Next Article in Journal
MSAM: Modular Statistical Analytical Model for MAC and Queuing Latency of VLC Networks under ICS Conditions
Next Article in Special Issue
Proposal for a Localization System for an IoT Ecosystem
Previous Article in Journal
Multi-Agent System Observer: Intelligent Support for Engaged E-Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor \({\mathcal{F}}\) Fading Channels

1
Faculty of Electronic Engineering, University of Niš, Aleksandra Medvedeva 14, 18115 Niš, Serbia
2
School of Electrical Engineering, University of Belgrade, Bulevar kralja Aleksandra 73, 11120 Belgrade, Serbia
3
Innovation Centre of School of Electrical Engineering, Bulevar kralja Aleksandra 73, 11120 Belgrade, Serbia
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(12), 1368; https://doi.org/10.3390/electronics10121368
Submission received: 12 May 2021 / Revised: 2 June 2021 / Accepted: 4 June 2021 / Published: 8 June 2021
(This article belongs to the Special Issue Advances in Wireless Networks and Mobile Systems)

Abstract

:
In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmission of reliable links impaired by Fisher–Snedecor F fading. The path loss among active nodes is also considered. The exact intercept probability expressions are derived recalling an optimal scheduling scheme (OS), a scheduling policy based on a specific cumulative distribution function (CS), and round-robin scheduling as a baseline. The asymptotic behavior of the intercept metric is also presented in a simpler form with acceptable accuracy. The secrecy diversity orders are defined and the security–reliability tradeoff of WSN is specified. Numerical results are provided to demonstrate the interplay of various main/wiretap channel conditions, the distances among nodes, the number of active sensors, and the average main-to-eavesdropper’s signal ratio in order to upgrade the quality of the WSN secrecy performance. Additionally, the impact of the outage probability on the intercept probability is defined for a variety of scenarios under which either the CS or OS scheme could be selected as suitable for PLS enhancement. The obtained results are verified by independent Monte Carlo simulations.

1. Introduction

In the past years, wireless sensor networks (WSNs) have been extensively utilized as key networks on the Internet of Things, body area networks, smart cities, smart grids [1,2,3], agriculture, healthcare, the military domain, environment [4,5] etc., due to their ease of installation, scalability, low cost, and operating flexibility of nodes. Sensors can be distributed over a wide area and can perform the simultaneous data acquisition of desired ambient conditions (humidity, temperature, fire detection, vibrations, presence, gas pollution, noise, water level, etc.). For the practical use-case deployment of the WSN, security and reliability in communication among legitimate users are crucial [6,7].
Due to the open access nature of propagation channels, wireless communication suffers considerably from interception of confidential data transmissions. Consequently, great efforts have been devoted to finding effective methods in suppressing the deleterious actions of eavesdroppers. Physical layer security (PLS) is an emerging concept related to secrecy transmission by exploiting the natural phenomena of channels, such as fading, shadowing, path loss, and noise [7,8,9,10]. Relative to cryptography, which is complex and requires large energy consumption, PLS shows simplicity without the processing resources requirements. Unauthorized entities can be highly computational capable and, hence, can easily break the encryption undertaken at upper layers, thus, enhancing the security at the physical layer.
The seminal works of Shannon [11] and Wyner [12] showed that, if there are better channel conditions in the main propagation channel in comparison to the wiretap channel, secure transmission can be enabled. There are numerous published papers on the PLS performance analysis in the concept of information-theoretic security, over various fading channels. The average secrecy capacity and the probability of strictly positive secrecy capacity over Fisher–Snedecor F fading channels have been addressed in [13].
The F distribution was experimentally proved for describing both fading and shadowing phenomena over wireless channels and showed a high level of generality [14]. As an alternative to composite generalized K , the F model better fits the experimental data and accurately characterizes the legitimate channels for device-to-device communication (D2D). The authors in [15] utilized this model in the analysis of different secrecy metrics for the essential wiretap channel consisting of the source, the destination, and an eavesdropper.
Additionally, achievable PLS over mixed fading channels, including the F , such as Nakagami-m/ F channels, was determined in [16]. In [17], the intercept probability of a randomly distributed eavesdroppers in the N cascaded F wiretap channels, was introduced. The asymptotic behavior of intercept probability in the case of the nearest and the best eavesdropper’s overhearing was also investigated.
The WSN security enhancement is highly challenging and requires the utilization of novel approaches. The artificial noise method [18] was pointed out as effective in certain wireless networks, but the need for an additional power resource to generate noise at the legitimate users was marked as unwanted in energy-constrained networks. The relay selection is another approach that assists the source–destination communication against eavesdropping [19]. However, complex synchronization among relays and additional nodes in the network result in an undesirable system complexity.
The sensor scheduling approach has been adopted in [20] as energy-aware solution in networks with limited-life power resources. In [20], the authors proposed optimal scheduling (OS) based on selecting the sensor with the highest signal-to-noise ratio (SNR) for confidential transmission in industrial WSN, over Nakagami-m fading channels. The results showed a significant intercept probability decreasing in comparison to the conventional round-robin scheduling (RS).
However, the OS has a fairness problem in selecting the node. To overcame this issue, scheduling based on the channel cumulative distribution function (CDF) assumption, which was suggested earlier in [21,22] for multiuser downlink wiretap transmission, can be exploited. Hence, scheduling schemes have been utilized in [23] to improve the security of WSN i.e., to decrease the intercept probability of an attacker over generalized K fading links.
The authors in [23] did not consider the network security–reliability tradeoff (SRT), which is another important issue from the WSN design perspective [24,25]. A detailed review on the challenges and solutions of improving the security and reliability for industrial WSN is given in [6]. The analysis has shown that even the path loss can be involved in simultaneous upgrading of the security and throughput.
In this work, we deal with the WSN security on the physical layer employing sensor scheduling. The main, as well as the wiretap channels, are modeled as F fading channels. The path loss originating from stationary and randomly located nodes is also taken into consideration. We determine the exact and the asymptotic expressions for the intercept probability employing CDF-based scheduling (CS), OS, as well as RS scheduling scheme as a benchmark. The secrecy diversity order of each scheme is also defined.
We also obtain the intercept probability as the function of the outage probability in order to quantify the tradeoff between security and reliability of the WSN. The impacts of numerous system parameters, such as the number of active WSN nodes, fading depth, and/or shadowing sharpness over main/wiretap links, the distances among nodes, and the pre-defined SRT-constrained outage threshold on the intercept probability, are identified. Novel analytical expressions are verified by Monte Carlo simulated results.
In overall, the main contributions can be stated as:
  • Novel, highly general exact intercept probability expressions for WSN security in the presence of an unauthorized node, under RS, OP, and CS scheduling methods, are derived.
  • Asymptotic expressions in simpler form, showing good accuracy in the region of medium-to-high SNR values at the sink, are also determined with the aim to enable the evaluation of the security metrics required for optimal system design.
  • Novel SRT analysis is identified, and the intercept probability is additionally quantified by the outage threshold.
  • Numerical and simulation results verify the presented analysis and illustrate the influence of channel and system parameters against eavesdropping in WSN.
The paper is structured as follows. In Section 2, the system and channel model are introduced. Our intercept probability analyses, the exact and the asymptotic, are presented in Section 3. Section 4 addresses the SRT analysis. The numerical and simulated results are discussed in Section 5. The main concluding remarks are given in Section 6. Appendix A and Appendix B, contain the derivation procedures of particular expressions for the intercept probabilities.

