in FJ-PC scheme is quite different from that in FJ-Reg scheme. In particular, we have the following lemma to calculate the average cumulative interference.
Lemma 2.
In FJ-PC scheme, the average cumulative interference from power controlled jammers to a legitimate transmitter is
E [ I c ] = k = 1 n I k , t 0 + I k , t k + 2 t = t 1 t k 1 I k , t x k = 1 n 2 k ,
where I k , t x is the interference at t x , which can be calculated by
I k , t x = m = 1 k v = 1 m 2 P j ( m ) v 1 2 + t x · 2 d 2 + k m + 1 2 · 2 d 2 α + v 1 2 + t x · 2 d 2 + k + m 1 2 · 2 d 2 α + m = 1 k w = k m + 1 k + m 2 P j ( m ) m 1 2 + t x · 2 d 2 + w 1 2 · 2 d 2 α + q = k n z = q k 1 q + k 2 P j ( q ) q 1 2 + t x · 2 d 2 + z + 1 2 · 2 d 2 α + q = k n s = 1 q 2 P j ( q ) s 1 2 + t x · 2 d 2 + q k 1 2 · 2 d 2 α + s 1 2 + t x · 2 d 2 + q + k + 1 2 · 2 d 2 α
We present the proof in Appendix B.
We then derive the transmission probability P ( C ) of a legitimate user, which is given by Theorem 4.
Theorem 4.
In FJ-PC scheme, the transmission probability P ( C ) is
P ( C ) = r > 0 e μ β p r α ( σ 2 + E [ I c ] ) π r 2 λ ( ρ ( β p , α ) + 1 ) 2 π λ r d r ,
where ρ ( β p , α ) = β p 2 / α β p 2 / α 1 1 + μ α / 2 d μ , β p = β P t and E [ I c ] is given by Equation (13).
Proof. 
The SINR of the receiver at a random distance r from its nearest transmitter can be expressed as SINR = P t h r α σ 2 + I t + I c , where I c is the cumulative interference caused by power controlled jammers on the recevier. Then, from the definition of P ( C ) , we have
P ( C ) = r > 0 P P t h r α σ 2 + I t + I c > β | r e λ π r 2 2 π λ r d r = r > 0 P [ h > β p r α ( σ 2 + I t + I c ) | r ] e λ π R 2 2 π λ r d r .
According to the channel model (given in Section 3.2), we have
P [ h > β p r α ( σ 2 + I t + I c ) | r ] = E I t [ exp ( μ β p r α ) ( σ 2 + I t + I c ) | r ] = e μ β p r α ( σ 2 + E [ I c ] ) · E I t [ exp ( μ β p r α I t ) ] = e μ β p r α ( σ 2 + E [ I c ] ) · L ( μ β p r α ) ,
where L ( μ β p r α ) = exp ( π r 2 λ ρ ( β p , α ) ) , ρ ( β p , α ) = β p 2 / α β p 1 1 + ( μ ) α / 2 d μ and E [ I j ] is given by Equation (8). ☐
We then have the eavesdropping probability P e in FJ-PC scheme as the following theorem.
Theorem 5.
In FJ-PC scheme, the eavesdropping probability P e that one transmission has been eavesdropped is
P e = r > 0 e μ T p r α ( σ 2 + E [ I j ] ) π r 2 λ ( ρ ( T p , α ) + 1 ) 2 π λ r d r ,
where E [ I j ] = E 4 k = 1 n P j ( k ) 2 d · ( 2 k 3 ) 2 + ( 2 k 1 ) 2 α + d · 2 ( 2 k 1 ) 2 α .
Proof. 
The derivation of eavesdropping probability P e in FJ-PC scheme is similar to the derivation of Equation (15) in Theorem 4 and the main difference is the cumulative interference from jammers. In particular, the calculation of interference from nth layer jammers in FJ-PC scheme I j is similar to Equation (A3) in Appendix A, which is shown in the following equation:
I j ( n ) = 4 k = 1 n P j ( k ) { 2 d · ( 2 k 3 ) 2 + ( 2 k 1 ) 2 α + d · 2 ( 2 k 1 ) 2 α } .
Then we have the averaged cumulative interference from all the jammers as follows,
E [ I j ] = E [ m = 1 n I j ( m ) ] .
According to the definition of the probability of eavesdropping attack P ( E ) , we have
P ( E ) = 1 ( 1 P e ) N ,
where P e can be replaced by the different values as specified in Non-Jam scheme, FJ-Reg scheme, FJ-Ran scheme and FJ-PC Scheme, which can be obtained by Theorem 1, Theorem 2, Theorem 3 and Theorem 5, respectively. In the next section, we will present numerical results of P ( E ) based on the above schemes.

