Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming

Authors

  • Dang The Hung Le Quy Don Technical University
  • Tran Trung Duy Posts and Telecommunications Institute of Technology image/svg+xml
  • Do Quoc Trinh Le Quy Don Technical University

DOI:

https://doi.org/10.4108/eai.28-3-2019.157120

Keywords:

Fountain Codes, LEACH networks, physical-layer security, cooperative jamming, outage probability, intercept probability

Abstract

In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique.

Downloads

Download data is not yet available.

Downloads

Published

28-03-2019

How to Cite

Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming. (2019). EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 6(18), e2. https://doi.org/10.4108/eai.28-3-2019.157120

Most read articles by the same author(s)