CFP last date
20 January 2025
Reseach Article

Implementing Physical Layer Security in Wireless Ad-hoc Networks and Wireless Sensor Networks with Reduced Outage and Bit Errors

by Shubham Joshi, Durgesh Mishra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 10
Year of Publication: 2020
Authors: Shubham Joshi, Durgesh Mishra
10.5120/ijca2020920543

Shubham Joshi, Durgesh Mishra . Implementing Physical Layer Security in Wireless Ad-hoc Networks and Wireless Sensor Networks with Reduced Outage and Bit Errors. International Journal of Computer Applications. 175, 10 ( Aug 2020), 20-25. DOI=10.5120/ijca2020920543

@article{ 10.5120/ijca2020920543,
author = { Shubham Joshi, Durgesh Mishra },
title = { Implementing Physical Layer Security in Wireless Ad-hoc Networks and Wireless Sensor Networks with Reduced Outage and Bit Errors },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2020 },
volume = { 175 },
number = { 10 },
month = { Aug },
year = { 2020 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number10/31488-2020920543/ },
doi = { 10.5120/ijca2020920543 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:24:39.723971+05:30
%A Shubham Joshi
%A Durgesh Mishra
%T Implementing Physical Layer Security in Wireless Ad-hoc Networks and Wireless Sensor Networks with Reduced Outage and Bit Errors
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 10
%P 20-25
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless ad-hoc networks (WANESTs) and Wireless Sensor Networks (WSNs) are typically de-centralized in nature with minimal pre-reliance on the network architecture. They are being extensively used for diverse applications such as military and defense, industrial automation, disaster management etc. Such networks generally are generally limited by their resources of data processing and memory due to large scale deployment and cost. One of the major challenges which WANETs and WSNs face is the possibility of data breach and security. Due to the limitations of memory and processing power, sophisticated encryption algorithms are often infeasible to be implemented for such networks in time critical applications. This poses a serious threat to the data transmission in the network. The way around the problem is the implementation of physical layer security (PLS) approaches, which can alleviate the issue. In this paper, an approach based on the generation of pseudo-noise sequences (PN Sequences) has been proposed so as to secure the data transfer. An adaptive clustering mechanism based on residual energy has also been proposed. The performance metrics of the proposed approach have been chosen as the bit error rate (BER) and the outage of the system. It has been shown that as the spreading factor increases, the BER of the system also increases thereby increasing the outage of the system which is a clear indication of the trade-off between the security and the reliability of the system.

References
  1. Mingfend Huan, Anfeng Liu , Neal N. Xiong, V. Tian Wang and Athanasios V. Vasilakos “A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems”, Vol:49, Issue-2,IEEE 2018.
  2. Y Xu, J Liu, O Takahashi, N Shiratori, “SOQR: Secure optimal QoS routing in wireless ad hoc networks”, 2017 IEEE Wireless Communications and Networking Conference (WCNC),
  3. Y Xu, J Liu, Y Shen, X Jiang, “Security/QoS-aware route selection in multi-hop wireless ad hoc networks”, 2016 IEEE International Conference on Communications (ICC)”, IEEE 2016
  4. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments, by Xiong Li ; Jianwei Niu Saru Kumari ; Fan Wu ; Arun Kumar Sangaiah ; Kim-Kwang Raymond Choo, Elsevier 2018
  5. Secure Routing Protocols for Wireless Sensor Networks, Reetu Singh ; Kajol Kathuria ; Anil Kumar Sagar , IEEE 2018
  6. WSN Security Mechanisms for CPS, Saqib Ali ; Taiseera Al Balushi ; Zia Nadir ; Omar Khadeer Hussain, Springer 2018
  7. ACO based key management routing mechanism for WSN security and data collection, Celestine Iwendi ; Zhiyong Zhang ; Xin Du, IEEE 2018
  8. Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks, Hui Zhao ; Youyu Tan ; Gaofeng Pan ; Yunfei Chen ; Nan Yang, IEEE 2017
  9. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols, Ivana Tomić ; Julie A. McCann, IEEE 2017
  10. An overview of Wireless Sensor Networks towards internet of things, Mustafa Kocakulak ; Ismail Butun, IEEE 2017
  11. Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring, Daojing He ; Sammy Chan ; Mohsen Guizani, IEEE 2017
  12. Security in software-defined wireless sensor networks: Threats, challenges and potential solutions ,Sean W. Pritchard ; Gerhard P. Hancke ; Adnan M. Abu-Mahfouz, “”, IEEE 2017
  13. A survey of security in wireless sensor networks ;Aditi Rani ; Sanjeet Kumar, IEEE 2017.
  14. “Improving the security of wireless sensor networks in an IoT environmental monitoring system”, Mauricio Tellez ; Samy El-Tawab ; Hossain M Heydari, , IEEE 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless ad-hoc networks (WANESTs) and Wireless Sensor Networks (WSNs) Physical Layer Security Bit Error Rate (BER) Outage Frequency Hopping.