2. System and Channel Model

We assume the system model given in Figure 1. The wireless network consists of an arbitrary number N of stationary, randomly located sensors. Sensors sense specific data for the intended purpose of the WSN. Legitimate communication is obtained via sensor-sink links utilizing orthogonal multiple access, e.g., time division or orthogonal frequency division multiple access. Legitimate channels are marked as solid-blue lines in Figure 1.
A selected sensor performs transmission over a main channel, e.g., referring to a time slot in time division multiple access, while an unauthorized node attempts to intercept secret information. The wiretap channels are marked with dashed lines. In an orthogonal channel, typically, the sensor with the highest data throughput has priority to communicate with the sink, which, in turn, maximizes the channel capacity without considering possible overhearing.
Contrary to that, in the analysis that follows, we consider sensor scheduling as an auxiliary tool to upgrade the PLS. The scheduling framework requires knowledge of the channel state information (CSI) of the main as well as the wiretap channels. This is a commonly exploited assumption in PLS analysis and frequently justified in numerous papers [13,15,16,17,20,23].
The sensed information propagates from the scheduled sensor to the sink. During the propagation, the signal is attenuated due to path loss, multipath fading, and shadowing. The composite fading is described by F distribution as suitable one for describing D2D communication channels [14]. Owing to its generality, other fading distributions, such as Nakagami-m, one-sided Gaussian, and Rayleigh, can be obtained as special cases. In addition, it is statistically more tractable in comparison to the composite generalized-K fading model, which can be approximated by F . Thus, the analysis of PLS that follows has a high level of generality.
The received instantaneous SNR at the sink, from the i-th sensor, can be expressed as
γ s i = h s i 2 P s σ N 2 d s i ξ , i = 1 , , N ,
where h s i is the channel fading amplitude at the i-th link, P s denotes the signal power from the sensor, d s i is the distance between the i-th sensor and the sink, ξ is the path loss parameter, and σ N 2 is the variance of a zero-mean additive white Gaussian noise (AWGN).
Following the Shannon capacity formula [11], we can evaluate the instantaneous channel capacity of the i-th main link as
C s i B = log 2 ( 1 + γ s i ) ,
with B denoting the transmission bandwidth.
Following the physical layer security literature [16,17,20,23], the eavesdropper is assumed to have perfect knowledge of legitimate transmissions from and to the sink, including the coding and modulation scheme, encryption algorithm, and secret key, except that the source signal is confidential. This is a common assumption in numerous papers since the eavesdropper could be a legitimate WSN user with restricted access to secrecy data. Thus, the instantaneous SNR tapped by the eavesdropper on the i-th path can be defined as
γ e i = h e i 2 P s σ N 2 d e i ξ , i = 1 , , N
with h e i being a fading coefficient of the wiretap channel between the i-th sensor and eavesdropper and d e i denoting the distances between the sensor and eavesdropper. The i-th instantaneous wiretap channel capacity can be calculated as
C e i B = log 2 ( 1 + γ e i ) .
The probability density function (PDF) of the instantaneous SNR over the i-th main or wiretap F channel, relying on [14], can be expressed as
p γ i ( γ ) = G 1 , 1 1 , 1 ( m i γ k i γ ¯ i d i ξ | 1 k i m i ) Γ ( m i ) Γ ( k i ) γ ,
where * denotes subscript s or e, referring to the instantaneous SNR at sink or the eavesdropper, respectively. The fading severity parameter at the i-th link is denoted as m i , the shadowing factor as k i , γ ¯ i is the average SNR at the sink or the eavesdropper, and Γ · denotes Gamma function [26] (Equation (8.310.1)). The G p , q m , n ( z | ) is notation of Meijer’s G function [26] (Equation (9.301)).
Based on the definition integral of the CDF and solving it by utilizing [27] (Equation (26)), the CDF of the instantaneous SNR over the main/wiretap links has the following form
F γ i ( γ ) = G 2 , 2 1 , 2 ( m i γ k i γ ¯ i d i ξ | 1 k i , 1 m i , 0 ) Γ ( m i ) Γ ( k i ) .

