Industrial wireless sensor nodes (I-WSNs) have grabbed the attention of researchers all over the world in recent years. One of the major challenges faced by the researchers is the rapid fluctuation of signal due to machinery hindrance, thermal noise and vibration of metal. In an information-theoretic sense, this fluctuation degrades the secrecy capacity of the system in the presence of an eavesdropper.
In this context this paper analyses the outage behavior of an industrial WSN which consists of a multiple sensor nodes and a sink, where data is transmitted over a wireless link. It also proposes the use of sensor scheduling to improve the physical layer security against a malicious eavesdropper, where a sensor with higher secrecy capacity is scheduled to transmit its data to sink. For both the conventional round-robin scheduling and the proposed optimal scheduling schemes, closed-form expressions for the intercept probability are derived.
Frequently Asked Questions: Securing Industrial Wireless Sensor Networks (I-WSNs) with Sensor Scheduling
What is the main challenge addressed in this paper regarding Industrial Wireless Sensor Networks (I-WSNs)?
The major challenge is the rapid fluctuation of signal in I-WSNs due to machinery hindrance, thermal noise, and metal vibration, which degrades the secrecy capacity of the system in the presence of an eavesdropper.
What is the objective of this paper?
The objective is to analyze the outage behavior of an industrial WSN and propose the use of sensor scheduling to improve physical layer security against malicious eavesdroppers.
How does the proposed sensor scheduling scheme improve security?
The scheme schedules sensors with higher secrecy capacity to transmit data to the sink, enhancing physical layer security without additional power consumption.
What are the major contributions of this paper?
- Proposing an optimal multi-node scheduling scheme without channel state information (CSI) of the eavesdropper.
- Deriving closed-form expressions for the intercept probability for both round robin scheduling and the proposed scheme.
- Demonstrating that the proposed scheduling scheme outperforms conventional round robin scheduling in terms of intercept probability.
What are the components of the industrial WSN considered in the paper?
The network consists of a sink node and N sensor nodes, all with single antennas. Data is transmitted over a wireless link, with a wiretap link existing from the sensor nodes to an eavesdropper.
What channel model is used in the paper?
A Rayleigh fading model is used to characterize both the main link and the wiretap link.
What is the significance of secrecy capacity in this context?
Secrecy capacity represents the difference between the capacity of the main channel and the wiretap channel. A higher secrecy capacity implies better protection against eavesdropping.
What is Round Robin Scheduling, and how is its performance evaluated in the paper?
Round Robin Scheduling allows each of the N sensor nodes to take turns transmitting data to the sink node. Its intercept probability is calculated and used as a benchmark for comparison against the proposed optimal scheduling scheme.
What is the assumption made about the availability of Channel State Information (CSI)?
The CSI of the N sensor nodes is assumed to be available, but information regarding the channel of the eavesdropper is not present at the sink node.
What is the key principle behind the optimal sensor scheduling scheme?
The scheme selects the sensor node with the highest secrecy capacity for data transmission to maximize protection against eavesdropping, without requiring CSI about the eavesdropper.
What is Intercept Probability, and how is it relevant to the paper?
Intercept probability refers to the likelihood of the secrecy capacity becoming non-positive, indicating a compromise in security. The paper focuses on minimizing this probability through optimal sensor scheduling.
What were the primary simulation parameters used in the results analysis?
The simulations modeled the wireless links using a Rayleigh fading channel. The sink-to-eavesdropper ratio () was considered to be 10dB throughout the simulated results.
What does the asymptotic analysis reveal about the intercept probability?
The asymptotic analysis demonstrates that intercept probability decreases as increases. For round robin scheduling, the intercept probability decays as | |, whereas for optimal sensor scheduling, it decays faster at a rate of | |, where N is the number of sensors.
How do the simulation results compare between the proposed optimal sensor scheduling and round robin scheduling?
The simulation results show that the proposed optimal sensor scheduling scheme outperforms the round robin scheme, achieving a lower intercept probability, especially as the number of sensor nodes increases.
What future research directions are suggested in the paper?
Future research directions include considering Quality of Service (QoS) requirements, extending the results to MIMO systems, and using multiple antennas to achieve greater secrecy.
- Citar trabajo
- Furqan Jameel (Autor), 2016, Asymptotic Analysis of Secrecy Capacity in Industrial Wireless Sensor Networks, Múnich, GRIN Verlag, https://www.grin.com/document/337117