Mohammed Ahmed Magzoub Albashier, Azlan Abdaziz, Hadhrami Abd. Ghani
{"title":"Performance analysis of physical layer security over different error correcting codes in wireless sensor networks","authors":"Mohammed Ahmed Magzoub Albashier, Azlan Abdaziz, Hadhrami Abd. Ghani","doi":"10.1109/WPMC.2017.8301806","DOIUrl":null,"url":null,"abstract":"Nowadays wireless sensor networks are becoming very important part in our daily life as it is adopted in various applications. However wireless sensor networks are vulnerable to many attacks such as denial of service. Therefore, the number of security threats has increased dramatically due to the increase in the number of applications adopted wireless sensor networks. Physical layer security is considered to be more robust than upper layers security. In this paper we address the problem of evaluating popular techniques (Reed Solomon techniques and scrambled error correcting) in term of security gap which is the difference between the signal to noise ratio of the legitimate receiver and the signal to noise ratio of the eavesdropper. Our work compare scrambled t-error correcting codes with Reed Solomon using bit error rate and security gap. Experiments and analysis showed that Reed Solomon has almost the same security gap as scrambled error correcting codes which requires more computational power than Reed Solomon.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WPMC.2017.8301806","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Nowadays wireless sensor networks are becoming very important part in our daily life as it is adopted in various applications. However wireless sensor networks are vulnerable to many attacks such as denial of service. Therefore, the number of security threats has increased dramatically due to the increase in the number of applications adopted wireless sensor networks. Physical layer security is considered to be more robust than upper layers security. In this paper we address the problem of evaluating popular techniques (Reed Solomon techniques and scrambled error correcting) in term of security gap which is the difference between the signal to noise ratio of the legitimate receiver and the signal to noise ratio of the eavesdropper. Our work compare scrambled t-error correcting codes with Reed Solomon using bit error rate and security gap. Experiments and analysis showed that Reed Solomon has almost the same security gap as scrambled error correcting codes which requires more computational power than Reed Solomon.