EAVESDROPPING ATTACK IN INDUSTRIAL WIRELESS SENSOR NETWORK ON INTERCEPTED SIGNAL

HAFSA MASEERA , M. NARAYANA

Abstract


This paper studies the intercept behavior of associate industrial wireless device network (WSN) consisting of a sink node associated multiple sensors within the presence of an eavesdropping offender, wherever the sensors transmit their detected info to the sink node through wireless links. As a result of the printed nature of radio radiation propagation, the wireless transmission from the sensors to the sink is pronto overheard by the snoop for interception functions. In associate information-theoretic sense, the secrecy capability of the wireless transmission is that the distinction between the data rate of the most link (from device to sink) which of the wiretap link (from device to eavesdropper). If the secrecy capability becomes non-positive as a result of the wireless weakening result, the sensor’s information transmission might be with success intercepted by the snoop associated an intercept event happens during this case. However, in industrial environments, the presence of machinery obstacles, tinny frictions and engine vibrations makes the wireless weakening fluctuate drastically, leading to the degradation of the secrecy capability. As a consequence, associate optimum device planning theme is projected during this paper to shield the legitimate wireless transmission against the eavesdropping attack, wherever a device with the best secrecy capability is regular to transmit its detected info to the sink. Closed-form expressions of the chance of incidence of associate intercept event (called intercept probability) are derived for the standard round-robin planning and also the projected optimum planning schemes. Also, associate straight line intercept chance associate analysis is conducted to supply an insight into the impact of the device planning on the wireless security. Numerical results demonstrate that the projected device planning theme outperforms the standard round-robin planning in terms of the intercept chance.

Keywords


Intercept behavior, industrial wireless sensor networks, sensor scheduling, intercept probability, Nakagamifading.

Full Text:

PDF

References


W. Shen, T. Zhang, F. Barac, and M. Gidlund, “PriorityMAC: A priority enhanced MAC protocol for critical traffic in industrial wireless sensorand actuator networks,” IEEE Trans. Industrial Informatics, vol. 10, no.1, pp. 824-835, Feb. 2014.

J.-C. Wang, C.-H. Lin, E. Siahaan, B.-W. Chen, and H.-L. Chuang,“Mixed sound event verification on wireless sensor network for home automation,” IEEE Trans. Industrial Informatics, vol. 10, no. 1, pp. 803-812, Feb. 2014.

R. C. Luo and O. Chen, “Mobile sensor node deployment and asynchronous power management for wireless sensor networks,” IEEE Trans.Industrial Electronics, vol. 59, no. 5, pp. 2377-2385, May 2012.

N. Marchenko, T. Andre, G. Brandner, W. Masood, and C. Bettstetter,“An experimental study of selective cooperative relaying in industrialwireless sensor networks,” IEEE Trans. Industrial Informatics, vol. 10, no. 3, pp. 1806-1816, Aug. 2014.

O. Kreibich, J. Neuzil, and R. Smid, “Quality-based multiple-sensor fusion in an industrial wireless sensor network for MCM,” IEEE Trans.Industrial Electronics, vol. 61, no. 9, pp. 4903-4911, Sept. 2014.

T. M. Chiwewe and G. P. Hancke, “A distributed topology controltechnique for low interference and energy efficiency in wireless sensor networks,” IEEE Trans. Industrial Informatics, vol. 8, no. 1, pp. 11-19, Feb. 2012.

P. T. A. Quang and D.-S. Kim, “Enhancing real-time delivery of gradient routing for industrial wireless sensor networks,” IEEE Trans. Industrial Informatics, vol. 8, no. 1, pp. 61-68, Feb. 2012.

Q. Chi, H. Yan, C. Zhang, Z. Pang, and L. Xu, “A reconfigurable smart sensor interface for industrial WSN in IoT environment ,” IEEE Trans. Industrial Informatics, vol. 10, no. 2, pp. 1417-1425 , May 2014.

F. Gandino, B. Montrucchio, and M. Rebaudengo, “Key management for static wireless sensor networks with node adding,” IEEE Trans. Industrial Informatics, vol. 10, no. 2, pp. 1133-1143, May 2014.

M. Cheminod, L. Durante, and A. Valenzano, “Review of security issues in industrial networks,” IEEE Trans. Industrial Informatics, vol. 9, no.1, pp. 277-293, Feb. 2013.

Y. Zou, J. Zhu, X. Wang, and V. Leung, “Improving physical-layer security in wireless communications using diversity techniques,” IEEE Network, vol. 29, no. 1, pp. 42-48, Jan. 2015.

C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, pp. 656-715, 1949.