3. Intercept Probability Based on Sensor Scheduling

Let us assume that the i-th sensor is scheduled to transmit a confidential signal. An eavesdropper attempts to intercept the signal over the i-th wiretap channel, whose capacity is C e i . The secrecy capacity that characterizes transmission from the i-th specified sensor to the sink is the difference between the channel capacity of that i-th main link and the i-th wiretap link, as in [20,23]
C secrecy ( i ) = C s i C e i .
The probability of intercept is the probability that the secrecy capacity of the i-th link becomes non-positive and can be defined as [20,28]
P int ( i ) = Pr C secrecy ( i ) < 0 = Pr C s i < C e i .
By substituting (2) and (4) in (8), it yields
P int ( i ) = Pr γ s i < γ e i = 0 0 γ e i p γ s i ( γ s i ) p γ e i ( γ e i ) d γ s i d γ e i .
Both integrals in (9) are solved, first utilizing [27] (Equation (26)) and subsequently [29] (Equation (07.34.21.0011.01)), so that the intercept probability of the i-th transmitting link can be evaluated as
P int ( i ) = G 3 , 3 2 , 3 ( m s i k e i r i ξ m e i k s i λ i | 1 , 1 k s i , 1 m e i m s i , k e i , 0 ) Γ ( m s i ) Γ ( k s i ) Γ ( m e i ) Γ ( k e i )
with λ i = γ ¯ s i / γ ¯ e i being the i-th average main-to-eavesdropper’s signal ratio (MER) and with r i denoting the ratio between the i-th sensor-sink and the sensor-eavesdropper’s link distances.
In the rest of this section, we will obtain the exact and asymptotic intercept probability analyses, employing a scheduling framework.

3.1. Exact Analysis

Conventional RS scheduling is incapable of bringing multinode diversity gain in intercept probability decreasing. This method is the simplest one and is only a baseline in the analysis that follows. All sensors can access a given transmission channel, randomly, with an equal probability to send confidential data. Based on that, the RS intercept probability can be defined as the mean value of all N intercept probabilities, in the form [20]
P int RS = 1 N i = 1 N P int ( i ) .
On the other hand, the OS criterion should minimize the intercept probability but, subsequently, may cause a fairness problem among the sensors since the sink tends to select sensor closer to it i.e., to select links for transmission with higher SNR. The sensor is scheduled based on the following criteria OSNode = arg max i S C secrecy i [20], where S denotes the set of sensors in the network under consideration. It follows that the secrecy capacity when the OS scheme is applied can be defined as C secrecy OS = max i S C secrecy i . Thus, assuming that γ s i and γ e i are independent, and with the help of (8), the OS intercept probability can be found as [20]
P int OS = i = 1 N Pr C secrecy ( i ) < 0 = i = 1 N P int ( i ) .
Although, the OS scheme enables significant multinode diversity gain, the sensors randomly located at different locations far from the sink rarely participate or do not participate at all in communication with the sink. This is a problem in the network with limited life-time users.
The CS scheduling policy enables fair selection among users while exploiting multinode diversity. This is an efficient algorithm that schedules the sensor for transmission based on the CDF of the sensor rates, in such a way that the sensor whose rate is high enough, but least probable to become higher, is selected first. Analytically, the sensor is selected as CSNode = arg max i S F γ s i γ s i t , where F γ s i γ s i is defined by (6).
The sink performs the previously defined selection after collecting the instantaneous SNRs, γ s i t , from all sensor nodes at each time slot, t. The random variable F γ s i γ s i t is uniformly distributed within the range 0 , 1 [21]. Although, different main channels may have different channel distributions, i.e., F γ s i x , the values F γ s i γ s i t have the same distribution. The CDF that characterizes the SNR of a selected transmission, γ sel , can be defined as [22]
F γ sel ( x ) = i = 1 N F γ s i ( x ) .
Herewith, we will adopt the assumption that all main links as well as associate wiretap links are identically distributed, i.e., m s i = m s , k s i = k s ; m e i = m e , k e i = k e . According to the fact that the distances among the network’s nodes are not large enough to make the channel conditions differ severely, analysis for the independent but identically distributed (i.i.d) fading channels is not a rigid constraint. Thus, according to (9), the CS scheduling intercept probability can be evaluated as
P int CS = Pr γ sel < γ e = 0 F γ s ( γ e ) N p γ e ( γ e ) d γ e .
Invoking the procedure presented in Appendix A, P int CS is derived in the form of (15).
P int CS = χ j 0 + j 1 + + j k s 1 = N N j 0 , j 1 , , j k s 1 t = 0 k s 1 G 2 , 2 2 , 2 ( m e k s r ξ m s k e λ | 1 m s N t = 0 k s + 1 t j t , 1 k e ( k s 1 ) N t = 0 k s + 1 t j t , m e ) Γ ( m s + t + 1 ) Γ ( k s t ) j t , k s N
where χ = Γ ( m s + k s ) N Γ ( N ( m s + k s 1 ) ) Γ ( m e ) Γ ( k e ) .

