2016
DOI: 10.3390/s16121987
|View full text |Cite
|
Sign up to set email alerts
|

On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…It is feasible in a practical industrial environment that the eavesdropper has the difficulty of entering the protected network area (e.g., the barbed wire entanglement around a plant). However, we can also apply our previous results in [ 27 ] to analyze the scenario in which an eavesdropper enters the network area. In particular, we consider that friendly jammers are regularly placed at deterministic locations [ 27 ] and the eavesdropper is located at the center of this area, as shown in Figure 9 .…”
Section: Discussionmentioning
confidence: 99%
“…It is feasible in a practical industrial environment that the eavesdropper has the difficulty of entering the protected network area (e.g., the barbed wire entanglement around a plant). However, we can also apply our previous results in [ 27 ] to analyze the scenario in which an eavesdropper enters the network area. In particular, we consider that friendly jammers are regularly placed at deterministic locations [ 27 ] and the eavesdropper is located at the center of this area, as shown in Figure 9 .…”
Section: Discussionmentioning
confidence: 99%
“…However, cryptosystems can only help hiding the meaning of information during transmissions, but not the existence of the information itself. In addition, even though cryptosystems increase the difficulty of understanding the true meaning of information for eavesdroppers, it is still possible for the eavesdroppers to access all the information as indicated in [24]. The reason may owe to the lightweight cryptosystems that have only been used in IIoT because of in sufficient computing capability IIoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…During the last months CPSS has become a very popular research topic. Different works about the applications of the CPSS paradigm to social Big Data [ 32 ], robotics [ 26 ], people tracking [ 27 ] and wireless sensor networks (WSN) [ 33 ] have been recently reported. In most of these papers, experimental validations are based on laboratory deployments, theoretical analyses or concept proofs [ 24 ].…”
Section: Introductionmentioning
confidence: 99%