TY - JOUR
T1 - Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks
AU - Sun, Li
AU - Ren, Pinyi
AU - Du, Qinghe
AU - Wang, Yichen
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2016/2
Y1 - 2016/2
N2 - Cooperative relaying communications is an efficient paradigm for end-to-end data delivery in industrial wireless sensor networks. However, due to the broadcast nature of radio propagation, it is challenging to guarantee the secrecy of cooperative transmissions under eavesdropping attacks. To deal with this issue, a fountain-coding aided relaying scheme is proposed in this paper, for which all the source packets are first encoded with fountain codes (FCs) and then transmitted over the channels. Based on the basic characteristic of FC transmissions, a sufficient number of coded packets have to be successfully received to recover the original data. Therefore, transmission secrecy is guaranteed if the legitimate receiver can accumulate the required number of FC packets before the eavesdropper does. To satisfy this condition, a cooperative jamming method is utilized to worsen the received signal quality at the eavesdropper. By applying the constellation rotation approach, the information-bearing signal and the jamming signal are designed carefully to reduce the negative effect of the jamming procedure on the legitimate receiver. To evaluate how the scheme behaves in wireless fading channels, the authors propose a novel performance metric, i.e., the quality-of-service violating probability (QVP), and derive its closed-form expression. Compared to the commonly used metrics in physical-layer security such as secrecy outage probability, QVP can give a more comprehensive performance evaluation for the system, including the delay, the reliability, and the security level as well. Finally, the theoretical analysis is validated by simulation results.
AB - Cooperative relaying communications is an efficient paradigm for end-to-end data delivery in industrial wireless sensor networks. However, due to the broadcast nature of radio propagation, it is challenging to guarantee the secrecy of cooperative transmissions under eavesdropping attacks. To deal with this issue, a fountain-coding aided relaying scheme is proposed in this paper, for which all the source packets are first encoded with fountain codes (FCs) and then transmitted over the channels. Based on the basic characteristic of FC transmissions, a sufficient number of coded packets have to be successfully received to recover the original data. Therefore, transmission secrecy is guaranteed if the legitimate receiver can accumulate the required number of FC packets before the eavesdropper does. To satisfy this condition, a cooperative jamming method is utilized to worsen the received signal quality at the eavesdropper. By applying the constellation rotation approach, the information-bearing signal and the jamming signal are designed carefully to reduce the negative effect of the jamming procedure on the legitimate receiver. To evaluate how the scheme behaves in wireless fading channels, the authors propose a novel performance metric, i.e., the quality-of-service violating probability (QVP), and derive its closed-form expression. Compared to the commonly used metrics in physical-layer security such as secrecy outage probability, QVP can give a more comprehensive performance evaluation for the system, including the delay, the reliability, and the security level as well. Finally, the theoretical analysis is validated by simulation results.
KW - Cooperative relay transmissions
KW - QoS violating probability
KW - constellation rotation
KW - fountain codes
KW - physical-layer security
UR - https://www.scopus.com/pages/publications/84962611636
U2 - 10.1109/TII.2015.2509442
DO - 10.1109/TII.2015.2509442
M3 - 文章
AN - SCOPUS:84962611636
SN - 1551-3203
VL - 12
SP - 291
EP - 300
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
IS - 1
M1 - 7359181
ER -