5. Numerical Results

In this section, we first present the numerical results of the probability of eavesdropping attacks P ( E ) with comparisons among different schemes in Section 5.1. Then we will show the impacts of friendly jammers on the legitimate communications in Section 5.2.

5.1. Comparisons of Different Schemes

In the first set of results, we compare the probability of eavesdropping attacks P ( E ) of FJ-Ran scheme with that of Non-Jam scheme. Note that the larger node density λ 2 in FJ-Ran scheme and the smaller d in FJ-Reg scheme imply the higher cost (i.e., more jammers are deployed in the network). As shown in Figure 3, the results of Non-Jam scheme are shown in a dash curve and the results of FJ-Ran scheme are shown in solid curves with markers, where we choose the different values of node density λ 2 of friendly jammers (ranging from 0.2 to 2.0) and the value of node density λ 1 of legitimate user is 0.5. It is shown in Figure 3 that the Non-Jam scheme always has higher values of P ( E ) than the FJ-Ran scheme, implying that using friendly jammers in WSN can effectively reduce the probability of eavesdropping attacks.
It is also shown in Figure 3 that the probability of eavesdropping attacks P ( E ) decreases with the increment of jammers density λ 2 , implying that adding more jammers can further improve the effect of mitigating eavesdropping attacks. For example, when α = 4 and the threshold T = 5 dB (as shown in Figure 3b), P ( E ) of the Non-Jam scheme is 0.719 while P ( E ) of FJ-Ran scheme is reduced to 0.393 with jammers density λ 2 = 0 . 8 and 0.211 with jammers density λ 2 = 2 . 0 .
In the second set of results, we compare the probability of eavesdropping attacks P ( E ) of the FJ-Reg scheme with that of the Non-Jam scheme. Figure 4 shows the results, where a dash curve represents P ( E ) of the Non-Jam scheme and solid curves with markers depict the results of FJ-Reg scheme. Similar to Figure 3, we find that using friendly jammers can always reduce the eavesdropping probability compared with the Non-Jam scheme. Moreover, it is shown in Figure 4 that the probability of eavesdropping attacks P ( E ) heavily depends on both the channel conditions and system parameter d. Specifically, it is shown in Figure 4b that the probability of eavesdropping attack P ( E ) decreases with the decreased values of d. In fact, the d in FJ-Reg scheme plays a similar role to jammer density λ 2 in FJ-Ran scheme. In other words, decreasing d is equivalent to the effect of increasing jammer density λ 2 . Take Figure 4b as an example again. When the threshold is T = 5 dB and α = 4 , P ( E ) of Non-Jam scheme is 0.7176 while P ( E ) becomes 0.072 with d = 0 . 2 , implying that using more friendly jammers can further reduce the eavesdropping probability.
In the third set of results, we compare the probability of eavesdropping attacks P ( E ) of FJ-PC scheme with that of Non-Jam scheme. Figure 5 shows the results, where a dash curve represents P ( E ) of Non-Jam scheme and solid curves with markers depict the results of FJ-PC scheme. Similar to Figure 3 and Figure 4, we find that using friendly jammers can always reduce the eavesdropping probability compared with the Non-Jam scheme. Furthermore, we also find that the FJ-PC scheme can further reduce the eavesdropping probability compared with FJ-Reg scheme. This is due to the power assigning strategy in our FJ-PC scheme. In particular, the eavesdropping capability of the eavesdropper is significantly weakened by the jammers in the first layer, which have been assigned with higher power as they are much closer to the eavesdropper than other jammers in other layers. Another benefit of the FJ-PC scheme is that it has less impairment to legitimate communications compared with FJ-Reg and FJ-Ran schemes. The following results will further confirm this observation.

