Abstract

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.

Highlights

  • Security is one of the important issues in wireless sensor networks (WSNs) due to the broadcast nature of wireless medium

  • In [23,24,25], the authors studied the performance of secondary networks in power beacons (PBs)-assisted underlay cognitive radio (PB-UCR), where the transmit power of secondary users was limited by both the harvested energy and the maximum interference levels required by primary users

  • This paper proposed and evaluated the secrecy performance of the transmit antenna selection (TAS)/selection combining (SC)-based multi-hop harvest-to-transmit cognitive WSNs under the joint impact of the interference constraint, the limited-energy source, and the hardware impairments

Read more

Summary

Introduction

Security is one of the important issues in wireless sensor networks (WSNs) due to the broadcast nature of wireless medium. In [11,12,13,14,15], cooperative relaying strategies were proposed to improve secrecy performance via increasing the channel capacity for the data links. In [23,24,25], the authors studied the performance of secondary networks in PB-assisted underlay cognitive radio (PB-UCR), where the transmit power of secondary users was limited by both the harvested energy and the maximum interference levels required by primary users. This paper deals with multi-hop secure communication networks in PB-UCR under impact of hardware impairments. In [33,34,35], cooperative multi-hop full-duplex relaying networks were proposed to enhance the end-to-end secrecy performance. WSNs. The proposed protocol can obtain energy efficiency and spectrum usage efficiency, enhance the reliability of data transmission, and improve the secrecy performance.

System Model
Average Transmit Power of the Secondary Transmitters
Simulation Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call