SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 6, December 2020, pp. 6673~6681
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i6.pp6673-6681  6673
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Physical layer security and energy efficiency over different
error correcting codes in wireless sensor networks
Mohammed Ahmed Magzoub1
, Azlan Abd Aziz2
, Mohammed Ahmed Salem3
,
Hadhrami Ab Ghani4
, Azlina Abdul Aziz5
, Azwan Mahmud6
1,2,3,4, 5
Faculty of Engineering and Technology (FET), Multimedia University, Malaysia
6
Faculty of Engineering (FOE), Multimedia University, Malaysia
Article Info ABSTRACT
Article history:
Received Nov 26, 2018
Revised May 29, 2020
Accepted Jun 6, 2020
Despite the rapid growth in the market demanding for wireless sensor
networks (WSNs), they are far from being secured or efficient. WSNs are
vulnerable to malicious attacks and utilize too much power. At the same
time, there is a significant increment of the security threats due to the growth
of the several applications that employ wireless sensor networks. Therefore,
introducing physical layer security is considered to be a promising solution to
mitigate the threats. This paper evaluates popular coding techniques like
Reed solomon (RS) techniques and scrambled error correcting codes
specifically in terms of security gap. The difference between the signal to
nose ratio (SNR) of the eavesdropper and the legitimate receiver nodes is
defined as the security gap. We investigate the security gap, energy
efficiency, and bit error rate between RS and scrambled t-error correcting
codes for wireless sensor networks. Lastly, energy efficiency in RS and
Bose-Chaudhuri-Hocquenghem (BCH) is also studied. The results of
the simulation emphasize that RS technique achieves similar security gap as
scrambled error correcting codes. However, the analysis concludes that
the computational complexities of the 𝑅𝑆 is less compared to the scrambled
error correcting codes. We also found that BCH code is more energy-efficient
than RS.
Keywords:
Energy efficiency
Error correcting codes
Physical layer security
Reed solomon
Security gap (𝑆 𝐺)
Signal to nose ratio
Wireless sensor networks
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Azlan Abd Aziz,
Faculty of Engineering and Technology,
Multimedia University,
Melaka, 75450, Malaysia.
Email: azlan.abdaziz@mmu.edu.my
1. INTRODUCTION
The open nature of the wireless communication technologies makes the wireless medium subject to
many threats. Due to the increase in the number of attacks against the wireless communication system,
a growing interest has developed in securing the information over wireless transmission system [1].
In the TCP/IP model, security algorithms are applied in the upper layers. However, physical layer security
(PLS) does not contain any type of security even though it contains features that could provide security from
information theory point of view [2].
In PLS, the transmitter and receiver are assumed to be aware of the techniques used for transmission.
PLS is achieved when the parties of the communication system aware of the information about the used
techniques for transmission yet there is a variation in the quality between wiretap channel and the main
channel [3-7]. In addition, it is assumed that the wiretapped channel (eavesdropper channel) is a degraded
version of the main channel, this helps the legitimate receiver using the main channel to get back
the transmitted data but the eavesdropper node is not able to get back the transmitted data and this is how PLS
is achieved. There are several metrics for security performance. In this paper, the selected security
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6673 - 6681
6674
performance metric is the security gap (𝑆 𝐺) because it is practical to be implemented, depends on the bit error
rate (BER) and the signal to noise ratio (SNR), and it is simple. Security gap is defined as the difference
between the SNR of the intended receiver and the SNR of the eavesdropper [8, 9].
Wireless sensor network (WSN) helps in analyzing and collecting the information. Security is
the major challenge to deploy for the WSN. The main reason is the vulnerability of the WSN to several
attacks such as wormhole attacks, Hello flood attacks, black hole attack, Sybil attack, attacks the data in
transit, and denial of services [10]. Cryptography is an approach to avoid these attacks. However,
the algorithms of cryptography are computationally expensive. Researchers proposed several strategies to
calculate the quality of the transmitted data, such as bose-chaudhuri-hocquenghem (BCH), reed solomon
(RS), and low-density parity check (LDPC). The challenging part is to identify the suitable strategy in terms
of power efficiency for error correction [11, 12]. This open research question makes this topic to be the interest of
many researchers.
The threats that are facing the WSN leads to implement several works to prevent WSN from
some of the attacks. Typically, the energy and computation abilities of WSN are not enough to manage
the conventional security methods (sensor network method). To avoid the attacks with less computational
energy and power, physical layer security for WSN is an excellent approach to be selected. In [13]
demonstrate that the PLS techniques could be applied to WSN to ensure perfect secrecy. The authors
of [14-16] claim that the ancryption techniques such as channel aware encryption, and stochastic encryption
achive security and realibality. Yet, high computational energy and ability are required.
To the best of the authors’ knowledge, the error correction codes benefits in WSN has not been
adequately well investigated in terms of PLS. This paper studies the affects of various error correction codes
on the security of WSN. In this paper, the 𝑆 𝐺 metric is used unlike the previous literature works where
the maximum equivocation is used as the metric for security. In this paper, a brief explanation on the security
and the energy efficiency of the WSNs is presented as well since many previous works only focus on
the energy efficiency or the security aspects. Nontheless, there are a few investigations suggesting that
the various channel codes affect the energy consumption differently for WSNs [17, 18]. The efficiencies of
the code’s energy are evaluated with an analytical radio model. The authors of [4] shows that the energy
efficiency is changing with the variation of the codes based on the quality of the channel. In otherwords,
there are small differences between the codes in terms of energy efficiency in a good quality channel. Since
the processing power consumption for the coding technique is high [19], selecting the less complex coding
technique is essential mainly with the WSN applications due to the processing and memory constraints [20].
This paper analyzes the PLS by investigating several error corrections codes such as RS t-error
correction codes. Moreover, the focus is to study the affect of the t-error correction codes on the PLS.
The BCH codes acchives high 𝑆 𝐺 compared with LDPC codes. Thus, BCH is introduced with additional
techniques such as scrambling [21]. Scrambling the data bits is employed as an additional strategy to improve
the security by decreasing the gap between the eavesdropper node and legitimate receiver. By scrambling
the data bits, the probability of bit error is maintained close to 0.5 with the increasing of SNR [22].
The organization of this paper is as follows. Section 2 presents the system model. Section 3 provides some
introduction regarding the scrambled t-error correction codes, RS correcting codes, and BCH code. Section 4
discusses the results of the comparison between scrambled t-error correction codes and the (RS). Finally,
section 5 concludes this paper.
The main contributions of this paper are summarized as follow:
 The analysis of error correction codes such as scrambled error correction codes, BCH, and RS are
illustrated in terms of 𝑆 𝐺.
 The comparison in terms of 𝑆 𝐺 is investigated between the scrambled error correction codes and the RS.
 The comparison is done in terms of 𝑆 𝐺 between scrambled BCH and unscrambled BCH.
2. SYSTEM MODEL
In this research, the additive white gaussian noise (AWGN) wire-tap channel is utilized as the main
transmission channel between the sender (Alice), the legitimate receiver (Bob) and eavesdropper node (Eve).
This system model implemented firstly by [22]. Figure 1 illustrates the typical Wyner wiretap channel.
The sender (Alice) uses any suitable transmission technique to send the data message to the legitimate
receiver (Bob). The data is received by both Bob and Eve, where both are aware of the transmission
technique used by the sender. As a result, the received data message at both Bob and Eve is recovered.
However, the recovered messages differences in the channels between Eve and Alice, and Bob and Alice
make the difference in the recovered message.
Int J Elec & Comp Eng ISSN: 2088-8708 
Physical layer security and energy efficiency over different… (Mohammed Ahmed Magzoub)
6675
Figure 1. Wire-tap channel’s ystem model
3. PERFORMANCE ANALYSIS FOR THE ERROR CORRECTION CODES
This section introduces each t-error correction codes techniques. The scrambled codes and the RS
code are compared in terms of PLS.