3.2. Asymptotic Analysis

To gain more insights for the medium-to-high MER regime, we analyzed the asymptotic behavior of (10) and (15) and present them in an easy-tractable form with good accuracy. Thed erivation procedure of asymptotic expressions is given in Appendix B.
We derive the asymptotic expression for evaluating P i n t of each i-th link, in the following way
P int ( i ) A = Γ k e i m s i Γ k s i + min m s i , k e i Γ max m s i , k e i Γ 1 + min m s i , k e i × Γ m e i + min m s i , k e i Γ ( m e i ) Γ ( k s i ) r i ξ λ i m s i m e i k e i k s i min m s i , k e i ,
when k s i m s i Z . Therewith, relying on (16), it is easy to evaluate the asymptotic intercept probability when RS or OS policies are applied, by substituting (16) in (11) or (12), respectively.
An easily tractable asymptotic solution of (15) has the following form
P int CS A = Γ ( k s + m s ) Γ ( k s ) Γ ( m s + 1 ) m s k e r ξ m e k s λ m s N Γ ( N m s + m e ) Γ ( k e N m s ) Γ ( m e ) Γ ( k e ) .
Moreover, derived asymptotic forms can be used to determine the secrecy diversity performance of multinode wireless transmissions with the aim of intuitively obtaining the impact of the number of active sensors in a network or other system parameters on the secrecy. The generalized definition form of the secrecy diversity order, Λ , is related to the asymptotic ratio of the logarithmic intercept probability to the logarithmic MER, when MER tends to Infinity, as in [22]
Λ = lim λ log P int log λ .
According to (11), the secrecy diversity order of the RS scheme yields
Λ RS = lim λ i log P int RS log λ i .
Thus, relying on (16), it can be concluded that RS secrecy diversity order can be determined as
Λ RS = min i S min m s i , k e i .
The diversity gain of RS scheduling with N sensors is determined according to the previous equation, as the minimum of the channel fading depth and shadowing sharpness parameters among all main and wiretap links. This also means that upon increasing the number of sensors, the wireless security of the conventional RS scheduling scheme would not improve, and even degrades.
By substituting (16) into (12), and relying on (18), we obtain the OS secrecy diversity order in the following form
Λ OS = lim λ i log P int OS log λ i = i = 1 N min m s i , k e i ,
which is determined according to the exponential decrease of the OS intercept probability as 1 / λ i i = 1 N min m s i , k e i , when λ i . Thus, by increasing the number of sensors in the network, the secrecy diversity order of the OS scheme is increased.
Finally, by substituting (17) into (18), the secrecy diversity order of the CS scheduling scheme is defined as
Λ CS = m s N .
We notice that the secrecy diversity order is highly dependent on the number of network nodes, especially when the channel conditions of the main links are favorable. This coincides with the diversity order achieved with the optimal multiuser scheduling policy and indicates the full diversity achieved by the CS scheduling policy. To be more specific, although the secrecy performance will be degraded, e.g., if the distance between the sensor and eavesdropper becomes shorter, this will not affect the speed at which the intercept probability decreases when λ tends to infinity. [21].

