Research Article |
Parameters Measurement and Secrecy Diversity Analysis for Physical Layer Security in WSNs using Projection Pursuit Gaussian Process Regression
Author(s): Shruti Sharma*
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 12, Issue 1
Publisher : FOREX Publication
Published : 20 January 2024
e-ISSN : 2347-470X
Page(s) : 20-27
Abstract
Wireless sensor networks are specialized networks, geographically dispersed monitors that keep track of environmental external factors and conduct the collected information to a centralized opinion. The rapid growth of wireless sensor networks and its connected have pushed the saturation level of the communication. Moreover, the information passed is prone to the attacks and hence researchers have considered these as crucial factors in wireless sensor networks. Physical layer security is the one of the main approaches to ensure the secrecy of wireless sensor networks and has been attained with several encryption and signal processing approach. In our approach we propose a novel Projection Pursuit Gaussian Process regression (PPGPR) technique to analyze the diverse secrecy of physical layer in wireless sensor networks. The proposed approach is utilized to safeguard the sensitive data with secured physical layer. Simulations are performed and made an analogous study with state-of-art works to ensure the secrecy of the proposed work. The proposed work can use for the secured wireless communication with higher secrecy capacity than the existing approaches. The performance is analyzed with the parameters such as secrecy capacity, secrecy outage probability, packet delivery ratio, secrecy throughput, and energy consumption.
Keywords: Wireless sensor networks
, Physical layer security
, Gaussian process regression
, diverse secrecy
.
Shruti Sharma*, CEO, Brindavan Group of Institutions, Dwarakanagar, Bagalur Main Road, Yelahanka, Bangalore-63, Karnataka; Email: ceo@brindavancollege.com
-
[1] Xu, J.; Yuen, C.; Huang, C.; Ul Hassan, N.; Alexandropoulos, G.C.; Di Renzo, M.; Debbah, M. Reconfiguring wireless environments via intelligent surfaces for 6G: reflection, modulation, and security. Science China Information Sciences 2023, Volume 66, No 3, pp. 130304. [CrossRef]
-
[2] Al-Shareeda, M.A.; Anbar, M.; Hasbullah, I.H.; Manickam, S. Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sensors Journal 2020, Volume 21, No. 2, pp. 2422-2433. [CrossRef]
-
[3] Sehito, N.; Yang, S.; Ali, E.M.; Khan, M.A.; Larik, R.S.A.; Bari, I.; Kamal, M.M.; Khan, S.; Alibakhshikenari, M.; Limiti, E. Physical layer secrecy by power splitting and jamming in cooperative multiple relays based on energy harvesting in full-duplex network. Electronics 2021, Volume 11, No 1, pp. 40. [CrossRef]
-
[4] Li, Y.; Chen, X.; Lin, Y.; Srivastava, G.; Liu, S. Wireless transmitter identification based on device imperfections. IEEE Access 2020, Volume 8, pp. 59305-59314.
-
[5] Qoria, T.; Rokrok, E.; Bruyere, A.; François, B.; Guillaud, X. A PLL-free grid-forming control with decoupled functionalities for high-power transmission system applications. IEEE Access 2020, Volume 8, pp.197363-197378. [CrossRef]
-
[6] Ji, B.; Li, Y.; Cao, D.; Li, C.; Mumtaz, S.; Wang, D. Secrecy performance analysis of UAV assisted relay transmission for cognitive network with energy harvesting. IEEE Transactions on Vehicular Technology 2020, Volume 69, No. 7, pp. 7404-7415. [CrossRef]
-
[7] Wei, Z.; Masouros, C.; Liu, F.; Chatzinotas, S.; Ottersten, B. Energy-and cost-efficient physical layer security in the era of IoT: The role of interference. IEEE Communications Magazine 2020, Volume 58, No. 4, pp. 81-87. [CrossRef]
-