3.1. Reed solomon (RS)
RS is a common error correcting code technique that is used with various bits. RS provides desirable
results for correcting burst errors due to the correction of these errors done in the bits level. RS code is
defined as (𝑛; 𝑘) code where 𝑘 denotes the message bits in the codeword and 𝑛 denotes the number of bits in
the codeword. RS codes can correct (𝑛 − 𝑘)/2 errors [11]. The advantages of RS are increasing the SNR and
the transmission secrecy rate.
3.1.1. Galois field (GF)
Galois field (GF) is a special field that has a special property, the arithmetic operations addition,
subtraction, multiplication, and division on field elements always have results.
3.1.2. Generator polynomial
In RS, the valid codeword can be divided by the generator polynomial. The general polynomial is
defined as:
𝑔(𝑥)(𝑥 − 𝛼𝑖)(𝑥 − 𝛼𝑖 + 1) … . . (𝑥 − 𝛼𝑖 + 2𝑡) (1)
the codeword is defined as
𝑐(𝑥) = (𝑥 − 𝛼𝑖 + 1) … . . (𝑥 − 𝛼𝑖 + 2𝑡) (2)
where g(x), i(x) and c(x) are the generator polynomial, information block, and valid codeword, respectively.
3.1.3. Encoder
The 2t is calculated using:
𝑝(𝑥) = 𝑖(𝑥). (𝑥𝑛 − 𝑘)𝑚𝑜𝑑𝑔(𝑥) (3)
In RS encoder each register holds a symbol that consist of 8 bits.
3.1.4. Decoder
The received message consists of two parts, the transmitted codeword and the errors.
𝑟(𝑥) = 𝑐(𝑥) + 𝑒(𝑥) (4)
RS can find up to t error position and correct them. The probability of bit error of RS using hard decision
decoding is calculated as,
𝑃𝑃 = 1/𝑛 ∑ 𝑖 (
𝑛
𝑖
) 𝑃𝑖(1 − 𝑃) 𝑛−𝑖
{𝑡}𝑖
𝑖=𝑡 𝑒𝑐+1
(5)
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6673 - 6681
6676
Where 𝑃 denotes the probability of the channel bit error, 𝑛 denotes the bits number in
the codeword, and 𝑡 𝑒𝑐 = (𝑛 − 𝑘)/2 is the capability of the RS code to correct errors. RS codes have various
decoding strategies. However, the strategy of hard decision-decoding is selected. Figure 2 illustrates the BER
of the RS codes with several code-length. Based on Figure 2, the RS codes are observed to be highly
imperfect due to the increament of the probability of error with the decrease of the SNR and the codeword.
This imperfection is considered as an advantage for security.
3.2. Bose-chaudhuri-hocquenghem (BCH)
BCH is deemed as an error correction codes technique that is able for correcting and detecting
several bits error [23-25]. BCH is an error correcting code technique that is suitable for WSNs due to its
properties of enhancing the efficiency of the energy by 23% [20]. BCH was selected by [21] to be scrambled
to reduce the 𝑆 𝐺 between the eavesdropper and the legitimate receiver. In this section, BCH has been
evaluated without using the scrambling techniques and compared against Reed Solomon without scrambling.
Figure 3 indicates the impact of the scrambling on BCH code. The BER improves significantly with
scrambling as the SNR increases and outperforms that without scrambling.
Figure 2. BER of RS codes using BPSK over an
AWGN channel
Figure 3. BER of BCH with and
without scrambling
3.3. Scrambled t-error correction codes
The implementation of Non-systematic codes is firstly introduced in [22]. The authers of [20] utilize
the scrambling techniques to reduce the 𝑆 𝐺. Thus, proving that scrambling has a significant impact on the 𝑆 𝐺.
The scrambling technique assumed that the transmitter is going to encode the message as follow,
𝐶 = 𝑈. 𝑆. 𝐺 (6)
where the 𝐺 is a generator matrix with dimension 𝑘𝑥𝑛, and 𝑆 is scrambling matrix with dimension 𝑘𝑥𝑘.
The generator matrix 𝐺 can be written in different ways due to its systematic character. Now 𝐺 can be written
as 𝐺 = [𝐼|𝐶], 𝐼 is identity matrix with dimension 𝑘𝑥𝑘, and 𝐶 is 𝑘𝑥(𝑛 − 𝑘) parity check matrix. Now with all
mentioned above. The codeword can be written as,
𝑐 = [𝑈. 𝑆| 𝑈. 𝑆. 𝐶] = [𝑚𝑙|𝑚 𝑟] (7)
From the above equation, the 𝑚𝑙 is the first 𝑘𝑏𝑖𝑡𝑠 of the codeword while the 𝑚 𝑟 is last rbits of
the codeword. To ensure the PLS, the BER of the intended receiver should be low as well as the SNR should
be high enough to ensure all the errors could be corrected and for that 𝑈 𝐵 = 𝑢 = 𝑚𝑙. 𝑆1
The bit error
probability while theBER for the eavesdropper should be high, as well as the SNR, should be low so that
the eavesdropper is not going to be able to decode the message and for that, the output of the descrambler for
the eavesdropper can be written as,
𝑈 𝐸 = 𝑢 + 𝑒𝑙. 𝑆−1 (8)
where 𝑒𝑙 is the left part of the error vector [𝑒𝑙|𝑒 𝑟] for the perfect scrambling is calculated.
Int J Elec & Comp Eng ISSN: 2088-8708 
Physical layer security and energy efficiency over different… (Mohammed Ahmed Magzoub)
6677
𝑃𝑒
𝑃𝑆
= 1/2 ∑ (
𝑘
𝑗
) ∑ (
𝑛 − 𝑘
𝑖 − 𝑗
)
𝑛
𝑖=𝑡+1
𝑘
𝑗=1
𝑃𝑜
𝑖(1 − 𝑃𝑜) 𝑛−𝑖
(9)
In (9) computes the probability of the bit error for perfect scrambling where 𝑘 denotes the total
message bits in the codeword. The authors of [14] demonstrates the results of (9) using BCH codes. Figure 4
depicts the various level of scrambling as 𝑊 represents the column weight of the scrambling matrix.
The lowest 𝑆 𝐺 is retrieved with the perfect scrambling diagram.
Figure 4. BER of different level of scrambling using BPSK over AWGN channel
3.4. Physical layer security for the error correction codes
The idea behind the coding techniques is to make the mutual information between the message and
the encoded message is zero. The information leaked for the data may reach zero if the uncertainty of
the randomization is small [15, 17]. In this paper, the 𝑆 𝐺 is performance metric used. The security for
the transmitted data exists by maintaining the BER of the receiver close to aero and the eavesdropper to 0.5
and above. This condition ensures that the eavesdropper not able to decode the received message back.
Let the BER average at the legitimate receiver and the eavesdropper be 𝑃𝐵 𝑒
and 𝑃𝐸 𝑒
respectively. Then, it is
required that 𝑃𝐸 𝑒
be high to ensure security and that 𝑃𝐵 𝑒
be adequately low for ensuring the reliability.
If the errors are identically independent distributed (IID) and 𝑃𝐸 𝑒
is close to 0.5, then eavesdropper is
incapable of extracting data from the received sequence 𝑍 𝑛 . For fixed 𝑃𝐵 𝑒,𝑚𝑎𝑥, (≈ 0.5) and 𝑃𝐸 𝑒,𝑚𝑖𝑛, (≈ 0.5)
it must hold that
𝑎) 𝑃𝐵 𝑒
≤ 𝑃𝐵 𝑒,𝑚𝑎𝑥(𝑟𝑒𝑙𝑖𝑎𝑏𝑖𝑙𝑖𝑡𝑦).
𝑏) 𝑃𝐸 𝑒
≤ 𝑃𝐸 𝑒,𝑚𝑖𝑛(𝑠𝑒𝑐𝑢𝑟𝑖𝑡𝑦).