4. Security–Reliability Tradeoff

When a sensor’s transmission power is increased, the reliability of the link is improved due to the fact that the sink receives more power and the corresponding outage probability decreases. On the other hand, this increase of output power also increases the probability of intercept events as an eavesdropper can receive more power and potentially detect the received information bits correctly. Therefore, there is a tradeoff between outage and intercept probabilities.
We adopt a definition of the intercept probability that also takes into account the pre-defined outage threshold. The outage threshold corresponds to the SNR threshold γ t h below which detection is very unlikely for the given data rate, and the intercept occurs when eavesdropper detects the signal with an SNR over this threshold. The intercept probability is then
P int , th ( i ) = P r [ γ s i γ e i , γ e i > γ t h ] = P r [ γ s i γ e i ] P r [ γ e i > γ t h ] ,
keeping in mind that γ s i and γ e i are statistically independent.
Increasing the data rate works in the opposite direction to the output power increase, as higher data rates generally require higher SNR values. Therefore, this balance between the output power and data rate reflects the balance between the outage probability and secrecy capacity, and, in turn, the intercept probability. Although increasing the data rate or decreasing the transmitting power of sensors may reduce the intercept probability and improve the level of security, it comes with the cost of transmission reliability degradation, since the outage probability of the main link also increases. Therefore, our motivation is to find a tradeoff between reliability and security in this context. However, this balance of reliability versus security can be further enhanced by means of sensor scheduling.
Equation (23) can be rewritten as
P int , th ( i ) = P int ( i ) × 1 F γ e i ( γ t h ) .
Apart from the previous definitions, the outage probability of each i-th sensor-sink link, is defined as
P out ( i ) = P r [ γ s i γ t h ] = F γ s i ( γ t h ) .
According to the derived solutions in the previous section and recalling the asymptotic form of the F CDF, (A6), we derive the P i n t as the function of P o u t in the following form
P int , th ( i ) = P int ( i ) × 1 P out ( i ) × λ i / r i ξ m ,
where P int ( i ) is given in (10).
By recalling, (11) and (12), the RS and OS intercept probabilities can be evaluated, respectively, as
P int , th ( ) = 1 N i = 1 N P int , th ( i ) ( ) = RS i = 1 N P int , th ( i ) ( ) = OP
Following the previous case, the CS intercept probability constrained by the γ t h , can be defined as
P int , th CS = P r [ γ s e l γ e , γ ¯ e > γ t h ] = P int CS × F γ e ( γ t h ) .
In addition, the outage probability in the scheduled sensor-sink channel, is given by
P out CS = P r [ γ s e l γ t h ] = F γ s e l ( γ t h ) .
Thus, combining the latter two expressions, after some mathematical manipulations, we derive the CS intercept probability from the SRT perspective, as
P int , th CS = P int CS × 1 P out CS r ξ λ N .
Overall, one limitation of the proposed approach is that it refers to the scenario when the channel state information (CSI) of all main as well as wiretap channels are available at the sink. This can be justified when the eavesdropper is an authorized part of WSN allowed in communication among nodes but unwanted in the transmission of secure data. In some practical networks, the eavesdroppers are passive and malicious and it is difficult to obtain instantaneous CSI of a wiretap channel.
Another limitation is that the data streams are assumed with the same priority in accessing the wireless channel for transmission although the sensors may generate different types of data having different quality of service (QoS) requirements. For instance, some sensors may have strict real-time data requirements, which should be assigned with a higher priority in accessing the communication channel.

5. Numerical Results and Simulation

In this section, numerical results are presented utilizing Mathematica ®, according to the fact that the exact expressions are in the form of special Meijer’s G functions, which are built-in functions in this software package. Along with the analytical results, independent Monte Carlo simulations are also shown. One P int i value is estimated on the basis of 10 8 generated samples, in Matlab ®. For the sake of simplicity, we assume i.i.d. main or/and wiretap links, in the analysis that follows.
Figure 2 shows the intercept probability (exact and asymptotic) versus the average MER under different scheduling schemes. It is noticeable that, if the network dimension increases, the probability of intercept decreases, especially when an OS scheduling policy is applied. Asymptotic results fit better when N = 2 for all scheduling schemes and are also quite accurate in the range of higher MER values in the case of OS when the number of sensors increases from N = 2 to N = 4 .
Under a scenario with i.i.d. links, tracking the asymptotic curves, we can notice the same secrecy diversity order of the OS and CS scheduling policies. This concluding remark can also be obtained analytically by comparing (21) and (22). Finally, the RS intercept probability is independent of the network dimension modification.
The intercept probability as a function of the fading depth parameter for the main links, is illustrated in Figure 3. When the fading depth decreases, i.e., parameter m s i = m s increases, the probability of the intercept is improved. In other words, favorable channel conditions are expected to enhance secure WSN communication.
Modification in the network dimension shows less impact on the CS intercept probability in comparison to the OS intercept probability for the given set of parameters. For the increase in the number of sensor nodes, N, from 2 to 4, P int remains constant in the case of RS scheme, it decreases for less than one order of magnitude in the case of the CS scheduling framework and for more than two orders of magnitude in the case of the OS policy, when m s = 3 . In addition, the Monte Carlo simulated results show good agreement with the analytical ones.
The intercept probability versus the number of active sensors for two specific average MER values ( λ = 0 , λ = 15 ), is shown in Figure 4. Again, the results demonstrate the RS intercept probability independence on the network dimension, regardless of the average MER value. For λ = 0 , i.e., when the average SNR over the wiretap channel equals the average SNR over the main channel, the acceptable P i n t can be obtained only under the OS scheduling scheme. For larger λ values, the CS policy is also acceptable to schedule energy-aware nodes for secure transmission.
The impact of various fading/shadowing channel conditions over wiretap channels during the intercept events is shown in Figure 5. When the wiretap channel fading and shadowing parameters are modified, more pronounced effects are noticed when the CS scheme is applied. The required average MER gain to obtain P i n t = 10 5 is 2 in the case of OS policy and even 5 in the case of CS policy, when the channel condition parameters increase from m e = 1.09 , k e = 2.25 to m e = 2.09 , k e = 3.25 . This confirms that favorable wiretap channel conditions, as well as the favorable main channel conditions, also degrade the intercept probability. Even RS has shown visible dependence on the wiretap channel condition change.
In order to avoid complexity and illegibility of the Figure legends, the path loss impact was not included in the previous Figures. Hence, Figure 6 shows the required values of the average MER versus the ratio r to reach the intercept probability of 10 3 and 10 4 , under CS and OS schemes. Increasing the parameter r indicates larger distances between the scheduled sensor and the sink in comparison to the distances between the sensor and eavesdropper, which results in higher MER values required to obtain the specified intercept probabilities. The results also show that the CS scheduling is more dependent on the ratio r, as well as of the variations of channel conditions in comparison to the OS scheme.
Figure 7 shows the intercept probability versus the number of network nodes for different outage probability constraints and path loss scenarios. When the outage probability increases, the intercept probability is reduced. We can also observe the black and red curves for the OS scheduling overlap, which demonstrate the intercept probability independence on the outage probability over P o u t = 10 3 . By all means, the OS approach leads to the best intercept probability improvement, while the CS scheme is visibly dependent on the outage constraints. However, by increasing the WSN dimension, the intercept probability tends to very low values for both scheme policies.
Overall, we can conclude that the analysis and numerical results are useful in the sense that they can provide a quantitative measure of the physical level security in particular scenarios. If the PLS is found to be low, there are changes that can be implemented in the WSN, such as modifying the output power of some or all nodes and employing directive antennas in critical nodes. In turn, the proposed analysis is then used to check if a criterion in physical level security is met by a particular WSN. If the criterion is not met, than a series of iterations can be implemented, for example: changing the physical placement of the nodes and the node characteristics, until the required PLS is achieved.

