Ivica Marjanović, Dejan Milić, Jelena Anastasov, Aleksandra Cvetković

DOI Number
First page
Last page


In this paper, a physical layer security analysis of wireless sensor network in the presence of an attacker, employing opportunistic scheduling approach, is presented. The intended as well as unintended transmission paths experience the Weibull fading. A novel analytical expression for the intercept probability is derived. In order to emphasize the advantages of the opportunistic scheduling approach, a comparative analysis with round-robin and optimal scheduling schemes is also given. The impact of a number of active sensors and the impact of fading channel conditions over main and wiretap channels on the intercept probabilities is obtained. The accuracy of theoretical results is confirmed by independent Monte Carlo simulation results.


intercept probability, opportunistic scheduling scheme, physical layer security, Weibull fading channel, wireless sensor network

Full Text:



H. Radhappa, L. Pan, J. X. Zheng, S. Wen, "Practical overview of security issues in wireless sensor network applications", International Journal of Computers and Applications, vol. 40, no. 4, pp. 202 213, 2017. [Online]. Available: 10.1080/1206212X.2017.1398214

H. Lin, H. Wen, B. Wu, F. Pan, R. F. Liao, H. Song, J. Tang, X. Wang, "Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things," IEEE Internet of Things Journal, vol. 5, no. 1, pp. 219-228, 2018. [Online]. Available:

J. Zhu, Y. Zou, B. Zheng, "Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks", IEEE Access, vol. 5, pp. 5313 5320, 2017. [Online]. Available:


Y. Liu, H. Chen, L. Wang, "Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges", IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 347 376, 2017. [Online]. Available:

X. Zhou, L. Song, Y. Zhang, Physical Layer Security in Wireless Communications. CRC Press, Boca Raton, 2016.

P. Shor, “Algorithms for quantum computation: Discrete logarithms and factoring,” in Proceedings 35th annual symposium on foundations of computer science, Santa Fe, USA, pp. 124 134, 1994. [Online]. Available:

A. D. Wyner, "The wire-tap channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355 1387, 1975. [Online]. Available:

F. Jameel, Faisal, M. A. A. Haider, A. A. Butt, "Physical layer security under Rayleigh/Weibull and Hoyt/Weibull fading," in Proceedings of 13th International Conference on Emerging Technologies (ICET), Islamabad, pp. 1 5, 2017. [Online]. Available:

Y. Zou, G. Wang, "Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack", IEEE Transactions on Industrial Informatics, vol. 12, no. 2, pp. 780 787, 2016. [Online]. Available:

D. Milić, D. Milović, I. Marjanović, J. Anastasov, A. Cvetković, "Physical layer security of wireless sensor networks over Weibull fading channels", in Proceedings of 8th International Scientific Conference on Defensive Technologies (OTEH 2018), Belgrade, Serbia, pp. 405-409, 2018.

F. Jameel, S. Wyne, I. Krikidis, "Secrecy Outage for Wireless Sensor Networks", IEEE Communications Letters, vol. 21, no. 7, pp. 1565 1568, 2017. [Online]. Available:


X. Ge, P. Wu, H. Jin, V. C. M. Leung, "Secrecy analysis of multiuser downlink wiretap networks with opportunistic scheduling," in Proceedings of 2015 IEEE International Conference on Communications (ICC), London, UK, pp. 7370 7375, 2015. [Online]. Available:

Q. Wu, D. W. Matolak, I. Sen, "5-GHz-Band Vehicle-to-Vehicle Channels: Models for Multiple Values of Channel Bandwidth", IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2620 2625, 2010. [Online]. Available:

Y. Ibdah, Y. Ding, "Mobile-to-Mobile Channel Measurements at 1.85 GHz in Suburban Environments", IEEE Transactions on Communications, vol. 63, no. 2, pp. 466 475, 2015. [Online]. Available:

X. Liu, "Average secrecy capacity of the Weibull fading channel," in Proceedings of 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, USA, pp. 841 844, 2016. [Online]. Available:

Y. Zou, X. Wang, W. Shen, "Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks", IEEE Journal on Selected Areas in Communications, vol. 31, no. 10, pp. 2099 2111, 2013. [Online]. Available:

S. Goel, R. Negi, "Guaranteeing Secrecy using Artificial Noise", IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180 2189, 2008. [Online]. Available:


H. Jin; B. C. Jung, V. C. M. Leung, “Fundamental Limits of CDF-Based Scheduling: Throughput, Fairness, and Feedback Overhead” IEEE/ACM Transactions on Networking, vol. 23, no. 3, pp. 894 907, 2015. [Online]. Available:

I. S. Gradshteyn, I. M. Ryzhik, Tables of integrals, series, and products, fifth edition, New York, Academic Press, 1994.



  • There are currently no refbacks.

Print ISSN: 1820-6417
Online ISSN: 1820-6425