Let 𝑆𝑁𝑅 𝐵 𝑚𝑖𝑛
be the lowest 𝑆𝑁𝑅 for which a) holds and let 𝑆𝑁𝑅 𝐵 𝑚𝑎𝑥
be the highest 𝑆𝑁𝑅 for which
b) holds. It is assumed that the receiver operates at 𝑆𝑁𝑅 𝐵 𝑚𝑖𝑛
and that eavesdropper 𝑆𝑁𝑅 is strictly lower than
𝑆𝑁𝑅 𝐵 𝑚𝑖𝑛
. The 𝑆 𝐺 performance metric is defined as
𝑆𝑁𝑅 𝐵 𝑚𝑖𝑛
𝑆𝑁𝑅 𝐸 𝑚𝑎𝑥
in dB. The authors of [22] introduced a scheme
in terms of the 𝑆 𝐺 which is the ratio between the SNR for the legitimate receiver and the SNR for
the eavesdropper
𝑆𝑁𝑅 𝐵
𝑆𝑁𝑅 𝐸
.
3.5. Energy efficiency analysis
Based on [4], the largest energy consumption in a communication system is the tasks of reception
and transmission. In (10) calculates the consumption of energy for sending data bits 𝑚 throughout a wireless
channel to the legitimate receiver at distance 𝑑.
𝐸𝐿(𝑚, 𝑑) = 𝐸 𝑇(𝑚, 𝑑) − 𝐸 𝑅(𝑚) (10)
Where 𝐸 𝑇 is the consumed energy in the transmitter and 𝐸 𝑅 is the consumed energy at the receiver.
At the transmitter the energy consumed is calculated as,
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6673 - 6681
6678
𝐸𝐿(𝑚, 𝑑) = 𝐸 𝑇𝐶(𝑚, 𝑑) + 𝐸 𝑇𝐴(𝑚, 𝑑) (11)
where 𝐸 𝑇𝐴 is the energy spent at the transmitter amplifier and 𝐸 𝑇𝐶 is the spent energy by the transmitter
circuit. The relationship between the energy spent per bit at the receiver and the energy spent per bit at the
transmitter is assumed to be linear and can be found by the equation:
𝐸 𝑇(𝑚, 𝑑) = 𝑚(𝑒 𝑇𝐶 + 𝑚𝑒 𝑇𝐴
𝑑 𝛼
) (12)
𝐸 𝑅(𝑘) = 𝑚𝑒 𝑅𝐶 (13)
where 𝑒 𝑇𝐶 and 𝑒 𝑅𝐶 are the components of the hardware. Finally, the relationship between energy
consumption and the probability of bit error is illustrated as,
𝐸 𝑇(𝐴) = 𝜎 (
𝑆
𝑁
)
𝑟
(14)
𝜎 = (𝑁𝐹𝑅𝑋)(𝑁𝑜)(𝐵𝑊)(𝑟𝜋𝜆) 𝛼
/(𝐺 𝑎𝑛𝑡)(𝑛 𝑎𝑚𝑝)(𝑅 𝑏𝑖𝑡) (15)
4. SIMULATION RESULTS AND DISCUSSION
This section presents and analyses the comparison between the RS and t-error correction codes in
terms of 𝑆 𝐺 metric. The codeword length for both techniques is considered as 𝑛 = 127. RS and scrambled
t-error correction codes are applied on the AWGN channel. Moreover, the data bits length for RS and
scrambled t-error correction codes are considered to be 𝑘 = 106. The error correcting ability for both RS and
scrambled t-error correction codes are considered to be 𝑇 = 10. The channel bit error probability for AWGN
channel for both error correction codes is calculated as,
𝑃 = 1
2⁄ ∗ 𝑒𝑟𝑓𝑐 (√(𝐸𝑁𝐿𝑖𝑛 ∗ 𝑘
𝑛⁄ )) (16)
where
𝑘
𝑛
is the code rate and 𝐸𝑁𝐿𝑖𝑛 is the 𝑆𝑁𝑅. The 𝑆 𝐺 is illustrates Table 1 for the error correction codes.
Based on Table 1, RS correcting code technique is not added to another technique such as
scrambling. Moreover, RS correcting code technique gives the smallist 𝑆 𝐺 compared with the other t-error
correcting code techniques. Based on the 𝑆 𝐺 result, RS code is most secure error correcting without the
addition of other techniques. Figure 5 shows the BER for the RS code and the scrambled t-error.
Table 1. Security gap for different error correction codes
Error correcting code Securitygap(dB)
Scrambled error correction codes 4.8
Reed Solomon 4.5
Punctured LDPC 8
Unscrambled BCH 11
Figure 5. BER for the scrambled t-error RS codes
Int J Elec & Comp Eng ISSN: 2088-8708 
Physical layer security and energy efficiency over different… (Mohammed Ahmed Magzoub)
6679
Table 2 compares the required time to simulate the error correction codes by using MATLAB
version 7.14 (R2012a). Based on Table 2, we observe that the 𝑅𝑆 correcting code required less time
(5.782384s) to execute the simulation of PLS. However, to execute the LDPC correcting code, more than
100 seconds are required. The computational complexity due to RS correcting code is seen to be less
compared to scrambled error correcting, punctured LDPC, LDPC, and BCH codes.
Table 2. The run time for several error correction codes
Error correcting code Runtime(s)
BCH 24.512958𝑠
Reed Solomon 5.782384𝑠
Punctured LDPC 98.993429𝑠
Scrambled error correction codes 20𝑠
LDPC 102.439194𝑠
4.1. Comparison of energy efficiency between RS and BCH
Table 3 provides the required simulation parameters for compariong the efficiency of energy
between RS and BCH. Based on Figure 6, the estimated consuming energy of the BCH code is less than
the estimated consuming energy of the RS code. In the communication system the lower BER is estimated to
consume low energy. In other word, the better quality of the channel is the lower energy consumption.
At the probability for bit error of 0.04 the estimated consumption of energy is 0.05 for the BCH code.
On the other hand, at the same probability of bit error for the RS code the consumption of energy is almost
0.16 joules/bit. It is clear that the BCH consume less energy than the RS within the conditions of wiretap
channel.
Table 3. Simulation parameters for the energy efficiency comparison
Parameter Value
Thermal noise −173.8 dBm/Hz
Hardware dependent constant eTC 50
Hardware dependent constant eRC 50
Transmitter power efficiency 0.2
Receiver noise figure 10 dBm
Raw bit rate 115.2 k
Bandwidth 115.2 k
Antenna gain 10 dB
Path loss exponent 3
Wavelength 0.3 meter
Figure 6. Estimated consumption of energy for RS code
5. CONCLUSION
We have presented the performance of RS and BCH codes in terms of energy consumption security
aspects. We found that RS has almost the same 𝑆 𝐺 as scrambled error correction codes which require more
energy consumption than RS. On the other hand, BCH is poised to be a good candidate in WSNs for physical
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6673 - 6681
6680
wireless security benefits as it consumes less energy consumption than RS. The limitation of this study is
when both receivers have the same channel quality. For future studies, we will analyze the proposed work
under different network physical interfaces.
REFERENCES
[1] H. V. Poor and R. F. Schaefer, “Wireless physical layer security,” Proceedings of the National Academy of
Sciences, vol. 114, no. 1, pp. 19-26, 2017.
[2] M. A. Salem, A. B. Abd. Aziz, M. Y. Bin Alias and A. A. Abdul Rahman., "Secrecy performance on half-duplex two-
way multi-relay transmission technique under wireless physical layer security," International Symposium on Information
Theory and Its Applications, pp. 668-672, 2018.
[3] H. El-gamal, H. V. Poor, and S. S. Shitz, “Wireless Physical Layer Security,” EURASIP Journal on Wireless
Communications and Networking, vol. 2009, no. 1, 2015.
[4] M. A. Salem, A. B. Abd. Aziz, and M. Y. Bin Alias, “Cooperative Relay Transmission under Physical Layer
Security for Non-Orthogonal Networks Layer Security for Non-Orthogonal Networks,” 12th International
Conference on Computer Science and Information Technology, 2019.
[5] A. Yener and S. Ulukus, “Wireless Physical-Layer Security: Lessons Learned from Information Theory,” Proc.
IEEE, vol. 103, no. 10, pp. 1814-1825, 2015.
[6] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. H. Chen, “A Survey on Multiple-Antenna Techniques for
Physical Layer Security,” IEEE Commun. Surv. Tutorials, vol. 19, no. 2, pp. 1027-1053, 2017.