5.2. Impacts of Friendly Jammers on Legitimate Transmissions

Another concern is to investigate whether friendly jammers will significantly affect the legitimate transmissions. In order to differentiate the effect with jammers and the effect without jammers in terms of the eavesdropping probability and the transmission probability, we define the eavesdropping deviation D E and the transmission deviation D C as follows.
Definition 4.
Eavesdropping deviation D E is equal to the difference between the eavesdropping probability P ( E ) without jammers and the eavesdropping probability P ( E ) with jammers.
Definition 5.
Transmission deviation D C is equal to the difference between the transmission probability P ( C ) without jammers and the transmission probability P ( C ) with jammers.
We then derive the eavesdropping deviation D E and the transmission deviation D C in the first case of comparing FJ-Ran scheme with Non-Jam scheme. In particular, we have D E ( Ran ) = P Non - Jam ( E ) P FJ - Ran ( E ) , where P Non - Jam ( E ) denotes the eavesdropping probability of Non-Jam scheme and P FJ - Ran ( E ) denotes the eavesdropping probability of FJ-Ran scheme. Besides, we have D C ( Ran ) = P Non - Jam ( C ) P FJ - Ran ( C ) , where P Non - Jam ( C ) denotes the transmission probability of Non-Jam scheme and P FJ - Ran ( C ) denotes the transmission probability of FJ-Ran scheme. Note that P ( C ) can be calculated by [31] and we omit the detailed derivations in this paper.
Table 2 shows the comparison results. As shown in Table 2, the eavesdropping deviation is much larger than the transmission deviation at the same network settings, implying that using jammers in WSNs will not significantly affect the legitimate communications compared with the reductions on the eavesdropping probability. For example, when λ 2 = 2 . 0 , D E = 0 . 5178 while there is less than 0 . 1 reduction on the transmission probability (i.e., D C = 0 . 0963 ).
Similarly, we derive the eavesdropping deviation D E and the transmission deviation D C in the second case of comparing FJ-Reg scheme with Non-Jam scheme. Table 3 shows the comparison results. It is shown in Table 3 that FJ-Reg scheme can also significantly reduce the eavesdropping probability with only minor influence on the legitimate transmissions (e.g., the reduction of P ( E ) is 0 . 6650 while the reduction of P ( C ) is only 0 . 1143 when d = 0 . 2 ).
We next derive the eavesdropping deviation D E and the transmission deviation D C in the third case of comparing the FJ-PC scheme with the Non-Jam scheme. Table 4 shows the comparison results. It is shown in Table 4 that the FJ-PC scheme can significantly reduce the eavesdropping probability with only minor influence on the legitimate transmissions. For example, the P ( E ) is 0.6128 and P ( c ) is 0.1729 in the Non-Jam scheme and they become 0.1770 and 0.1367, respectively when FJ-PC scheme with d = 0 . 6 is applied. At this time, the reduction of P ( E ) is 61 . 8 % while the reduction of P ( C ) is only 12 . 5 % when d = 0 . 6 implying that the FJ-PC scheme can significantly reduce the eavesdropping probability while maintaining the minor impairment to the legitimate communications.