6. Conclusions

In this work, the PLS of WSN, in one part versus the reliability, was investigated by employing various scheduling schemes. Analysis was performed for the F fading scenario, which indicates a high level of generality of the derived intercept probability expressions, including both the exact and the asymptotic.
The results demonstrated that the asymptotic expressions were closer to the exact ones for a lower number of active nodes in the network but were also quite accurate in the range of higher MER values, for larger WSNs. For the i.i.d. scenario, the same secrecy diversity order of OS and CS scheduling schemes was noted. An increase of the network dimension showed a significant impact on the intercept probability, especially under the OS scheduling policy. The secrecy performance improvement is highly dependent on the main/wiretap channel condition amelioration. In addition, the CS scheduling is more dependent on the fading depth/shadowing sharpness variations and the path loss as well as on the outage probability constraints in comparison to the OS scheme.
Consequently, the performed analyses and highlighted remarks could be useful for security enhancement of energy-aware WSNs on physical layer. The results could be significant in protecting private information for SmartHome purposes, in telemedicine, agriculture, industrial, environment, urban, and in other applications where WSN is a key component. Our future work will be dedicated toward exploring novel scheduling schemes or other PLS based methods in order to upgrade secure WSN transmission or decrease the possibilities of intercept events.

Author Contributions

Conceptualization, D.M. and J.A.; formal analysis, S.M., J.A., and D.M.; funding acquisition, D.D. and S.M.; software, N.M. and J.A.; validation, D.D. and N.M.; visualization, J.A., D.M., and S.M.; writing—original draft preparation, S.M. and J.A.; writing—review and editing, N.M. and D.D. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Ministry of Education, Science and Technological Development of the Republic of Serbia.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

Notations, symbols, abbreviations throughout the manuscript:
* designates: s for sink, e for eavesdropper
γ i , SNR signal-to-noise ratio at the sink (or eavesdropper), from the i-th sensor
N number of sensors in the network
h i channel fading amplitude for the i-th link
P s signal power emitted from each sensor
d i distance between the i-th sensor and the sink (or eavesdropper)
ξ path loss parameter
σ N 2 variance of additive white Gaussian noise
C i channel capacity of the i-th link (or wiretap channel)
p γ i , PDF probability density function of SNR at receiver
F γ i , CDF cumulative distribution function of SNR
m i fading severity
k i shadowing factor
P int intercept probability
Λ secrecy diversity order
λ i , MER main-to-eavesdropper’s signal ratio for i-th sensor
CSI channel state information

Appendix A. Derivation of Exact P int CS

To solve integral (14), Meijer’s G function on N-th power is transformed into a hypergeometric function with the help of [29] (Equation (07.34.03.0017.01)), as
G 2 , 2 1 , 2 ( m s γ k s γ ¯ s / d s i ξ | 1 k s , 1 m s , 0 ) = Γ ( m s + k s ) Γ ( m s + 1 ) Γ ( k s ) × m s γ k s γ ¯ s / d s i ξ m s 2 F 1 m s + k s m s ; m s + 1 | m s γ k s γ ¯ s / d s i ξ .
In the second step, we utilize the following permutation symmetry [29] (Equation (07.23.04.0004.01))
2 F 1 m s + k s m s ; m s + 1 | m s γ k s γ ¯ s / d s i ξ = 2 F 1 m s m s + k s ; m s + 1 | m s γ k s γ ¯ s / d s i ξ ,
which stands as a general characteristic of the hypergeometric function in the previous expression. According to the permuted form, we recall the series representation of a hypergeometric function [29] (Equation (07.23.03.0082.01)), and express it as
2 F 1 m s + k s m s ; m s + 1 | m s γ k s γ ¯ s / d s i ξ = 1 + m s γ k s γ ¯ s / d s i ξ 1 m s k s × i = 0 k s 1 ( 1 k s ) i ( m s + 1 ) i m s γ k s γ ¯ s / d s i ξ i , k s N
where ( x ) n denotes the Pochhammer symbol [26]. By substituting the previous series form on the N-th power in (14), the request for the multinomial theorem [29] appeared. Then, by substituting (5) in (14), after some algebra, and finally employing [29] (Equation (07.34.21.0013.01)), we solve the integral in the form of (15).