[7] C. E. Shannon, "A mathematical theory of communication," The Bell System Technical Journal, vol. 27, no. 3,
pp. 379-423, 1948.
[8] D. Klinc, J. Ha, S. W. McLaughlin, J. Barros and B. Kwak, "LDPC for Physical Layer Security," IEEE Global
Telecommunications Conference GLOBECOM, pp. 1-6, 2009.
[9] M. Baldi, M. Bianchi and F. Chiaraluce, "Coding With Scrambling, Concatenation, and HARQ for the AWGN
Wire-Tap Channel: A Security Gap Analysis," IEEE Transactions on Information Forensics and Security, vol. 7,
no. 3, pp. 883-894, 2012.
[10] M. Dener,” Security Analysis in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks,
vol. 2014, 2014.
[11] N. A. Alrajeh, U. Marwat, B. Shams, S. Saddam, and H. Shah., “Error Correcting Codes in Wireless Sensor Networks
: An Energy Perspective,” Applied Mathematics & Information Sciences Applied Mathematics & Information Sciences,
vol. 818, no. 2, pp. 809-818, 2015.
[12] M. A. M. Albashier, A. A. Aziz, Hadhrami Abd. Ghani, “Performance analysis of physical layer security over
different error correcting codes in wireless sensor networks,” 20th International Symposium onWireless Personal
Multimedia Communications (WPMC), 2017.
[13] J. Choi, J. Ha and H. Jeon, "Physical layer security for wireless sensor networks," IEEE 24th Annual International
Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1-6, 2013.
[14] H. Jeon, J. Choi, and S. W. Mclaughlin, Channel Aware Encryption and Decision Fusion for Wireless Sensor
Networks, vol. 8, no. 4, pp. 619625, 2013.
[15] Y. Ren, A. Boukerche and L. Mokdad, "Performance analysis of a selective encryption algorithm for wireless ad
hoc networks," IEEE Wireless Communications and Networking Conference, pp. 1038-1043, 2011.
[16] A. D. Wyner, "The wire-tap channel," in The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
[17] K. D. Rao, “Channel Coding Techniques for Wireless Communications,” Springer, 2015.
[18] W. K. Harrison and S. W. McLaughlin, "Physical-Layer Security: Combining Error Control Coding and
Cryptography," IEEE International Conference on Communications, pp. 1-5, 2009.
[19] J. Zhu, Y. Zou and B. Zheng, "Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor
Networks," IEEE Access, vol. 5, pp. 5313-5320, 2017.
[20] V. Potdar, A. Sharif and E. Chang, "Wireless Sensor Networks: A Survey," International Conference on Advanced
Information Networking and Applications Workshops, pp. 636-641, 2009.
[21] M. A. M. Albashier, A. A. Aziz, HA Ghani, “Performance Analysis of Physical Layer Security Over Different
T-error Correcting Codes,” TENCON 2017, 2018.
[22] M.A.M. Albashier, A.A. Aziz, HA. Ghani, AK Samigan., “Performance comparison of energy efficiency and physical
layer security for reed solomon and bose-chaudhuri-hocquenghem codes in wireless sensor networks,” Proc. of 7th Int.
Conf. on Computer and Communication Engineering, 2018.
[23] T. Bartee and D. Schneider, "An electronic decoder for Bose-Chaudhuri-Hocquenghem error-correcting codes,"
IRE Transactions on Information Theory, vol. 8, no. 5, pp. 17-24, 1962.
[24] H. Modares, R. Salleh and A. Moravejosharieh, "Overview of security issues in wireless sensor networks," Third
International Conference on Computational Intelligence, Modelling & Simulation, pp. 308-311, 2011.
[25] M. Bloch, M. Hayashi and A. Thangaraj, "Error-Control Coding for Physical-Layer Secrecy," Proceedings of
the IEEE, vol. 103, no. 10, pp. 1725-1746, 2015.
Int J Elec & Comp Eng ISSN: 2088-8708 
Physical layer security and energy efficiency over different… (Mohammed Ahmed Magzoub)
6681
BIOGRAPHIES OF AUTHORS
Mohammed Ahmed Magzoub received the B.S. degree in Telecommunication Engineering from
Multimedia Universiti (MMU), Malaysia, in 2016. He is currently pursuing the master’s degree in
Telecommunication Engineering at Multimedia University (MMU), Malaysia. His research interest
includes Wireless physical layer security, coding theory in communication systems, signal
processing and wireless sensor networks.
Azlan Bin Abd Aziz received the B.S. degree in electrical and computer engineering from Ohio
State University, Columbus, Ohio, USA in 1998 and the M.S. degree in communication
engineering from the University of Manchester, UK in 2004. In March 2012, he obtained a Ph.D.
degree in engineering and computer science at Nagoya Institute of Technology. His current
research includes physical layer security for wireless networks, vehicular communications, and
smart antenna applications.
Mohammed Ahmed Salem received the B.S. degree in Mechatronics Engineering from Universiti
Teknikal Malaysia Melaka (UTeM), Malaysia, in 2017. He is currently pursuing the master’s
degree in Telecommunication Engineering at Multimedia University (MMU), Malaysia.
His research interest includes Wireless physical layer security, cooperative relay networks and
non-orthogonal multi access network.
Hadhrami Abd Ghani received his bachelor’s degree in electronics engineering from Multimedia
University Malaysia (MMU) in 2002. In 2004, he completed his master’s degree in
Telecommunication Engineering at The University of Melbourne. He then pursued his Ph.D. at
Imperial College London in the same study area and completed his Ph.D. research in 2011.
Currently, he serves as one of the academic and research staff members at Multimedia university
(MMU).
Nor Azlina Ab Aziz received her Ph.D. degree from University of Malaya, Malaysia. She is
currently a senior lecturer with the Faculty of Engineering and Technology, Multimedia
University, Melaka, Malaysia. Her research interests include the fundamental aspects and
applications of computational intelligence in wireless communication, bioinformatics, operational
research and affective computing.
Azwan Mahmud received the B.Sc. degree (with first-class honors) in electrical and electronic
engineering from the University College of London, London, U.K., in 1998, MBA degree in
strategic management from the University of Technology Malaysia, in 2008, and PhD in wireless
communication system from University of Manchester, UK, in 2014. His current research interests
include the performance analysis for 5G cellular systems, heterogeneous systems, relay, small
cells, wireless power transfer, D2D, DAS and V2X systems.

More Related Content

PDF
User Selective Encryption Method for Securing MANETs
PDF
Energy and Load Aware Routing Protocol for Internet of Things
PDF
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
PDF
A survey on power- efficient Forward Error Correction scheme for Wireless Sen...
PDF
IEEE Information forensic and security Title and Abstract 2016
PDF
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
PDF
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
PDF
Intelligent black hole detection in mobile AdHoc networks
User Selective Encryption Method for Securing MANETs
Energy and Load Aware Routing Protocol for Internet of Things
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A survey on power- efficient Forward Error Correction scheme for Wireless Sen...
IEEE Information forensic and security Title and Abstract 2016
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Intelligent black hole detection in mobile AdHoc networks

What's hot (20)

PDF
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
PDF
Enhanced Authentication Mechanism in WLAN via MMBSPS
PDF
Security-aware fair transmission scheme for 802.11 based cognitive IoT
PPT
Krishna thesis presentation
PDF
581 517-525
PDF
Secured node detection technique based on artificial neural network for wirel...
PDF
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Paralleld...
PDF
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
PDF
D0371028039
PDF
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
PDF
Networking ieee-project-topics-ocularsystems.in
PDF
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
PDF
PDF
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
PDF
J031101064069
PDF
Preparation gade and idol model for preventing multiple spoofing attackers in...
PDF
Energy aware routing for real time
PDF
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
PDF
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
PDF
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
Enhanced Authentication Mechanism in WLAN via MMBSPS
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Krishna thesis presentation
581 517-525
Secured node detection technique based on artificial neural network for wirel...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Paralleld...
First Steps Toward Scientific Cyber-Security Experimentation in Wide-Area Cyb...
