Preface |
|
xiii | |
|
|
xvii | |
|
|
xix | |
About the Author |
|
xxiii | |
Acknowledgments |
|
xxv | |
|
|
1 | (12) |
|
1.1 Cooperative Wireless Networks |
|
|
1 | (1) |
|
1.1.1 Cooperative Communications Idea |
|
|
2 | (1) |
|
1.1.2 Physical Layer Security Idea |
|
|
2 | (1) |
|
1.2 Wireless Sensor Networks |
|
|
2 | (3) |
|
1.2.1 Unattended Wireless Sensor Networks |
|
|
3 | (2) |
|
|
5 | (1) |
|
|
6 | (1) |
|
1.5 Book Objectives and Contributions |
|
|
6 | (3) |
|
|
9 | (4) |
|
SECTION I SECURITY IN COOPERATIVE WIRELESS NETWORKS |
|
|
|
2 Overview of Cooperative Communications in Wireless Systems |
|
|
13 | (24) |
|
|
13 | (1) |
|
2.2 Characteristics of Wireless Channels |
|
|
14 | (5) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
2.2.3.1 Multipath Propagation |
|
|
16 | (1) |
|
2.2.3.2 Doppler Frequency Shift |
|
|
17 | (2) |
|
2.3 Common and Cooperative Diversity |
|
|
19 | (4) |
|
2.3.1 Common Diversity Techniques |
|
|
19 | (2) |
|
|
21 | (1) |
|
2.3.3 Cooperative Diversity |
|
|
22 | (1) |
|
2.4 Classical Relay Channel |
|
|
23 | (1) |
|
2.5 Cooperative Communications |
|
|
24 | (1) |
|
|
24 | (1) |
|
2.5.2 Historical Background |
|
|
24 | (1) |
|
2.6 Cooperation Protocols |
|
|
25 | (5) |
|
2.6.1 Fixed Cooperation Strategies |
|
|
26 | (1) |
|
2.6.1.1 Fixed AF Relaying Protocol |
|
|
26 | (1) |
|
2.6.1.2 Fixed DF Relaying Protocol |
|
|
27 | (1) |
|
|
28 | (1) |
|
2.6.1.4 Coded Cooperation |
|
|
28 | (1) |
|
2.6.2 Adaptive Cooperation Strategies |
|
|
29 | (1) |
|
2.6.2.1 Selective DF Relaying |
|
|
29 | (1) |
|
2.6.2.2 Incremental Relaying |
|
|
30 | (1) |
|
2.7 Cooperative Diversity Based on Relay Selection |
|
|
30 | (4) |
|
2.7.1 Relay Selection Metrics |
|
|
30 | (1) |
|
2.7.1.1 Reactive Opportunistic Relaying |
|
|
31 | (1) |
|
2.7.1.2 Proactive Opportunistic Relaying |
|
|
32 | (1) |
|
2.7.2 Relay Selection Implementation |
|
|
33 | (1) |
|
2.7.2.1 Destination-Driven Protocol |
|
|
33 | (1) |
|
2.7.2.2 Relay-Driven Protocol |
|
|
34 | (1) |
|
2.8 Application Scenarios |
|
|
34 | (1) |
|
2.8.1 Virtual Antenna Array |
|
|
34 | (1) |
|
2.8.2 Wireless Sensor Network |
|
|
34 | (1) |
|
2.8.3 Wireless Ad Hoc Network |
|
|
35 | (1) |
|
2.8.4 Vehicle-to-Vehicle Communication |
|
|
35 | (1) |
|
2.8.5 Cooperative Sensing for Cognitive Radio |
|
|
35 | (1) |
|
2.9 Pros and Cons of Cooperation |
|
|
35 | (2) |
|
2.9.1 Cooperation Advantages |
|
|
35 | (1) |
|
2.9.2 Cooperation Disadvantages |
|
|
36 | (1) |
|
3 Physical Layer Security in Wireless Networks |
|
|
37 | (14) |
|
|
37 | (1) |
|
3.2 Why Physical Layer Security |
|
|
38 | (1) |
|
|
38 | (4) |
|
3.3.1 Key-Based Security for Wireless Channels |
|
|
39 | (1) |
|
3.3.2 Keyless Security for Wireless Channels |
|
|
40 | (1) |
|
3.3.3 General Wiretap Channel |
|
|
40 | (1) |
|
3.3.4 Gaussian Wiretap Channel |
|
|
41 | (1) |
|
3.4 Cooperative Secrecy Techniques for the Physical Layer |
|
|
42 | (4) |
|
3.4.1 Cooperative Jamming with Gaussian Noise |
|
|
42 | (1) |
|
3.4.2 Cooperative Jamming with Noise Forwarding |
|
|
43 | (1) |
|
3.4.3 Cooperative Jamming with Structured Codes |
|
|
44 | (1) |
|
3.4.4 Cooperative Jamming by Alignment |
|
|
45 | (1) |
|
3.5 Cooperative Jamming for Secure Relay Networks |
|
|
46 | (5) |
|
3.5.1 Secrecy in View of Trusted Relays |
|
|
46 | (3) |
|
3.5.2 Secrecy in View of Untrusted Relays |
|
|
49 | (2) |
|
4 Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks |
|
|
51 | (24) |
|
|
51 | (2) |
|
4.2 System Model and Problem Formulation |
