Mushtaq Muhammad Umer, Jiang Hong, Owais Muhammad, Fuad A. Awwad, Emad A. A. Ismail
{"title":"Energy-Efficient and Resilient Secure Routing in Energy Harvesting Wireless Sensor Networks with Transceiver Noises: EcoSecNet Design and Analysis","authors":"Mushtaq Muhammad Umer, Jiang Hong, Owais Muhammad, Fuad A. Awwad, Emad A. A. Ismail","doi":"10.1155/2024/3570302","DOIUrl":null,"url":null,"abstract":"Cooperative energy harvesting wireless sensor networks (EH-WSNs) using energy-harvesting-based physical layer security (PLS) appears to be a promising way to meet information security and energy efficiency goals at the same time. PLS uses energy harvesting (EH) features to protect data while transmitting. This eliminates the need for traditional upper-layer data encryption. However, this method introduces new challenges, particularly in scenarios where potential adversaries can intercept sensitive information through network relays. When it comes to multihop, multipath cooperative EH-WSNs, it becomes even more complicated to optimize transmit power for EH while reducing eavesdropping risk. In this study, three routing protocols, direct route designation (DRD), casual route designation (CRD), and superlative route designation (SRD) are presented. The protocols will improve multihop, multipath cooperative EH-WSNs’ security in the presence of eavesdroppers as well as noises at the transceiver. In this framework, both source nodes and relay nodes use power-beaming techniques to make their data transmission operations easier. This study goes beyond the protocol recommendations by presenting comprehensive closed-form formulas and asymptotic outage probability analysis for each protocol under various eavesdropping attack scenarios, i.e., coordination and noncoordination of eavesdroppers. According to simulation data, the suggested SRD protocol outperforms the CRD and DRD protocols by 19% and 25%, respectively, when eavesdroppers are not coordinating. The suggested SRD protocol outperforms the CRD and DRD protocols by 28% and 32%, respectively, in terms of eavesdropper coordination.","PeriodicalId":1,"journal":{"name":"Accounts of Chemical Research","volume":null,"pages":null},"PeriodicalIF":16.4000,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Accounts of Chemical Research","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1155/2024/3570302","RegionNum":1,"RegionCategory":"化学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"CHEMISTRY, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
Cooperative energy harvesting wireless sensor networks (EH-WSNs) using energy-harvesting-based physical layer security (PLS) appears to be a promising way to meet information security and energy efficiency goals at the same time. PLS uses energy harvesting (EH) features to protect data while transmitting. This eliminates the need for traditional upper-layer data encryption. However, this method introduces new challenges, particularly in scenarios where potential adversaries can intercept sensitive information through network relays. When it comes to multihop, multipath cooperative EH-WSNs, it becomes even more complicated to optimize transmit power for EH while reducing eavesdropping risk. In this study, three routing protocols, direct route designation (DRD), casual route designation (CRD), and superlative route designation (SRD) are presented. The protocols will improve multihop, multipath cooperative EH-WSNs’ security in the presence of eavesdroppers as well as noises at the transceiver. In this framework, both source nodes and relay nodes use power-beaming techniques to make their data transmission operations easier. This study goes beyond the protocol recommendations by presenting comprehensive closed-form formulas and asymptotic outage probability analysis for each protocol under various eavesdropping attack scenarios, i.e., coordination and noncoordination of eavesdroppers. According to simulation data, the suggested SRD protocol outperforms the CRD and DRD protocols by 19% and 25%, respectively, when eavesdroppers are not coordinating. The suggested SRD protocol outperforms the CRD and DRD protocols by 28% and 32%, respectively, in terms of eavesdropper coordination.
期刊介绍:
Accounts of Chemical Research presents short, concise and critical articles offering easy-to-read overviews of basic research and applications in all areas of chemistry and biochemistry. These short reviews focus on research from the author’s own laboratory and are designed to teach the reader about a research project. In addition, Accounts of Chemical Research publishes commentaries that give an informed opinion on a current research problem. Special Issues online are devoted to a single topic of unusual activity and significance.
Accounts of Chemical Research replaces the traditional article abstract with an article "Conspectus." These entries synopsize the research affording the reader a closer look at the content and significance of an article. Through this provision of a more detailed description of the article contents, the Conspectus enhances the article's discoverability by search engines and the exposure for the research.