D0371028039
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Networking ieee-project-topics-ocularsystems.in
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
J031101064069
Preparation gade and idol model for preventing multiple spoofing attackers in...
Energy aware routing for real time
Java networking 2012 ieee projects @ Seabirds ( Chennai, Bangalore, Hyderabad...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
Ad

Similar to Physical layer security and energy efficiency over different error correcting codes in wireless sensor networks (20)

PDF
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
PDF
A secure and energy saving protocol for wireless sensor networks
PDF
Timing issues on power side-channel leakage of advanced encryption standard c...
PDF
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
PDF
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
PDF
3 Elsevier Venu Mar 2022.pdf
PDF
Data security tolerance and portable based energy-efficient framework in sens...
PDF
International Journal of Computer Science, Engineering and Applications (IJCSEA)
PDF
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
PDF
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
PDF
2.espk external agent authentication and session key establishment using publ...
PDF
PDF
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
PDF
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
PDF
Energy Proficient and Security Protocol for WSN: A Review
PDF
Data transmitted encryption for clustering protocol in heterogeneous wireless...
PDF
Empirical analysis of power side-channel leakage of high-level synthesis des...
PDF
A collaborative physical layer security scheme
PDF
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
PDF
M.E Computer Science Network Security Projects
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
A secure and energy saving protocol for wireless sensor networks
Timing issues on power side-channel leakage of advanced encryption standard c...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
3 Elsevier Venu Mar 2022.pdf
Data security tolerance and portable based energy-efficient framework in sens...
International Journal of Computer Science, Engineering and Applications (IJCSEA)
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
Design of Soft VITERBI Algorithm Decoder Enhanced with Non-Transmittable Code...
2.espk external agent authentication and session key establishment using publ...
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
Energy Proficient and Security Protocol for WSN: A Review
Data transmitted encryption for clustering protocol in heterogeneous wireless...
Empirical analysis of power side-channel leakage of high-level synthesis des...
A collaborative physical layer security scheme
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
M.E Computer Science Network Security Projects
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...

Recently uploaded (20)

PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
UNIT 4 Total Quality Management .pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Welding lecture in detail for understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Well-logging-methods_new................
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
DOCX
573137875-Attendance-Management-System-original
PPT
Mechanical Engineering MATERIALS Selection
PPTX
additive manufacturing of ss316l using mig welding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
CH1 Production IntroductoryConcepts.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
UNIT 4 Total Quality Management .pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Welding lecture in detail for understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Well-logging-methods_new................
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
573137875-Attendance-Management-System-original
Mechanical Engineering MATERIALS Selection
additive manufacturing of ss316l using mig welding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Internet of Things (IOT) - A guide to understanding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
UNIT-1 - COAL BASED THERMAL POWER PLANTS
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Lecture Notes Electrical Wiring System Components
Embodied AI: Ushering in the Next Era of Intelligent Systems
CH1 Production IntroductoryConcepts.pptx

Physical layer security and energy efficiency over different error correcting codes in wireless sensor networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 6, December 2020, pp. 6673~6681 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i6.pp6673-6681  6673 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Physical layer security and energy efficiency over different error correcting codes in wireless sensor networks Mohammed Ahmed Magzoub1 , Azlan Abd Aziz2 , Mohammed Ahmed Salem3 , Hadhrami Ab Ghani4 , Azlina Abdul Aziz5 , Azwan Mahmud6 1,2,3,4, 5 Faculty of Engineering and Technology (FET), Multimedia University, Malaysia 6 Faculty of Engineering (FOE), Multimedia University, Malaysia Article Info ABSTRACT Article history: Received Nov 26, 2018 Revised May 29, 2020 Accepted Jun 6, 2020 Despite the rapid growth in the market demanding for wireless sensor networks (WSNs), they are far from being secured or efficient. WSNs are vulnerable to malicious attacks and utilize too much power. At the same time, there is a significant increment of the security threats due to the growth of the several applications that employ wireless sensor networks. Therefore, introducing physical layer security is considered to be a promising solution to mitigate the threats. This paper evaluates popular coding techniques like Reed solomon (RS) techniques and scrambled error correcting codes specifically in terms of security gap. The difference between the signal to nose ratio (SNR) of the eavesdropper and the legitimate receiver nodes is defined as the security gap. We investigate the security gap, energy efficiency, and bit error rate between RS and scrambled t-error correcting codes for wireless sensor networks. Lastly, energy efficiency in RS and Bose-Chaudhuri-Hocquenghem (BCH) is also studied. The results of the simulation emphasize that RS technique achieves similar security gap as scrambled error correcting codes. However, the analysis concludes that the computational complexities of the 𝑅𝑆 is less compared to the scrambled error correcting codes. We also found that BCH code is more energy-efficient than RS. Keywords: Energy efficiency Error correcting codes Physical layer security Reed solomon Security gap (𝑆 𝐺) Signal to nose ratio Wireless sensor networks Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Azlan Abd Aziz, Faculty of Engineering and Technology, Multimedia University, Melaka, 75450, Malaysia. Email: azlan.abdaziz@mmu.edu.my 1. INTRODUCTION The open nature of the wireless communication technologies makes the wireless medium subject to many threats. Due to the increase in the number of attacks against the wireless communication system, a growing interest has developed in securing the information over wireless transmission system [1]. In the TCP/IP model, security algorithms are applied in the upper layers. However, physical layer security (PLS) does not contain any type of security even though it contains features that could provide security from information theory point of view [2]. In PLS, the transmitter and receiver are assumed to be aware of the techniques used for transmission. PLS is achieved when the parties of the communication system aware of the information about the used techniques for transmission yet there is a variation in the quality between wiretap channel and the main channel [3-7]. In addition, it is assumed that the wiretapped channel (eavesdropper channel) is a degraded version of the main channel, this helps the legitimate receiver using the main channel to get back the transmitted data but the eavesdropper node is not able to get back the transmitted data and this is how PLS is achieved. There are several metrics for security performance. In this paper, the selected security
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6673 - 6681 6674 performance metric is the security gap (𝑆 𝐺) because it is practical to be implemented, depends on the bit error rate (BER) and the signal to noise ratio (SNR), and it is simple. Security gap is defined as the difference between the SNR of the intended receiver and the SNR of the eavesdropper [8, 9]. Wireless sensor network (WSN) helps in analyzing and collecting the information. Security is the major challenge to deploy for the WSN. The main reason is the vulnerability of the WSN to several attacks such as wormhole attacks, Hello flood attacks, black hole attack, Sybil attack, attacks the data in transit, and denial of services [10]. Cryptography is an approach to avoid these attacks. However, the algorithms of cryptography are computationally expensive. Researchers proposed several strategies to calculate the quality of the transmitted data, such as bose-chaudhuri-hocquenghem (BCH), reed solomon (RS), and low-density parity check (LDPC). The challenging part is to identify the suitable strategy in terms of power efficiency for error correction [11, 12]. This open research question makes this topic to be the interest of many researchers. The threats that are facing the WSN leads to implement several works to prevent WSN from some of the attacks. Typically, the energy and computation abilities of WSN are not enough to manage the conventional security methods (sensor network method). To avoid the attacks with less computational energy and power, physical layer security for WSN is an excellent approach to be selected. In [13] demonstrate that the PLS techniques could be applied to WSN to ensure perfect secrecy. The authors of [14-16] claim that the ancryption techniques such as channel aware encryption, and stochastic encryption achive security and realibality. Yet, high computational energy and ability are required. To the best of the authors’ knowledge, the error correction codes benefits in WSN has not been adequately well investigated in terms of PLS. This paper studies the affects of various error correction codes on the security of WSN. In this paper, the 𝑆 𝐺 metric is used unlike the previous literature works where the maximum equivocation is used as the metric for security. In this paper, a brief explanation on the security and the energy efficiency of the WSNs is presented as well since many previous works only focus on the energy efficiency or the security aspects. Nontheless, there are a few investigations suggesting that the various channel codes affect the energy consumption differently for WSNs [17, 18]. The efficiencies of the code’s energy are evaluated with an analytical radio model. The authors of [4] shows that the energy efficiency is changing with the variation of the codes based on the quality of the channel. In otherwords, there are small differences between the codes in terms of energy efficiency in a good quality channel. Since the processing power consumption for the coding technique is high [19], selecting the less complex coding technique is essential mainly with the WSN applications due to the processing and memory constraints [20]. This paper analyzes the PLS by investigating several error corrections codes such as RS t-error correction codes. Moreover, the focus is to study the affect of the t-error correction codes on the PLS. The BCH codes acchives high 𝑆 𝐺 compared with LDPC codes. Thus, BCH is introduced with additional techniques such as scrambling [21]. Scrambling the data bits is employed as an additional strategy to improve the security by decreasing the gap between the eavesdropper node and legitimate receiver. By scrambling the data bits, the probability of bit error is maintained close to 0.5 with the increasing of SNR [22]. The organization of this paper is as follows. Section 2 presents the system model. Section 3 provides some introduction regarding the scrambled t-error correction codes, RS correcting codes, and BCH code. Section 4 discusses the results of the comparison between scrambled t-error correction codes and the (RS). Finally, section 5 concludes this paper. The main contributions of this paper are summarized as follow:  The analysis of error correction codes such as scrambled error correction codes, BCH, and RS are illustrated in terms of 𝑆 𝐺.  The comparison in terms of 𝑆 𝐺 is investigated between the scrambled error correction codes and the RS.  The comparison is done in terms of 𝑆 𝐺 between scrambled BCH and unscrambled BCH. 2. SYSTEM MODEL In this research, the additive white gaussian noise (AWGN) wire-tap channel is utilized as the main transmission channel between the sender (Alice), the legitimate receiver (Bob) and eavesdropper node (Eve). This system model implemented firstly by [22]. Figure 1 illustrates the typical Wyner wiretap channel. The sender (Alice) uses any suitable transmission technique to send the data message to the legitimate receiver (Bob). The data is received by both Bob and Eve, where both are aware of the transmission technique used by the sender. As a result, the received data message at both Bob and Eve is recovered. However, the recovered messages differences in the channels between Eve and Alice, and Bob and Alice make the difference in the recovered message.
