2019
DOI: 10.4108/eai.28-3-2019.157120
|View full text |Cite
|
Sign up to set email alerts
|

Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming

Abstract: In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(21 citation statements)
references
References 24 publications
0
21
0
Order By: Relevance
“…Then, the D and E nodes attempt to decode the encoded packets. To recover the original data, the destination and eavesdropper have to correctly receive at least encoded packets, where , and is the decoding overhead which depends on concrete code design [ 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 ]. After receiving a sufficient number of the encoded packets for reconstructing the original data, the destination sends an ACK message to inform the source, and then the source stops its transmission.…”
Section: System Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…Then, the D and E nodes attempt to decode the encoded packets. To recover the original data, the destination and eavesdropper have to correctly receive at least encoded packets, where , and is the decoding overhead which depends on concrete code design [ 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 ]. After receiving a sufficient number of the encoded packets for reconstructing the original data, the destination sends an ACK message to inform the source, and then the source stops its transmission.…”
Section: System Modelmentioning
confidence: 99%
“…Moreover, a new FC construction method, which opportunistically adapts the coding strategy following outage prediction, is proposed in [ 54 ]. In [ 55 ], the authors analyzed the security-reliability trade-off for multi-hop low-energy adaptive clustering hierarchy (LEACH) networks employing FCs and CJ. The authors of [ 56 ] proposed a rateless codes-based communication protocol to provide security for wireless systems.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Then, the original data of the source can be recovered if the destination can obtain a sufficient number of Fountain packets. In [33][34][35][36][37], the PLS systems using FCs were proposed and analyzed. As mentioned in [33], the data transmission between the source and the destination is secure when the destination can receive enough number of Fountain packets before the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%