Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming
DOI:
https://doi.org/10.4108/eai.28-3-2019.157120Keywords:
Fountain Codes, LEACH networks, physical-layer security, cooperative jamming, outage probability, intercept probabilityAbstract
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.