[8] Gomez-Barquero, D.; Lee, J.Y.; Ahn, S.; Akamine, C.; He, D.; Montalaban, J.; Wang, J.; Li, W.; Wu, Y. IEEE transactions on broadcasting special issue on: Convergence of broadcast and broadband in the 5G era. IEEE Transactions on Broadcasting 2020, Volume 66, No. 2, pp. 383-389. [CrossRef]
-
[9] Guo, K.; An, K.; Zhang, B.; Huang, Y.; Tang, X.; Zheng, G.; Tsiftsis, T.A. Physical layer security for multiuser satellite communication systems with threshold-based scheduling scheme. IEEE Transactions on Vehicular Technology 2020, Volume 69, No. 5, pp. 5129-5141. [CrossRef]
-
[10] Khoshafa, M.H.; Ngatched, T.M.; Ahmed, M.H. On the physical layer security of underlay relay-aided device-to-device communications. IEEE Transactions on Vehicular Technology 2020, Volume 69, No. 7, pp.7609-7621. [CrossRef]
-
[11] Singh, R.; Rawat, M.; Jaiswal, A. On the physical layer security of mixed FSO-RF SWIPT system with non-ideal power amplifier. IEEE Photonics Journal 2021, Volume 13, No. 4, pp. 1-17. [CrossRef]
-
[12] Chen, Y.; Zhang, T.; Liu, Y.; Qiao, X. Physical layer security in NOMA-enabled cognitive radio networks with outdated channel state information. IEEE Access 2020, Volume 8, pp. 159480-159492. [CrossRef]
-
[13] Li, B.; Zou, Y.; Zhu, J.; Cao, W. Impact of hardware impairment and co-channel interference on security-reliability trade-off for wireless sensor networks. IEEE Transactions on Wireless Communications 2021, Volume 20, No. 11, pp.7011-7025. [CrossRef]
-
[14] Tashman, D.H.; Hamouda, W. Physical-layer security on maximal ratio combining for SIMO cognitive radio networks over cascaded κ-μ fading channels. IEEE Transactions on Cognitive Communications and Networking 2021, Volume 7, No. 4, pp. 1244-1252. [CrossRef]
-
[15] Choi, J.; Joung, J.; Jung, B.C. Space–time line code for enhancing physical layer security of multiuser MIMO uplink transmission. IEEE Systems Journal 2020, Volume 15, No. 3, pp. 3336-3347. [CrossRef]
-
[16] Wang, H.; Xu, L.; Lin, W.; Xiao, P.; Wen, R. Physical layer security performance of wireless mobile sensor networks in smart city. IEEE Access 2019, Volume 7, pp. 15436-15443. [CrossRef]
-
[17] Chen, Gecheng, Rui Tuo. Projection pursuit Gaussian process regression. IISE Transactions 2023, Volume 55, No. 9, pp. 901-911. [CrossRef]
-
[18] Mutny, Mojmir, Johannes Kirschner, Andreas Krause. Experimental design for optimization of orthogonal projection pursuit models. In Proceedings of the AAAI Conference on Artificial Intelligence 2020, Volume 34, No. 06, pp. 10235-10242. [CrossRef]
-
[19] Bashar, Abul, Smys. S. Physical layer protection against sensor eavesdropper channels in wireless sensor networks. IRO Journal on Sustainable Wireless Systems 2021, Volume 3, No. 2, pp. 59-67. [CrossRef]
-
[20] Gao, Ning, Qiang Ni, Daquan Feng, Xiaojun Jing, Yue Cao. Physical layer authentication under intelligent spoofing in wireless sensor networks. Signal Processing 2020, Volume 166, pp. 107272. [CrossRef]
-
[21] Saju, Chinju, Prawin Angel Michael, Jarin. T. Modeling and control of a hybrid electric vehicle to optimize system performance for fuel efficiency. Sustainable Energy Technologies and Assessments 2022, Volume 52, pp. 102087. [CrossRef]
-
[22] Vijay, M. M.; Punithavathani, S. D. Implementation of memory-efficient linear pipelined IPv6 lookup and its significance in smart cities. & quot; Computers & amp; Electrical Engineering 2018, Volume 67, pp.1-14. [CrossRef]
-
[23] Ramana, T. V.; Pandian, A.; Ellammal, C.; Jarin, T.; Ahmed Nabih Zaki Rashed; Sampathkumar. A. Numerical analysis of circularly polarized modes in coreless photonic crystal fiber. Results Phys 2019, Volume 13, No. 102140, pp. 10-1016. [CrossRef]