Appendix B. Derivation of Asymptotic P int

To analyze the asymptotic behavior of the intercept probability for the RS and OS schemes, in the range of high MER values, we recall the series expansion of Meijer’s G function when the argument z tends to 0 [29] (Equation (07.34.06.0001.01)) (which refers to a scenario of large λ i values). According to the fact that z is a small value, acceptable accurate approximation could be obtained just by taking the first term in the expansion, i.e., yielding to
G p , q m , n ( z | b 1 , , b m , b m + 1 , , b q a 1 , , a n , a n + 1 , , a p ) = k = 1 m j = 1 , j k m Γ ( b j b k ) j = 1 n Γ ( 1 a j + b k ) j = n + 1 p Γ ( a j b k ) j = m + 1 q Γ ( 1 b j + b k ) z b k ,
where b j b k Z .
Thus, by replacing the Meijer’s G function in (10) with the previously defined truncated series form and performing some algebraic manipulations, we find
P int , A ( i ) = 1 Γ ( m s i ) Γ ( m e i ) Γ ( k s i ) Γ ( k e i ) [ Γ ( m e i + m s i ) m s i × Γ ( k e i m s i ) Γ ( k s i + m s i ) m s i k e i r i ξ m e i k s i λ i m s i + Γ ( m s i k e i ) Γ ( m e i + k e i ) m s i k e i r i ξ m e i k s i λ i k e i Γ ( k s i + k e i ) k e i ]
In the derived form of (A5), the first or the second addend in summation can be kept as the dominant one, depending on the quantitatively relation of the fading/shadowing parameters { m s i , k e i } . According to this remark, the form of (16) is derived as the final asymptotic form of the intercept probability, P int RS or P int OS regarding the i-th wiretapped link.
Furthermore, the asymptotic intercept probability of the CS scheme in (17) is determined by utilizing the asymptotic form of F CDF for the instantaneous SNR of the i-th link. Namely, we start from the definition integral of the CS intercept probability, i.e., (14) and, referring to (A1), we transform Meijer’s G function into a specific hypergeometric function. Then, we expand the hypergeometric function, for small values of its argument z, into series form according to [29] (Equation (07.23.06.0001.02)), obtaining the asymptotic form of CDF as [14]
F γ s ( γ ) m s γ k s γ ¯ s / d s ξ m s Γ ( m s + k s ) m s ! Γ ( k s ) , γ ¯
In the final step, the integral in (14) is solved by substituting (A6) and utilizing [29] (Equation (07.34.21.0009.01)), thus obtaining the form of (17).