6. Conclusions

Wireless sensor networks (WSNs) are serving as a crucial component in cyber-physical social sensing systems. The security of WSNs has received extensive attention recently. One of the serious security threats in WSNs is eavesdropping attacks. In this paper, a novel anti-eavesdropping scheme has been proposed to alleviate eavesdropping attacks in WSNs. In particular, we deploy a number of friendly jammers that emit artificial noise to mitigate the eavesdropping capability of adversaries. More specifically, we consider three types of jamming schemes, such as regular placement of jammers (FJ-Reg), random placement of jammers (FJ-Ran) and regular placement of jammers with power control (FJ-PC). We establish a theoretical model to evaluate the performance of these jamming schemes. Our results show that to introduce friendly jammers in WSNs can significantly reduce the eavesdropping probability without the significant influence on the legitimate communications with the appropriate placement of jammers and the proper assignment of emitting power of jammers.

Acknowledgments

The work described in this paper was supported by Macao Science and Technology Development Fund under Grant No. 096/2013/A3 and the National Natural Science Foundation of China under Grant No. 61672170. The authors would like to thank Gordon K.-T. Hon for his excellent comments.

Author Contributions

Xuran Li derived the results, conducted the numeral results and wrote the paper. Hong-Ning Dai supervised the work and revised versions. Hao Wang gave valuable suggestions on the motivation of conducting analysis on protective jamming schemes in wireless sensor networks and assisted in revising the paper. Hong Xiao contributed to revising and proofreading of the article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Lemma 1.
We consider a coordinate system that is centered at the eavesdropper as shown in Figure 1. Since jammers are placed in a grid, each friendly jammer is 2 d away from its nearest neighbor in the same axis. The transmitting power of each jammer is assumed to be P J , which is same as the transmitting power of legitimate transmitters. From the channel model defined in Section 3.2, the radio signal received at an eavesdropper experiences both Rayleigh fading and the path loss. We consider the path loss effect first and then extend our analysis with consideration of Rayleigh fading effect.
We first calculate the cumulative interference emitted from jammers at the 1st layer, which is shown as follows,
I j ( 1 ) = 4 P J 2 d α .
Similarly, we have the interference from jammers at the 2nd layer as follows,
I j ( 2 ) = 4 P J 2 10 d α + 3 2 d α .
The interference from jammers at the 3rd layer is given by
I j ( 2 ) = 4 P J 2 · 10 d α + 3 2 d α + 5 2 d α .
Following the similar analysis, we have the interference from jammers at the ( n 1 ) -th layer as follows,
I j ( n 1 ) = 4 P J { 2 · [ d · 1 + ( 2 n 3 ) 2 α + d · 9 + ( 2 n 3 ) 2 α + + d · ( 2 n 5 ) 2 + ( 2 n 3 ) 2 α ] + d · 2 ( 2 n 3 ) 2 α } .
Then, the interference from the n-th layer is given by
I j ( n ) = 4 P J { 2 · [ d · 1 2 + ( 2 n 1 ) 2 α + d · 9 + ( 2 n 1 ) 2 α + + d · ( 2 n 3 ) 2 + ( 2 n 1 ) 2 α ] + d · 2 ( 2 n 1 ) 2 α } .
Summarizing them all, we then have
I j ( n ) = 4 P J k = 1 n 2 d · ( 2 k 3 ) 2 + ( 2 k 1 ) 2 α + d · 2 ( 2 k 1 ) 2 α .
We next have the cumulative interference from all the jammers as follows,
I j = m = 1 n I j ( m ) .
Considering the Rayleigh fading effect, we finally prove the expectation the cumulative interference from all the jammers as given in Lemma 1. ☐

