Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks

Research output: Contribution to journalArticlepeer-review

86 Scopus citations

Abstract

Cooperative relaying communications is an efficient paradigm for end-to-end data delivery in industrial wireless sensor networks. However, due to the broadcast nature of radio propagation, it is challenging to guarantee the secrecy of cooperative transmissions under eavesdropping attacks. To deal with this issue, a fountain-coding aided relaying scheme is proposed in this paper, for which all the source packets are first encoded with fountain codes (FCs) and then transmitted over the channels. Based on the basic characteristic of FC transmissions, a sufficient number of coded packets have to be successfully received to recover the original data. Therefore, transmission secrecy is guaranteed if the legitimate receiver can accumulate the required number of FC packets before the eavesdropper does. To satisfy this condition, a cooperative jamming method is utilized to worsen the received signal quality at the eavesdropper. By applying the constellation rotation approach, the information-bearing signal and the jamming signal are designed carefully to reduce the negative effect of the jamming procedure on the legitimate receiver. To evaluate how the scheme behaves in wireless fading channels, the authors propose a novel performance metric, i.e., the quality-of-service violating probability (QVP), and derive its closed-form expression. Compared to the commonly used metrics in physical-layer security such as secrecy outage probability, QVP can give a more comprehensive performance evaluation for the system, including the delay, the reliability, and the security level as well. Finally, the theoretical analysis is validated by simulation results.

Original languageEnglish
Article number7359181
Pages (from-to)291-300
Number of pages10
JournalIEEE Transactions on Industrial Informatics
Volume12
Issue number1
DOIs
StatePublished - Feb 2016

Keywords

  • Cooperative relay transmissions
  • QoS violating probability
  • constellation rotation
  • fountain codes
  • physical-layer security

Fingerprint

Dive into the research topics of 'Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this