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Physical layer security and energy efficiency over different… (Mohammed Ahmed Magzoub) 6675 Figure 1. Wire-tap channel’s ystem model 3. PERFORMANCE ANALYSIS FOR THE ERROR CORRECTION CODES This section introduces each t-error correction codes techniques. The scrambled codes and the RS code are compared in terms of PLS. 3.1. Reed solomon (RS) RS is a common error correcting code technique that is used with various bits. RS provides desirable results for correcting burst errors due to the correction of these errors done in the bits level. RS code is defined as (𝑛; 𝑘) code where 𝑘 denotes the message bits in the codeword and 𝑛 denotes the number of bits in the codeword. RS codes can correct (𝑛 − 𝑘)/2 errors [11]. The advantages of RS are increasing the SNR and the transmission secrecy rate. 3.1.1. Galois field (GF) Galois field (GF) is a special field that has a special property, the arithmetic operations addition, subtraction, multiplication, and division on field elements always have results. 3.1.2. Generator polynomial In RS, the valid codeword can be divided by the generator polynomial. The general polynomial is defined as: 𝑔(𝑥)(𝑥 − 𝛼𝑖)(𝑥 − 𝛼𝑖 + 1) … . . (𝑥 − 𝛼𝑖 + 2𝑡) (1) the codeword is defined as 𝑐(𝑥) = (𝑥 − 𝛼𝑖 + 1) … . . (𝑥 − 𝛼𝑖 + 2𝑡) (2) where g(x), i(x) and c(x) are the generator polynomial, information block, and valid codeword, respectively. 3.1.3. Encoder The 2t is calculated using: 𝑝(𝑥) = 𝑖(𝑥). (𝑥𝑛 − 𝑘)𝑚𝑜𝑑𝑔(𝑥) (3) In RS encoder each register holds a symbol that consist of 8 bits. 3.1.4. Decoder The received message consists of two parts, the transmitted codeword and the errors. 𝑟(𝑥) = 𝑐(𝑥) + 𝑒(𝑥) (4) RS can find up to t error position and correct them. The probability of bit error of RS using hard decision decoding is calculated as, 𝑃𝑃 = 1/𝑛 ∑ 𝑖 ( 𝑛 𝑖 ) 𝑃𝑖(1 − 𝑃) 𝑛−𝑖 {𝑡}𝑖 𝑖=𝑡 𝑒𝑐+1 (5)
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6673 - 6681 6676 Where 𝑃 denotes the probability of the channel bit error, 𝑛 denotes the bits number in the codeword, and 𝑡 𝑒𝑐 = (𝑛 − 𝑘)/2 is the capability of the RS code to correct errors. RS codes have various decoding strategies. However, the strategy of hard decision-decoding is selected. Figure 2 illustrates the BER of the RS codes with several code-length. Based on Figure 2, the RS codes are observed to be highly imperfect due to the increament of the probability of error with the decrease of the SNR and the codeword. This imperfection is considered as an advantage for security. 3.2. Bose-chaudhuri-hocquenghem (BCH) BCH is deemed as an error correction codes technique that is able for correcting and detecting several bits error [23-25]. BCH is an error correcting code technique that is suitable for WSNs due to its properties of enhancing the efficiency of the energy by 23% [20]. BCH was selected by [21] to be scrambled to reduce the 𝑆 𝐺 between the eavesdropper and the legitimate receiver. In this section, BCH has been evaluated without using the scrambling techniques and compared against Reed Solomon without scrambling. Figure 3 indicates the impact of the scrambling on BCH code. The BER improves significantly with scrambling as the SNR increases and outperforms that without scrambling. Figure 2. BER of RS codes using BPSK over an AWGN channel Figure 3. BER of BCH with and without scrambling 3.3. Scrambled t-error correction codes The implementation of Non-systematic codes is firstly introduced in [22]. The authers of [20] utilize the scrambling techniques to reduce the 𝑆 𝐺. Thus, proving that scrambling has a significant impact on the 𝑆 𝐺. The scrambling technique assumed that the transmitter is going to encode the message as follow, 𝐶 = 𝑈. 𝑆. 𝐺 (6) where the 𝐺 is a generator matrix with dimension 𝑘𝑥𝑛, and 𝑆 is scrambling matrix with dimension 𝑘𝑥𝑘. The generator matrix 𝐺 can be written in different ways due to its systematic character. Now 𝐺 can be written as 𝐺 = [𝐼|𝐶], 𝐼 is identity matrix with dimension 𝑘𝑥𝑘, and 𝐶 is 𝑘𝑥(𝑛 − 𝑘) parity check matrix. Now with all mentioned above. The codeword can be written as, 𝑐 = [𝑈. 𝑆| 𝑈. 𝑆. 𝐶] = [𝑚𝑙|𝑚 𝑟] (7) From the above equation, the 𝑚𝑙 is the first 𝑘𝑏𝑖𝑡𝑠 of the codeword while the 𝑚 𝑟 is last rbits of the codeword. To ensure the PLS, the BER of the intended receiver should be low as well as the SNR should be high enough to ensure all the errors could be corrected and for that 𝑈 𝐵 = 𝑢 = 𝑚𝑙. 𝑆1 The bit error probability while theBER for the eavesdropper should be high, as well as the SNR, should be low so that the eavesdropper is not going to be able to decode the message and for that, the output of the descrambler for the eavesdropper can be written as, 𝑈 𝐸 = 𝑢 + 𝑒𝑙. 𝑆−1 (8) where 𝑒𝑙 is the left part of the error vector [𝑒𝑙|𝑒 𝑟] for the perfect scrambling is calculated.