Appendix B

Proof of Lemma 2.
We assume that the transmitter is located between kth layer and k + 1 th layer of the jammers. Since the jammers are distributed in a symmetric manner (around the eavesdropper), we only need to calculate the cumulative interference from one corner of the plane (e.g., the north-east corner). Summing the cumulative interference from all the four corners, we can obtain the cumulative inference from all the jammers.
Firstly, we consider the interference caused from friendly jammers at the center location between 1st layer and 2nd layer as shown in Figure 1 (see the red dashed line). Interference caused by jammers at the mth layer, which is surrounded by the jammers at the kth layer is calculated as the following equation,
I j ( m ) = P j ( m ) { 2 1 2 · 2 d 2 + k m + 1 2 · 2 d 2 α + 2 3 2 · 2 d 2 + k m + 1 2 · 2 d 2 α + + 2 m 1 2 · 2 d 2 + k m + 1 2 · 2 d 2 α + 2 m 1 2 · 2 d 2 + k m + 3 2 · 2 d 2 α + + 2 m 1 2 · 2 d 2 + k + m 1 2 · 2 d 2 α + 2 m 3 2 · 2 d 2 + k + m 1 2 · 2 d 2 α + + 2 1 2 · 2 d 2 + k + m 1 2 · 2 d 2 α } .
Summing all the terms in Equation (B1), we then obtain the simplified expression of I j ( m ) as follows,
I j ( m ) = 2 P j ( m ) { v = 1 m v 1 2 · 2 d 2 + k m + 1 2 · 2 d 2 α + v 1 2 · 2 d 2 + k + m 1 2 · 2 d 2 α + w = k m + 1 k + m m 1 2 · 2 d 2 + w 1 2 · 2 d 2 α } .
Interference caused by jammers at the qth layer, which is placed outside of kth layer is calculated by this equation,
I j ( q ) = P j ( q ) { 2 1 2 · 2 d 2 + q k 1 2 · 2 d 2 α + 2 3 2 · 2 d 2 + q k 1 2 · 2 d 2 α + + 2 q 1 2 · 2 d 2 + q k 1 2 · 2 d 2 α + 2 q 1 2 · 2 d 2 + q k + 1 2 · 2 d 2 α + + 2 q 1 2 · 2 d 2 + q + k + 1 2 · 2 d 2 α + + 2 1 2 · 2 d 2 + q + k + 1 2 · 2 d 2 α } .
From Equation (B3) we can get the simplified expression of I j ( q ) as follows,
I j ( q ) = 2 P j ( q ) { s = 1 q s 1 2 · 2 d 2 + q k 1 2 · 2 d 2 α + s 1 2 · 2 d 2 + q + k + 1 2 · 2 d 2 α + z = q k 1 q + k q 1 2 · 2 d 2 + z + 1 2 · 2 d 2 α } .
Therefore, summing Equations (B2) and (B4), we obtain the cumulative interference of jammers at the location t 0 as the following equation,
I k , t 0 = m = 1 k v = 1 m 2 P j ( m ) v 1 2 · 2 d 2 + k m + 1 2 · 2 d 2 α + v 1 2 · 2 d 2 + k + m 1 2 · 2 d 2 α + m = 1 k w = k m + 1 k + m 2 P j ( m ) m 1 2 · 2 d 2 + w 1 2 · 2 d 2 α + q = k n z = q k 1 q + k 2 P j ( q ) q 1 2 · 2 d 2 + z + 1 2 · 2 d 2 α + q = k n s = 1 q 2 P j ( q ) s 1 2 · 2 d 2 + q k 1 2 · 2 d 2 α + s 1 2 · 2 d 2 + q + k + 1 2 · 2 d 2 α
The interference at t x can be calculated by the similar approach in Equation (14).
We denote the number of all the possible locations of jammers placed between kth layer and ( k + 1 )-th layer as N k , which is equal to 2 k + 1 2 2 k 1 2 = 8 k . Finally, the averaged interference is calculated by taking an average over all the possible locations. The detailed calculation is shown as the following equation,
E [ I c ] = k = 1 n 4 I k , t 0 + 4 I k , t k + 8 t = t 1 t k 1 I k , t k = 1 n 8 k = k = 1 n I k , t 0 + I k , t k + 2 t = t 1 t k 1 I k , t k = 1 n 2 k .

