Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming

Authors

  • Dang The Hung Le Quy Don Technical University image/svg+xml
  • Tran Trung Duy Posts and Telecommunications Institute of Technology
  • Do Quoc Trinh Le Quy Don Technical University image/svg+xml

DOI:

https://doi.org/10.4108/eai.28-3-2019.157120

Keywords:

Fountain Codes, LEACH networks, physical-layer security, cooperative jamming, outage probability, intercept probability

Abstract

In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.

Downloads

Download data is not yet available.

Downloads

Published

28-03-2019

How to Cite

The Hung, D. ., Trung Duy, T. ., & Quoc Trinh, D. . (2019). Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 6(18), e2. https://doi.org/10.4108/eai.28-3-2019.157120