A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, Aug. 1975.

S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wiretap channel,” IEEE Trans. Information Theory, vol. 24, pp. 451-456, Jul. 1978.

Y. Zou, X. Wang, and W. Shen, “Optimal relay selection for physical-layer security in cooperative wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 10, pp. 2099-2111, Oct. 2013.

Y. Zou, X. Wang, W. Shen, and L. Hanzo, “Security versus reliability analysis of opportunistic relaying,” IEEE Trans. Vehicular Technology, vol. 63, no. 6, pp. 2653-2661, Jun. 2014.

S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Communications, vol. 7, no. 6, pp. 2180-2189, Jul. 2008.

X. Zhou and M. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 3831-3842, Aug. 2010.

D. Goeckel, et al., “Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 10, pp. 2067-2076, Oct. 2011.

Y. Zou, X. Wang, and W. Shen, “Physical-layer security with multiuser scheduling in cognitive radio networks,” IEEE Trans. Communications, vol. 61, no. 12, pp. 5103-5113, Dec. 2013.

D. Lee and B. J. Jeong, “Performance analysis of combining space-time block coding and scheduling over arbitrary Nakagami fading channels,” IEEE Trans. Wireless Communications, vol. 13, no. 5, pp. 2540-2551, May 2014.

S. Hussain and X. N. Fernando, “Closed-form analysis of relay-based cognitive radio networks over Nakagami-m fading channels,” IEEE Trans. Vehicular Technology, vol. 63, no. 3, pp. 1193-1203, Mar. 2014.

H. Dong, Z. Wang, J. Lam, and H. Gao, “Distributed filtering in sensor networks with randomly occurring saturations and successive packet dropouts,” International Journal of Robust and Nonlinear Control, vol. 24, no. 12, pp. 1743-1759, Aug. 2014.

H. Dong, Z. Wang, and H. Gao, “Distributed H-infinity filtering for a class of Markovian jump nonlinear time delay systems over lossy sensor networks,” IEEE Trans. Industrial Electronics, vol. 60, no. 10, pp. 4665-4672, Oct. 2013.

H. Dong, Z. Wang, and H. Gao, “Distributed filtering for a class of time-varying systems over sensor networks with quantization errors and successive packet dropouts,” IEEE Trans. Signal Processing, vol. 60, no. 6, pp. 3164-3173, Jun. 2012.

J.-C. Chen, C.-K. Wen, and P. Ting, “An efficient pilot design scheme for sparse channel estimation in OFDM systems,” IEEE Communications Letters, vol. 17, no. 7, pp. 1089-7798, Jul. 2013.

X. He, R. Song, and W.-P. Zhu, “Pilot allocation for sparse channel estimation in MIMO-OFDM systems,” IEEE Trans. Circuits and Systems II: Express Briefs, vol. 60, no. 9, pp. 612-616 , Sept. 2013.

L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010.

A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, 1975.

S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, pp. 451–456, Jul. 1978.

I. Csiszár and J. Körner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, pp. 339–348, May 1978.

Y. Liang, H. V. Poor, and S. Shamai, Information Theoretic Security.Delft, The Netherlands: Now Publishers, 2009.

A. O. Hero, “Secure space-time communication,” IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235–3249, Dec. 2003.

A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas: The MISOME wiretap channel,” IEEE Trans. Inf. Theory, Aug. 2007. [Online]. Available: http://arxiv.org/abs/0708.4219, submitted for publication.

R. Negi and S. Goelm, “Secret communication using artificial noise,” in Proc. IEEE Vehicular Tech. Conf., Dallas, TX, Sep. 2005, vol. 3, pp. 1906–1910.

F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Trans. Inf. Theory, Oct. 2007 [Online]. Available: http://aps.arxiv.org/abs/0710.1920, submitted for publication.

T. Liu and S. Shamai, “A note on the secrecy capacity of the multi-antenna wiretap channel,” IEEE Trans. Inf. Theory, Nov. 2007 [Online]. Available: http://arxiv.org/abs/0710.4105, submitted for publication.

P. Parada and R. Blahut, “Secrecy capacity of SIMO and slow fading channels,” in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2152–2155.

Z. Li, W. Trappe, and R. Yates, “Secret communication via multi-antenna transmission,” in Proc. 41st Conf. Information Sciences Systems, Baltimore, MD, Mar. 2007.

S. Shafiee and S. Ulukus, “Achievable rates in Gaussian MISO channels with secrecy constraints,” in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007.


Refbacks

  • There are currently no refbacks.

Comments on this article

View all comments




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2021 INTERNATIONAL EDUCATION AND RESEARCH JOURNAL