References

  1. Lee, E.A. The past, present and future of cyber-physical systems: A focus on models. Sensors 2015, 15, 4837–4869. [Google Scholar] [CrossRef] [PubMed]
  2. Huang, C.; Marshall, J.; Wang, D.; Dong, M. Towards Reliable Social Sensing in Cyber-Physical-Social Systems. In Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Chicago, IL, USA, 23–27 May 2016.
  3. Dong, M.; Ota, K.; Liu, A. RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks. IEEE Int. Things J. 2016, 3, 511–519. [Google Scholar] [CrossRef]
  4. Tang, Z.; Liu, A.; Huang, C. Social-Aware Data Collection Scheme Through Opportunistic Communication in Vehicular Mobile Networks. IEEE Access 2016, 4, 6480–6502. [Google Scholar] [CrossRef]
  5. Hu, Y.; Dong, M.; Ota, K.; Liu, A.; Guo, M. Mobile Target Detection in Wireless Sensor Networks with Adjustable Sensing Frequency. IEEE Syst. J. 2016, 10, 1160–1171. [Google Scholar] [CrossRef]
  6. Zhang, Q.; Liu, A. An unequal redundancy level-based mechanism for reliable data collection in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 258. [Google Scholar] [CrossRef]
  7. Liu, Y.; Dong, M.; Ota, K.; Liu, A. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2013–2027. [Google Scholar] [CrossRef]
  8. Wagner, D.; Schneier, B.; Kelsey, J. Cryptanalysis of the cellular message encryption algorithm. In Advances in Cryptology–CRYPTO ’97; Springer: Berlin/Heidelberg, Germany, 1997. [Google Scholar]
  9. 3GPP. General Report on the Design, Speification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms; Technical Report; 3GPP: Valbonne, France, 2009. [Google Scholar]
  10. IEEE Standards Association. 802.11a-1999—IEEE Standard for Telecommunications and Information Exchange Between Systems— LAN/MAN Specific Requirements—Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: High Speed Physical Layer in the 5 GHz Band; Technical Report; IEEE: Piscataway, NJ, USA, 1999. [Google Scholar]
  11. IEEE Standards Association. 802.11i-2004—IEEE Standard for Tnformation Technology—Telecommunications and Information Exchange Between Systems— Local and Metropolitan Area Networks-Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 6: Medium Access Control (MAC) Security Enhancements; Technical Report; IEEE: Piscataway, NJ, USA, 2004. [Google Scholar]
  12. Shim, K.A. A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks. IEEE Commun. Surv. Tutorials 2016, 18, 577–601. [Google Scholar] [CrossRef]
  13. Han, Z.; Marina, N.; Debbah, M.; Hjørungnes, A. Physical Layer Security Game: Interaction Between Source, Eavesdropper, and Friendly Jammer. EURASIP J. Wirel. Commun. Netw. 2009, 2009. [Google Scholar] [CrossRef]
  14. Zhu, Q.; Saad, W.; Han, Z.; Poor, H.; Basar, T. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In Proceedings of the 2010 Military Communications Conference, Baltimore, MD, USA, 7–10 November 2011.
  15. Vilela, J.P.; Bloch, M.; Barros, J.; McLaughlin, S.W. Wireless Secrecy Regions With Friendly Jamming. IEEE Trans. Inf. Forensics Secur. 2011, 6, 256–266. [Google Scholar] [CrossRef]
  16. Sankararaman, S.; Abu-Affash, K.; Efrat, A.; Eriksson-Bique, S.D.; Polishchuk, V.; Ramasubramanian, S.; Segal, M. Optimization Schemes for Protective Jamming. In Proceedings of the 13th ACM MobiHoc, Hilton Head Island, SC, USA, 11–14 June 2012.
  17. Kim, Y.S.; Tague, P.; Lee, H.; Kim, H. A Jamming Approach to Enhance Enterprise Wi-Fi Secrecy Through Spatial Access Control. Wirel. Netw. 2015, 21, 2631–2647. [Google Scholar] [CrossRef]