|
|
53 | (3) |
|
4.2.1 Presence of One Eavesdropper |
|
|
53 | (1) |
|
|
53 | (1) |
|
4.2.1.2 Problem Formulation |
|
|
54 | (1) |
|
4.2.2 Presence of Multiple Eavesdroppers |
|
|
55 | (1) |
|
|
55 | (1) |
|
4.2.2.2 Problem Formulation |
|
|
56 | (1) |
|
4.3 Relay and Jammer Selection Schemes |
|
|
56 | (7) |
|
4.3.1 Presence of One Eavesdropper |
|
|
57 | (1) |
|
4.3.1.1 Selection Schemes without Jamming |
|
|
57 | (1) |
|
4.3.1.2 Selection Schemes with Conventional Jamming |
|
|
57 | (2) |
|
4.3.1.3 Selection Schemes with Controlled Jamming |
|
|
59 | (1) |
|
4.3.1.4 Hybrid Selection Schemes |
|
|
60 | (1) |
|
4.3.2 Presence of Multiple Eavesdroppers |
|
|
61 | (1) |
|
4.3.2.1 Selection Schemes without Jamming |
|
|
61 | (1) |
|
4.3.2.2 Selection Schemes with Conventional Jamming |
|
|
61 | (1) |
|
4.3.2.3 Selection Schemes with Controlled Jamming |
|
|
62 | (1) |
|
4.4 Numerical Results and Discussion |
|
|
63 | (10) |
|
4.4.1 Impact of Changing the N-Relays Set Location with Respect to the Destination and the Eavesdropper |
|
|
63 | (5) |
|
4.4.2 Impact of Changing the Eavesdropper Location with Respect to the Source and the Destination |
|
|
68 | (2) |
|
4.4.3 Impact of the Presence of Multiple Eavesdroppers |
|
|
70 | (3) |
|
|
73 | (2) |
|
5 Relay and Jammer Selection Schemes for Secure Two-Way Cooperative Networks |
|
|
75 | (32) |
|
|
75 | (3) |
|
|
76 | (1) |
|
5.1.2 Chapter Contributions |
|
|
77 | (1) |
|
5.2 Network Model and Assumptions |
|
|
78 | (4) |
|
5.2.1 Single Eavesdropper Model |
|
|
78 | (1) |
|
|
78 | (1) |
|
5.2.1.2 Problem Formulation |
|
|
79 | (1) |
|
5.2.2 Multiple Eavesdroppers Model |
|
|
80 | (1) |
|
|
80 | (1) |
|
5.2.2.2 Problem Formulation |
|
|
81 | (1) |
|
5.3 The Proposed Relay and Jammer Selection Schemes |
|
|
82 | (9) |
|
5.3.1 Selection Schemes in the Presence of One Eavesdropper |
|
|
82 | (1) |
|
5.3.1.1 Selection Schemes without Jamming |
|
|
82 | (3) |
|
5.3.1.2 Selection Schemes with Conventional Jamming |
|
|
85 | (2) |
|
5.3.1.3 Selection Schemes with Controlled Jamming |
|
|
87 | (1) |
|
5.3.1.4 Hybrid Selection Schemes |
|
|
87 | (2) |
|
5.3.2 Selection Schemes in the Presence of Multiple Eavesdroppers |
|
|
89 | (1) |
|
5.3.2.1 Selection Schemes with Noncooperating Eavesdroppers |
|
|
89 | (1) |
|
5.3.2.2 Selection Schemes with Cooperating Eavesdroppers |
|
|
90 | (1) |
|
5.4 Numerical Results and Discussion |
|
|
91 | (12) |
|
5.4.1 Secrecy Performance for the Single Eavesdropper Model |
|
|
91 | (1) |
|
5.4.1.1 Secrecy Performance When Changing the N-Relays Set Location in the Considered Area |
|
|
91 | (9) |
|
5.4.1.2 Secrecy Performance When Changing the Eavesdropper Location with Respect to the Two Sources (S1and S2) |
|
|
100 | (1) |
|
5.4.2 Secrecy Performance for the Multiple Eavesdroppers Model |
|
|
101 | (2) |
|
|
103 | (4) |
|
SECTION II SECURITY AND DATA RELIABILITY IN WIRELESS SENSOR NETWORKS |
|
|
|
6 Overview on Sensor Networks |
|
|
107 | (16) |
|
6.1 Wireless Sensor Network |
|
|
107 | (7) |
|
|
108 | (1) |
|
6.1.1.1 Deployment Classification |
|
|
109 | (1) |
|
6.1.1.2 Environment Classification |
|
|
109 | (1) |
|
6.1.2 WSN Modes of Operation |
|
|
110 | (1) |
|
|
110 | (1) |
|
6.1.3.1 Industrial Control and Monitoring |
|
|
111 | (1) |
|
6.1.3.2 Security and Military Sensing Applications |
|
|
111 | (1) |
|
6.1.3.3 Intelligent Agriculture and Environmental Sensing Applications |
|
|
111 | (1) |
|
6.1.3.4 Health Monitoring Applications |
|
|
111 | (1) |
