On performance analysis of protective jamming schemes in wireless sensor networks

Xuran Li, Hong Ning DAI*, Hao WANG, Hong XIAO

*Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

6 Citations (Scopus)

Abstract

Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

Original languageEnglish
Article number1987
JournalSensors (Switzerland)
Volume16
Issue number12
DOIs
Publication statusPublished - 24 Nov 2016
Externally publishedYes

Bibliographical note

Funding Information:
The work described in this paper was supported by Macao Science and Technology Development Fund under Grant No. 096/2013/A3 and the National Natural Science Foundation of China under Grant No. 61672170. The authors would like to thank Gordon K.-T. Hon for his excellent comments.

Publisher Copyright:
© 2016 by the authors; licensee MDPI, Basel, Switzerland.

Keywords

  • Analysis
  • Friendly jamming
  • Security
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'On performance analysis of protective jamming schemes in wireless sensor networks'. Together they form a unique fingerprint.

Cite this