  18. IEEE Standards Association. IEEE 802.15.4 Enabling Pervasive Wireless Sensor Networks; Technical Report; IEEE: Piscataway, NJ, USA, 2011. [Google Scholar]
  19. Lakshmanan, S.; Tsao, C.; Sivakumar, R.; Sundaresan, K. Securing Wireless Data Networks against Eavesdropping using Smart Antennas. In Proceedings of the 28th International Conference on Distributed Computing Systems, Beijing, China, 17–20 June 2008.
  20. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
  21. Ren, K.; Su, H.; Wang, Q. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun. 2011, 18, 6–12. [Google Scholar] [CrossRef]
  22. Zafer, M.; Agrawal, D.; Srivatsa, M. Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary. IEEE/ACM Trans. Netw. 2012, 20, 1440–1451. [Google Scholar] [CrossRef]
  23. Zeng, K. Physical layer key generation in wireless networks: Challenges and opportunities. IEEE Commun. Mag. 2015, 53, 33–39. [Google Scholar] [CrossRef]
  24. Edman, M.; Kiayias, A.; Tang, Q.; Yener, B. On the Security of Key Extraction From Measuring Physical Quantities. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1796–1806. [Google Scholar] [CrossRef]
  25. Savry, O.; Pebay-Peyroula, F.; Dehmas, F.; Robert, G.; Reverdy, J. RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? In Proceedings of the 2007 Cryptographic Hardware and Embedded Systems, Vienna, Austria, 10–13 September 2007; pp. 334–345.
  26. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutorials 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  27. Hassanieh, H.; Wang, J.; Katabi, D.; Kohno, T. Securing RFIDs by Randomizing the Modulation and Channel. In Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), Oakland, CA, USA, 4–6 May 2015.
  28. Kao, J.C.; Marculescu, R. Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks. IEEE Trans. Comput. 2007, 56, 1009–1023. [Google Scholar] [CrossRef]
  29. Bashar, S.; Ding, Z. Optimum Power Allocation against Information Leakage in Wireless Network. In Proceedings of the 2009 Global Telecommunications Conference, Honolulu, HI, USA, 1–4 December 2009; pp. 1–6.
  30. Gamal, A.E.; Mammen, J.; Prabhakar, B.; Shah, D. Optimal throughput-delay scaling in wireless networks-part I: The fluid model. IEEE Trans. Inf. Theory 2006, 52, 2568–2592. [Google Scholar] [CrossRef]
  31. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A Tractable Approach to Coverage and Rate in Cellular Networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef]
  32. Min, G.; Wu, Y.; Al-Dubai, A.Y. Performance Modelling and Analysis of Cognitive Mesh Networks. IEEE Trans. Commun. 2012, 60, 1474–1478. [Google Scholar]
  33. Wu, Y.; Min, G.; Al-Dubai, A.Y. A New Analytical Model for Multi-Hop Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 2012, 11, 1643–1648. [Google Scholar] [CrossRef]
  34. Wu, Y.; Min, G.; Yang, L.T. Performance Analysis of Hybrid Wireless Networks Under Bursty and Correlated Traffic. IEEE Trans. Veh. Technol. 2013, 62, 449–454. [Google Scholar] [CrossRef]
Figure 1. FJ-Reg Scheme: every jammer is placed at a gray square. Note that we only show a part of the whole network.
Figure 1. FJ-Reg Scheme: every jammer is placed at a gray square. Note that we only show a part of the whole network.
Sensors 16 01987 g001
Figure 2. FJ-Ran Scheme: every jammer is randomly placed according to homogeneous Poisson Point Process (PPP). Note that we only show a part of the whole network.
Figure 2. FJ-Ran Scheme: every jammer is randomly placed according to homogeneous Poisson Point Process (PPP). Note that we only show a part of the whole network.