|
6.1.3.5 Home Automation and Consumer Electronics |
|
|
112 | (1) |
|
6.1.3.6 Other Commercial Applications |
|
|
112 | (1) |
|
6.1.4 Factors Influencing Sensor Network Design |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
6.1.4.4 Hardware Constraints |
|
|
113 | (1) |
|
|
114 | (9) |
|
|
115 | (1) |
|
6.2.1.1 Robustness/Ability to Withstand Rough Environmental Conditions |
|
|
115 | (1) |
|
6.2.1.2 Ability to Cover Wide and Dangerous Areas |
|
|
115 | (1) |
|
|
116 | (1) |
|
6.2.1.4 Ability to Master Node Failures |
|
|
116 | (1) |
|
6.2.1.5 Mobility of Nodes |
|
|
116 | (1) |
|
6.2.1.6 Dynamic Network Topology |
|
|
116 | (1) |
|
6.2.1.7 Heterogeneity of Nodes |
|
|
116 | (1) |
|
6.2.1.8 Multihop Communication |
|
|
116 | (1) |
|
6.2.1.9 Unattended Operation |
|
|
117 | (1) |
|
6.2.2 Disadvantages of UWSN |
|
|
117 | (1) |
|
6.2.2.1 Limited Energy Resources |
|
|
117 | (1) |
|
|
117 | (1) |
|
6.2.2.3 Communication Failures |
|
|
117 | (1) |
|
|
117 | (1) |
|
6.2.3 Applications of UWSNs |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
6.2.6 Security Challenges |
|
|
121 | (1) |
|
6.2.7 Possible Attacks on Nodes |
|
|
122 | (1) |
|
7 Cooperative Hybrid Self-Healing Randomized Distributed Scheme for UWSN Security |
|
|
123 | (26) |
|
|
123 | (1) |
|
7.2 Overview of UWSN Security Challenges |
|
|
124 | (2) |
|
|
126 | (3) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (12) |
|
7.4.1 CHSHRD Scheme Steps |
|
|
130 | (6) |
|
7.4.2 Analytical Model of CHSHRD Scheme |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (4) |
|
7.5 Numerical Results and Discussions |
|
|
141 | (6) |
|
7.5.1 Theoretical Results |
|
|
141 | (2) |
|
|
143 | (4) |
|
|
147 | (2) |
|
8 Self-Healing Cluster Controlled Mobility Scheme for Self-Healing Enhancement |
|
|
149 | (30) |
|
|
149 | (2) |
|
8.2 Network Model and Assumptions |
|
|
151 | (2) |
|
|
151 | (1) |
|
|
152 | (1) |
|
8.2.3 Compromising and Data Secrecy |
|
|
153 | (1) |
|
8.3 SH-CCM Simulation Analysis |
|
|
153 | (6) |
|
8.4 SH-CCM Scheme Analytical Analysis |
|
|
159 | (9) |
|
8.4.1 Network Level Analysis |
|
|
161 | (3) |
|
8.4.2 Cluster Level Analysis |
|
|
164 | (4) |
|
8.5 Results and Discussion |
|
|
168 | (9) |
|
|
168 | (4) |
|
|
172 | (5) |
|
|
177 | (2) |
|
9 Self-Healing Single Flow Controlled Mobility within a Cluster Scheme for Energy Aware Self-Healing |
|
|
179 | (20) |
|
|
179 | (2) |
|
9.2 System Model and Assumptions |
|
|
181 | (2) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
9.2.4.1 Energy Communication Model |
|
|
182 | (1) |
|
9.2.4.2 Energy Motion Model |
|
|
183 | (1) |
|
9.3 Trade-Off between Mobility and Other Network Aspects |
|
|
183 | (1) |
|
9.4 Proposed SH-SFCCM Scheme |
|
|
184 | (6) |
|
9.5 Simulation Setup and Performance Evaluation |
|
|
190 | (7) |
|
|
190 | (1) |
|
9.5.2 Performance Evaluation |
|
|
191 | (1) |
|
9.5.2.1 Impact of Mobility Energy Consumption |
|
|
191 | (1) |
|
9.5.2.2 Extensive Analysis of SH-SFCMC |
|
|
192 | (5) |
|
|
197 | (2) |
|
10 Conclusion and Future Work |
|
|
199 | (6) |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (3) |
Appendix A MATLAB® Simulation Codes for Chapter 4 |
|
205 | (42) |
Appendix B MATLAB® Simulation Codes for Chapter 5 |
|
247 | (60) |
Appendix C MATLAB® Simulation Codes for Chapter 7 |
|
307 | (58) |
Appendix D MATLAB® Simulation Codes for Chapter 8 |
|
365 | (80) |
Appendix E MATLAB® Simulation Codes for Chapter 9 |
|
445 | (36) |
References |
|
481 | (14) |
Index |
|
495 | |