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Physical layer security and energy efficiency over different… (Mohammed Ahmed Magzoub) 6677 𝑃𝑒 𝑃𝑆 = 1/2 ∑ ( 𝑘 𝑗 ) ∑ ( 𝑛 − 𝑘 𝑖 − 𝑗 ) 𝑛 𝑖=𝑡+1 𝑘 𝑗=1 𝑃𝑜 𝑖(1 − 𝑃𝑜) 𝑛−𝑖 (9) In (9) computes the probability of the bit error for perfect scrambling where 𝑘 denotes the total message bits in the codeword. The authors of [14] demonstrates the results of (9) using BCH codes. Figure 4 depicts the various level of scrambling as 𝑊 represents the column weight of the scrambling matrix. The lowest 𝑆 𝐺 is retrieved with the perfect scrambling diagram. Figure 4. BER of different level of scrambling using BPSK over AWGN channel 3.4. Physical layer security for the error correction codes The idea behind the coding techniques is to make the mutual information between the message and the encoded message is zero. The information leaked for the data may reach zero if the uncertainty of the randomization is small [15, 17]. In this paper, the 𝑆 𝐺 is performance metric used. The security for the transmitted data exists by maintaining the BER of the receiver close to aero and the eavesdropper to 0.5 and above. This condition ensures that the eavesdropper not able to decode the received message back. Let the BER average at the legitimate receiver and the eavesdropper be 𝑃𝐵 𝑒 and 𝑃𝐸 𝑒 respectively. Then, it is required that 𝑃𝐸 𝑒 be high to ensure security and that 𝑃𝐵 𝑒 be adequately low for ensuring the reliability. If the errors are identically independent distributed (IID) and 𝑃𝐸 𝑒 is close to 0.5, then eavesdropper is incapable of extracting data from the received sequence 𝑍 𝑛 . For fixed 𝑃𝐵 𝑒,𝑚𝑎𝑥, (≈ 0.5) and 𝑃𝐸 𝑒,𝑚𝑖𝑛, (≈ 0.5) it must hold that 𝑎) 𝑃𝐵 𝑒 ≤ 𝑃𝐵 𝑒,𝑚𝑎𝑥(𝑟𝑒𝑙𝑖𝑎𝑏𝑖𝑙𝑖𝑡𝑦). 𝑏) 𝑃𝐸 𝑒 ≤ 𝑃𝐸 𝑒,𝑚𝑖𝑛(𝑠𝑒𝑐𝑢𝑟𝑖𝑡𝑦). Let 𝑆𝑁𝑅 𝐵 𝑚𝑖𝑛 be the lowest 𝑆𝑁𝑅 for which a) holds and let 𝑆𝑁𝑅 𝐵 𝑚𝑎𝑥 be the highest 𝑆𝑁𝑅 for which b) holds. It is assumed that the receiver operates at 𝑆𝑁𝑅 𝐵 𝑚𝑖𝑛 and that eavesdropper 𝑆𝑁𝑅 is strictly lower than 𝑆𝑁𝑅 𝐵 𝑚𝑖𝑛 . The 𝑆 𝐺 performance metric is defined as 𝑆𝑁𝑅 𝐵 𝑚𝑖𝑛 𝑆𝑁𝑅 𝐸 𝑚𝑎𝑥 in dB. The authors of [22] introduced a scheme in terms of the 𝑆 𝐺 which is the ratio between the SNR for the legitimate receiver and the SNR for the eavesdropper 𝑆𝑁𝑅 𝐵 𝑆𝑁𝑅 𝐸 . 3.5. Energy efficiency analysis Based on [4], the largest energy consumption in a communication system is the tasks of reception and transmission. In (10) calculates the consumption of energy for sending data bits 𝑚 throughout a wireless channel to the legitimate receiver at distance 𝑑. 𝐸𝐿(𝑚, 𝑑) = 𝐸 𝑇(𝑚, 𝑑) − 𝐸 𝑅(𝑚) (10) Where 𝐸 𝑇 is the consumed energy in the transmitter and 𝐸 𝑅 is the consumed energy at the receiver. At the transmitter the energy consumed is calculated as,
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6673 - 6681 6678 𝐸𝐿(𝑚, 𝑑) = 𝐸 𝑇𝐶(𝑚, 𝑑) + 𝐸 𝑇𝐴(𝑚, 𝑑) (11) where 𝐸 𝑇𝐴 is the energy spent at the transmitter amplifier and 𝐸 𝑇𝐶 is the spent energy by the transmitter circuit. The relationship between the energy spent per bit at the receiver and the energy spent per bit at the transmitter is assumed to be linear and can be found by the equation: 𝐸 𝑇(𝑚, 𝑑) = 𝑚(𝑒 𝑇𝐶 + 𝑚𝑒 𝑇𝐴 𝑑 𝛼 ) (12) 𝐸 𝑅(𝑘) = 𝑚𝑒 𝑅𝐶 (13) where 𝑒 𝑇𝐶 and 𝑒 𝑅𝐶 are the components of the hardware. Finally, the relationship between energy consumption and the probability of bit error is illustrated as, 𝐸 𝑇(𝐴) = 𝜎 ( 𝑆 𝑁 ) 𝑟 (14) 𝜎 = (𝑁𝐹𝑅𝑋)(𝑁𝑜)(𝐵𝑊)(𝑟𝜋𝜆) 𝛼 /(𝐺 𝑎𝑛𝑡)(𝑛 𝑎𝑚𝑝)(𝑅 𝑏𝑖𝑡) (15) 4. SIMULATION RESULTS AND DISCUSSION This section presents and analyses the comparison between the RS and t-error correction codes in terms of 𝑆 𝐺 metric. The codeword length for both techniques is considered as 𝑛 = 127. RS and scrambled t-error correction codes are applied on the AWGN channel. Moreover, the data bits length for RS and scrambled t-error correction codes are considered to be 𝑘 = 106. The error correcting ability for both RS and scrambled t-error correction codes are considered to be 𝑇 = 10. The channel bit error probability for AWGN channel for both error correction codes is calculated as, 𝑃 = 1 2⁄ ∗ 𝑒𝑟𝑓𝑐 (√(𝐸𝑁𝐿𝑖𝑛 ∗ 𝑘 𝑛⁄ )) (16) where 𝑘 𝑛 is the code rate and 𝐸𝑁𝐿𝑖𝑛 is the 𝑆𝑁𝑅. The 𝑆 𝐺 is illustrates Table 1 for the error correction codes. Based on Table 1, RS correcting code technique is not added to another technique such as scrambling. Moreover, RS correcting code technique gives the smallist 𝑆 𝐺 compared with the other t-error correcting code techniques. Based on the 𝑆 𝐺 result, RS code is most secure error correcting without the addition of other techniques. Figure 5 shows the BER for the RS code and the scrambled t-error. Table 1. Security gap for different error correction codes Error correcting code Securitygap(dB) Scrambled error correction codes 4.8 Reed Solomon 4.5 Punctured LDPC 8 Unscrambled BCH 11 Figure 5. BER for the scrambled t-error RS codes
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Physical layer security and energy efficiency over different… (Mohammed Ahmed Magzoub) 6679 Table 2 compares the required time to simulate the error correction codes by using MATLAB version 7.14 (R2012a). Based on Table 2, we observe that the 𝑅𝑆 correcting code required less time (5.782384s) to execute the simulation of PLS. However, to execute the LDPC correcting code, more than 100 seconds are required. The computational complexity due to RS correcting code is seen to be less compared to scrambled error correcting, punctured LDPC, LDPC, and BCH codes. Table 2. The run time for several error correction codes Error correcting code Runtime(s) BCH 24.512958𝑠 Reed Solomon 5.782384𝑠 Punctured LDPC 98.993429𝑠 Scrambled error correction codes 20𝑠 LDPC 102.439194𝑠 4.1. Comparison of energy efficiency between RS and BCH Table 3 provides the required simulation parameters for compariong the efficiency of energy between RS and BCH. Based on Figure 6, the estimated consuming energy of the BCH code is less than the estimated consuming energy of the RS code. In the communication system the lower BER is estimated to consume low energy. In other word, the better quality of the channel is the lower energy consumption. At the probability for bit error of 0.04 the estimated consumption of energy is 0.05 for the BCH code. On the other hand, at the same probability of bit error for the RS code the consumption of energy is almost 0.16 joules/bit. It is clear that the BCH consume less energy than the RS within the conditions of wiretap channel. Table 3. Simulation parameters for the energy efficiency comparison Parameter Value Thermal noise −173.8 dBm/Hz Hardware dependent constant eTC 50 Hardware dependent constant eRC 50 Transmitter power efficiency 0.2 Receiver noise figure 10 dBm Raw bit rate 115.2 k Bandwidth 115.2 k Antenna gain 10 dB Path loss exponent 3 Wavelength 0.3 meter Figure 6. Estimated consumption of energy for RS code 5. CONCLUSION We have presented the performance of RS and BCH codes in terms of energy consumption security aspects. We found that RS has almost the same 𝑆 𝐺 as scrambled error correction codes which require more energy consumption than RS. On the other hand, BCH is poised to be a good candidate in WSNs for physical