References

  1. Rani, S.; Maheswar, R.; Kanagachidambaresan, G.; Jayarajan, P. Integration of WSN and IoT for Smart Cities; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  2. Gaddam, A.; Wilkin, T.; Angelova, M.; Gaddam, J. Detecting Sensor Faults, Anomalies and Outliers in the Internet of Things: A Survey on the Challenges and Solutions. Electronics 2020, 9, 511. [Google Scholar] [CrossRef] [Green Version]
  3. Gungor, V.C.; Lu, B.; Hancke, G.P. Opportunities and Challenges of Wireless Sensor Networks in Smart Grid. IEEE Trans. Ind. Electron. 2010, 57, 3557–3564. [Google Scholar] [CrossRef] [Green Version]
  4. Fahmy, H.M.A. Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis; Springer Nature: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  5. Malik, N.N.; Alosaimi, W.; Uddin, M.I.; Alouffi, B.; Alyami, H. Wireless Sensor Network Applications in Healthcare and Precision Agriculture. J. Healthc. Eng. 2020, 2020, 8836613. [Google Scholar] [CrossRef]
  6. Zhu, J.; Zou, Y.; Zheng, B. Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks. IEEE Access 2017, 5, 5313–5320. [Google Scholar] [CrossRef]
  7. Mukherjee, A. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. Proc. IEEE 2015, 103, 1747–1761. [Google Scholar] [CrossRef]
  8. Shakiba-Herfeh, M.; Chorti, A.; Poor, H.V. Physical Layer Security: Authentication, Integrity, and Confidentiality. In Physical Layer Security; Springer: Cham, Switzerland, 2021. [Google Scholar] [CrossRef]
  9. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef] [Green Version]
  10. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef] [Green Version]
  11. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  12. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  13. Badarneh, O.S.; Sofotasios, P.C.; Muhaidat, S.; Cotton, S.L.; Rabie, K.; Al-Dhahir, N. On the Secrecy Capacity of Fisher–Snedecor F Fading Channels. In Proceedings of the 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus, 15–17 October 2018; pp. 102–107. [Google Scholar] [CrossRef] [Green Version]
  14. Yoo, S.K.; Cotton, S.L.; Sofotasios, P.C.; Matthaiou, M.; Valkama, M.; Karagiannidis, G.K. The Fisher–Snedecor Distribution: A Simple and Accurate Composite Fading Model. IEEE Commun. Lett. 2017, 21, 1661–1664. [Google Scholar] [CrossRef] [Green Version]
  15. Kong, L.; Kaddoum, G. On Physical Layer Security Over the Fisher-Snedecor Wiretap Fading Channels. IEEE Access 2018, 6, 39466–39472. [Google Scholar] [CrossRef]
  16. Badarneh, O.S.; Sofotasios, P.C.; Muhaidat, S.; Cotton, S.L.; Rabie, K.M.; Aldhahir, N. Achievable Physical-Layer Security Over Composite Fading Channels. IEEE Access 2020, 8, 195772–195787. [Google Scholar] [CrossRef]
  17. Kong, L.; Ai, Y.; He, J.; Rajatheva, N.; Kaddoum, G. Intercept Probability Analysis over the Cascaded Fisher-Snedecor Fading Wiretap Channels. In Proceedings of the 2019 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu, Finland, 27–30 August 2019; pp. 672–676. [Google Scholar]
  18. Goel, S.; Negi, R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 2008, 7, 2180–2189. [Google Scholar] [CrossRef]
  19. Zou, Y.; Wang, X.; Shen, W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef] [Green Version]
  20. Zou, Y.; Wang, G. Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack. IEEE Trans. Ind. Inform. 2015, 12, 780–787. [Google Scholar] [CrossRef] [Green Version]
  21. Park, D.; Seo, H.; Kwon, H.; Lee, B.G. Wireless packet scheduling based on the cumulative distribution function of user transmission rates. IEEE Trans. Commun. 2005, 53, 1919–1929. [Google Scholar] [CrossRef]
  22. Ge, X.; Wu, P.; Jin, H.; Leung, V.C. Secrecy analysis of multiuser downlink wiretap networks with opportunistic scheduling. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 7370–7375. [Google Scholar]
  23. Anastasov, J.A.; Cvetković, A.M.; Milović, D.M.; Milić, D.N.; Djordjević, G.T. On physical layer security in WSN over GK fading channels during intercept events. Telecommun. Syst. 2020, 74, 95–102. [Google Scholar] [CrossRef]
  24. Zou, Y.; Wang, X.; Shen, W.; Hanzo, L. Security versus reliability analysis of opportunistic relaying. IEEE Trans. Veh. Technol. 2013, 63, 2653–2661. [Google Scholar] [CrossRef] [Green Version]
  25. Li, B.; Zou, Y.; Zhu, J.; Cao, W. Impact of Hardware Impairment and Co-Channel Interference on Security-Reliability Trade-Off for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2021. [Google Scholar] [CrossRef]
  26. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 6th ed.; Academic Press: New York, NY, USA, 2000. [Google Scholar]
  27. Adamchik, V.; Marichev, O. The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system. In Proceedings of the International Symposium on Symbolic and Algebraic Computation, Tokyo, Japan, 20–24 August 1990; pp. 212–224. [Google Scholar]
  28. Hoang An, N.; Tran, M.; Nguyen, T.N.; Ha, D.H. Physical Layer Security in a Hybrid TPSR Two-Way Half-Duplex Relaying Network over a Rayleigh Fading Channel: Outage and Intercept Probability Analysis. Electronics 2020, 9, 428. [Google Scholar] [CrossRef] [Green Version]
  29. Wolfram Research Inc. The Mathematical Functions Site; Wolfram Research Inc.: Champaign, IL, USA, 2020. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Electronics 10 01368 g001
Figure 2. The intercept probability of the eavesdropped WSN vs. the average MER.
Figure 2. The intercept probability of the eavesdropped WSN vs. the average MER.
Electronics 10 01368 g002
Figure 3. The intercept probability of the eavesdropped WSN vs. the fading severity over the main links.
Figure 3. The intercept probability of the eavesdropped WSN vs. the fading severity over the main links.
Electronics 10 01368 g003
Figure 4. The intercept probability of the eavesdropped WSN vs. the network dimension.
Figure 4. The intercept probability of the eavesdropped WSN vs. the network dimension.
Electronics 10 01368 g004
Figure 5. The intercept probability for different fading/shadowing conditions over wiretap channels.
Figure 5. The intercept probability for different fading/shadowing conditions over wiretap channels.
Electronics 10 01368 g005
Figure 6. Required MER vs. the distances among the active nodes in the eavesdropped WSN.
Figure 6. Required MER vs. the distances among the active nodes in the eavesdropped WSN.
Electronics 10 01368 g006
Figure 7. The intercept probability versus the outage probability according to SRT.
Figure 7. The intercept probability versus the outage probability according to SRT.
Electronics 10 01368 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Maričić, S.; Milošević, N.; Drajić, D.; Milić, D.; Anastasov, J. Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor \({\mathcal{F}}\) Fading Channels. Electronics 2021, 10, 1368. https://doi.org/10.3390/electronics10121368

AMA Style

Maričić S, Milošević N, Drajić D, Milić D, Anastasov J. Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor \({\mathcal{F}}\) Fading Channels. Electronics. 2021; 10(12):1368. https://doi.org/10.3390/electronics10121368

Chicago/Turabian Style

Maričić, Srđan, Nenad Milošević, Dejan Drajić, Dejan Milić, and Jelena Anastasov. 2021. "Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor \({\mathcal{F}}\) Fading Channels" Electronics 10, no. 12: 1368. https://doi.org/10.3390/electronics10121368

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop