ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

EAVESDROPPING ATTACK IN INDUSTRIAL WIRELESS SENSOR NETWORK ON INTERCEPTED SIGNAL

Journal: International Education and Research Journal (Vol.3, No. 5)

Publication Date:

Authors : ;

Page : 797-800

Keywords : Intercept behavior; industrial wireless sensor networks; sensor scheduling; intercept probability; Nakagamifading;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper studies the intercept behavior of associate industrial wireless device network (WSN) consisting of a sink node associated multiple sensors within the presence of an eavesdropping offender, wherever the sensors transmit their detected info to the sink node through wireless links. As a result of the printed nature of radio radiation propagation, the wireless transmission from the sensors to the sink is pronto overheard by the snoop for interception functions. In associate information-theoretic sense, the secrecy capability of the wireless transmission is that the distinction between the data rate of the most link (from device to sink) which of the wiretap link (from device to eavesdropper). If the secrecy capability becomes non-positive as a result of the wireless weakening result, the sensor's information transmission might be with success intercepted by the snoop associated an intercept event happens during this case. However, in industrial environments, the presence of machinery obstacles, tinny frictions and engine vibrations makes the wireless weakening fluctuate drastically, leading to the degradation of the secrecy capability. As a consequence, associate optimum device planning theme is projected during this paper to shield the legitimate wireless transmission against the eavesdropping attack, wherever a device with the best secrecy capability is regular to transmit its detected info to the sink. Closed-form expressions of the chance of incidence of associate intercept event (called intercept probability) are derived for the standard round-robin planning and also the projected optimum planning schemes. Also, associate straight line intercept chance associate analysis is conducted to supply an insight into the impact of the device planning on the wireless security. Numerical results demonstrate that the projected device planning theme outperforms the standard round-robin planning in terms of the intercept chance.

Last modified: 2022-04-22 20:12:17