  • 8.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6673 - 6681 6680 wireless security benefits as it consumes less energy consumption than RS. The limitation of this study is when both receivers have the same channel quality. For future studies, we will analyze the proposed work under different network physical interfaces. REFERENCES [1] H. V. Poor and R. F. Schaefer, “Wireless physical layer security,” Proceedings of the National Academy of Sciences, vol. 114, no. 1, pp. 19-26, 2017. [2] M. A. Salem, A. B. Abd. Aziz, M. Y. Bin Alias and A. A. Abdul Rahman., "Secrecy performance on half-duplex two- way multi-relay transmission technique under wireless physical layer security," International Symposium on Information Theory and Its Applications, pp. 668-672, 2018. [3] H. El-gamal, H. V. Poor, and S. S. Shitz, “Wireless Physical Layer Security,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, no. 1, 2015. [4] M. A. Salem, A. B. Abd. Aziz, and M. Y. Bin Alias, “Cooperative Relay Transmission under Physical Layer Security for Non-Orthogonal Networks Layer Security for Non-Orthogonal Networks,” 12th International Conference on Computer Science and Information Technology, 2019. [5] A. Yener and S. Ulukus, “Wireless Physical-Layer Security: Lessons Learned from Information Theory,” Proc. IEEE, vol. 103, no. 10, pp. 1814-1825, 2015. [6] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H. H. Chen, “A Survey on Multiple-Antenna Techniques for Physical Layer Security,” IEEE Commun. Surv. Tutorials, vol. 19, no. 2, pp. 1027-1053, 2017. [7] C. E. Shannon, "A mathematical theory of communication," The Bell System Technical Journal, vol. 27, no. 3, pp. 379-423, 1948. [8] D. Klinc, J. Ha, S. W. McLaughlin, J. Barros and B. Kwak, "LDPC for Physical Layer Security," IEEE Global Telecommunications Conference GLOBECOM, pp. 1-6, 2009. [9] M. Baldi, M. Bianchi and F. Chiaraluce, "Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis," IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 883-894, 2012. [10] M. Dener,” Security Analysis in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2014, 2014. [11] N. A. Alrajeh, U. Marwat, B. Shams, S. Saddam, and H. Shah., “Error Correcting Codes in Wireless Sensor Networks : An Energy Perspective,” Applied Mathematics & Information Sciences Applied Mathematics & Information Sciences, vol. 818, no. 2, pp. 809-818, 2015. [12] M. A. M. Albashier, A. A. Aziz, Hadhrami Abd. Ghani, “Performance analysis of physical layer security over different error correcting codes in wireless sensor networks,” 20th International Symposium onWireless Personal Multimedia Communications (WPMC), 2017. [13] J. Choi, J. Ha and H. Jeon, "Physical layer security for wireless sensor networks," IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1-6, 2013. [14] H. Jeon, J. Choi, and S. W. Mclaughlin, Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks, vol. 8, no. 4, pp. 619625, 2013. [15] Y. Ren, A. Boukerche and L. Mokdad, "Performance analysis of a selective encryption algorithm for wireless ad hoc networks," IEEE Wireless Communications and Networking Conference, pp. 1038-1043, 2011. [16] A. D. Wyner, "The wire-tap channel," in The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975. [17] K. D. Rao, “Channel Coding Techniques for Wireless Communications,” Springer, 2015. [18] W. K. Harrison and S. W. McLaughlin, "Physical-Layer Security: Combining Error Control Coding and Cryptography," IEEE International Conference on Communications, pp. 1-5, 2009. [19] J. Zhu, Y. Zou and B. Zheng, "Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks," IEEE Access, vol. 5, pp. 5313-5320, 2017. [20] V. Potdar, A. Sharif and E. Chang, "Wireless Sensor Networks: A Survey," International Conference on Advanced Information Networking and Applications Workshops, pp. 636-641, 2009. [21] M. A. M. Albashier, A. A. Aziz, HA Ghani, “Performance Analysis of Physical Layer Security Over Different T-error Correcting Codes,” TENCON 2017, 2018. [22] M.A.M. Albashier, A.A. Aziz, HA. Ghani, AK Samigan., “Performance comparison of energy efficiency and physical layer security for reed solomon and bose-chaudhuri-hocquenghem codes in wireless sensor networks,” Proc. of 7th Int. Conf. on Computer and Communication Engineering, 2018. [23] T. Bartee and D. Schneider, "An electronic decoder for Bose-Chaudhuri-Hocquenghem error-correcting codes," IRE Transactions on Information Theory, vol. 8, no. 5, pp. 17-24, 1962. [24] H. Modares, R. Salleh and A. Moravejosharieh, "Overview of security issues in wireless sensor networks," Third International Conference on Computational Intelligence, Modelling & Simulation, pp. 308-311, 2011. [25] M. Bloch, M. Hayashi and A. Thangaraj, "Error-Control Coding for Physical-Layer Secrecy," Proceedings of the IEEE, vol. 103, no. 10, pp. 1725-1746, 2015.
  • 9. Int J Elec & Comp Eng ISSN: 2088-8708  Physical layer security and energy efficiency over different… (Mohammed Ahmed Magzoub) 6681 BIOGRAPHIES OF AUTHORS Mohammed Ahmed Magzoub received the B.S. degree in Telecommunication Engineering from Multimedia Universiti (MMU), Malaysia, in 2016. He is currently pursuing the master’s degree in Telecommunication Engineering at Multimedia University (MMU), Malaysia. His research interest includes Wireless physical layer security, coding theory in communication systems, signal processing and wireless sensor networks. Azlan Bin Abd Aziz received the B.S. degree in electrical and computer engineering from Ohio State University, Columbus, Ohio, USA in 1998 and the M.S. degree in communication engineering from the University of Manchester, UK in 2004. In March 2012, he obtained a Ph.D. degree in engineering and computer science at Nagoya Institute of Technology. His current research includes physical layer security for wireless networks, vehicular communications, and smart antenna applications. Mohammed Ahmed Salem received the B.S. degree in Mechatronics Engineering from Universiti Teknikal Malaysia Melaka (UTeM), Malaysia, in 2017. He is currently pursuing the master’s degree in Telecommunication Engineering at Multimedia University (MMU), Malaysia. His research interest includes Wireless physical layer security, cooperative relay networks and non-orthogonal multi access network. Hadhrami Abd Ghani received his bachelor’s degree in electronics engineering from Multimedia University Malaysia (MMU) in 2002. In 2004, he completed his master’s degree in Telecommunication Engineering at The University of Melbourne. He then pursued his Ph.D. at Imperial College London in the same study area and completed his Ph.D. research in 2011. Currently, he serves as one of the academic and research staff members at Multimedia university (MMU). Nor Azlina Ab Aziz received her Ph.D. degree from University of Malaya, Malaysia. She is currently a senior lecturer with the Faculty of Engineering and Technology, Multimedia University, Melaka, Malaysia. Her research interests include the fundamental aspects and applications of computational intelligence in wireless communication, bioinformatics, operational research and affective computing. Azwan Mahmud received the B.Sc. degree (with first-class honors) in electrical and electronic engineering from the University College of London, London, U.K., in 1998, MBA degree in strategic management from the University of Technology Malaysia, in 2008, and PhD in wireless communication system from University of Manchester, UK, in 2014. His current research interests include the performance analysis for 5G cellular systems, heterogeneous systems, relay, small cells, wireless power transfer, D2D, DAS and V2X systems.