Sensors 16 01987 g002
Figure 3. Probability of eavesdropping attacks P ( E ) with FJ-Ran scheme (PPP) versus Non-Jam scheme when α = 3 , 4 , 5 with SINR threshold T ranging from 0 dB to 20 dB .
Figure 3. Probability of eavesdropping attacks P ( E ) with FJ-Ran scheme (PPP) versus Non-Jam scheme when α = 3 , 4 , 5 with SINR threshold T ranging from 0 dB to 20 dB .
Sensors 16 01987 g003
Figure 4. Probability of eavesdropping attacks P ( E ) with FJ-Reg scheme (Grid) versus Non-Jam scheme when α = 3 , 4 , 5 with SINR threshold T ranging from 0 dB to 20 dB .
Figure 4. Probability of eavesdropping attacks P ( E ) with FJ-Reg scheme (Grid) versus Non-Jam scheme when α = 3 , 4 , 5 with SINR threshold T ranging from 0 dB to 20 dB .
Sensors 16 01987 g004
Figure 5. Probability of eavesdropping attacks P ( E ) with FJ-PC scheme versus Non-Jam scheme when ζ = 2 , 10 , 20 with SINR threshold T ranging from 0 dB to 20 dB .
Figure 5. Probability of eavesdropping attacks P ( E ) with FJ-PC scheme versus Non-Jam scheme when ζ = 2 , 10 , 20 with SINR threshold T ranging from 0 dB to 20 dB .
Sensors 16 01987 g005
Table 1. Comparison of related anti-eavesdropping schemes in WSNs.
Table 1. Comparison of related anti-eavesdropping schemes in WSNs.
EncryptionArtificial NoisePower Control
References [8,9,10,11,18,21,22,23,24] [25,26,27] [28]
Limitationscomputational intensive and power consumingtoo specific (only apply for some specific scenarios)deteriorate legitimate communications
Table 2. Eavesdropping deviation and transmission deviation of comparing FJ-Ran scheme with Non-Jam scheme when T = 10 dB and α = 4 .
Table 2. Eavesdropping deviation and transmission deviation of comparing FJ-Ran scheme with Non-Jam scheme when T = 10 dB and α = 4 .
Density λ 2 Eavesdropping deviation D E ( Ran ) Transmission deviation D C ( Ran )
0.20.11200.0303
0.80.33160.0718
1.40.44700.0880
2.00.51780.0963
Table 3. Eavesdropping deviation and transmission deviation of comparing FJ-Reg scheme with Non-Jam scheme when T = 10 dB and α = 4 .
Table 3. Eavesdropping deviation and transmission deviation of comparing FJ-Reg scheme with Non-Jam scheme when T = 10 dB and α = 4 .
Distance dEavesdropping deviation D E ( Reg ) Transmission deviation D C ( Reg )
0.20.66500.1143
0.40.51950.0977
0.60.34670.0742
0.80.20540.0500
Table 4. Eavesdropping deviation and transmission deviation of comparing FJ-PC scheme with Non-Jam scheme when T = 10 dB , ζ = 10 and α = 4 .
Table 4. Eavesdropping deviation and transmission deviation of comparing FJ-PC scheme with Non-Jam scheme when T = 10 dB , ζ = 10 and α = 4 .
Distance dEavesdropping deviation D E ( PC ) Transmission deviation D C ( PC )
0.40.49090.0594
0.50.43580.0362
0.60.37880.0217
0.70.32340.0132

Share and Cite

MDPI and ACS Style

Li, X.; Dai, H.-N.; Wang, H.; Xiao, H. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks. Sensors 2016, 16, 1987. https://doi.org/10.3390/s16121987

AMA Style

Li X, Dai H-N, Wang H, Xiao H. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks. Sensors. 2016; 16(12):1987. https://doi.org/10.3390/s16121987

Chicago/Turabian Style

Li, Xuran, Hong-Ning Dai, Hao Wang, and Hong Xiao. 2016. "On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks" Sensors 16, no. 12: 1987. https://doi.org/10.3390/s16121987

APA Style

Li, X., Dai, H. -N., Wang, H., & Xiao, H. (2016). On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks. Sensors, 16(12), 1987. https://doi.org/10.3390/s16121987

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop