12
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights

Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

This article appeared in a journal published by Elsevier. The attachedcopy is furnished to the author for internal non-commercial researchand education use, including for instruction at the authors institution

and sharing with colleagues.

Other uses, including reproduction and distribution, or selling orlicensing copies, or posting to personal, institutional or third party

websites are prohibited.

In most cases authors are permitted to post their version of thearticle (e.g. in Word or Tex form) to their personal website orinstitutional repository. Authors requiring further information

regarding Elsevier’s archiving and manuscript policies areencouraged to visit:

http://www.elsevier.com/authorsrights

Page 2: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

Information theory and cryptography based securedcommunication scheme for cooperative MIMO communicationin wireless sensor networks

Liang Hong a,⇑, Wei Chen b

a Department of Electrical and Computer Engineering, Tennessee State University, Nashville, TN 37209, USAb Department of Computer Science, Tennessee State University, Nashville, TN 37209, USA

a r t i c l e i n f o

Article history:Received 16 November 2012Received in revised form 5 September 2013Accepted 12 November 2013Available online 22 November 2013

Keywords:Sensor networksPhysical layer securityCompromised nodes detectionCryptographyInformation theory

a b s t r a c t

Emerging cooperative MIMO communication is a promising technology in improving com-munication performance for wireless sensor networks. However, the security problemsinherent to cooperative communications also arise. In this paper, we propose a cross-layersecured communication scheme for cooperative MIMO communication in wireless sensornetworks to overcome the external and active compromised nodes attacks. The schemecombines cryptographic technique implemented in higher layers with data assurance anal-ysis at the physical layer to provide better communication security. An efficient key man-agement system is proposed for the cryptographic processes. It provides securedcommunication and routing using a small number of keys shared between the clusterswhich cooperate on data transmission and reception. Although cryptography can ensurethe confidentiality in the communications between authorized participants, it usually can-not prevent the attacks from compromised nodes. The situation where the cooperativenodes are compromised and try to corrupt the communications by sending garbled signalsis also investigated in this paper. A novel information theory based detector that can iden-tify the active compromised nodes and recover the symbols in transmission process atphysical layer is proposed. When the compromised nodes are detected, the key manage-ment system calls the key revocation to isolate these nodes and reconfigure the coopera-tive MIMO network. Simulation results show that the proposed algorithm forcompromised nodes detection is effective and efficient, and the accuracy of received infor-mation is significantly improved.

� 2013 Elsevier B.V. All rights reserved.

1. Introduction

Due to recent advances in electronics, wireless commu-nications and computing technologies, wireless sensor net-works (WSNs) have been widely deployed in manyapplications, including military sensing and tracking, envi-ronment monitoring, smart home appliances management,

and health-care [1]. WSNs are expected to be the basicbuilding block of pervasive computing environments.

In WSNs, the sensor nodes are remotely deployed inharsh environments, where reliable communications linksare usually not available and each sensor node must de-pend on its energy-limited battery for its operation. Byexploiting spatial diversity with multiple antennas at thetransmitter and receiver, the Multiple-Input Multiple-Out-put (MIMO) technique, which can provide significant in-creases in data rate and link range without additionalbandwidth or transmission power, has attracted muchattention in literature [2]. However, the physical

1570-8705/$ - see front matter � 2013 Elsevier B.V. All rights reserved.http://dx.doi.org/10.1016/j.adhoc.2013.11.008

⇑ Corresponding author. Tel.: +1 6159635364.E-mail addresses: [email protected] (L. Hong), [email protected]

(W. Chen).

Ad Hoc Networks 14 (2014) 95–105

Contents lists available at ScienceDirect

Ad Hoc Networks

journal homepage: www.elsevier .com/locate /adhoc

Page 3: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

implementation of multiple antennas at a sensor node maynot be feasible. With limited physical size, a sensor nodetypically can only support a single antenna [3–5].

Recently, cooperative MIMO has been an emergingtechnique to achieve the benefits of the MIMO techniquewithout the need of multiple antennas at each sensor node[6]. In cooperative MIMO WSNs, multiple single-antennasensor nodes are physically grouped together to coopera-tively transmit and/or receive. Due to the smaller distance,the sensor nodes within the same group can communicatewith relatively lower power as compared to inter-groupcommunication. Taking into account that the total energyconsumption includes transmission energy, circuit energy,and signal processing energy consumption, it has beenproved that by using diversity gain earned from MIMOtechnology, the cooperative MIMO based sensor networksmay lead to better total energy optimization and smallerend-to-end delay than single input single output system[7,8].

Many WSNs have mission-critical tasks; however, theinvolvement of multiple nodes for transmission and/orreceiving poses a challenge to the reliability of the infor-mation. Unfortunately, most schemes for traditional coop-erative MIMO WSNs do not include considerations forpotential security problems in communications at the de-sign stage and are known publicly [9]. Therefore, attackerscan easily launch attacks by exploiting security holes inthose schemes. In general, the attacks in WSNs can be clas-sified as external attacks and internal attacks. Cryptogra-phy can prevent some of the external attacks where theattacking nodes are not authorized participants of the sen-sor networks. However, in an adversarial environment, thenodes for cooperative MIMO communications could becompromised, leading to internal attacks. Node compro-mise is one of the most detrimental attacks to WSNs. Ingeneral, cryptography based approaches cannot preventthe attacks from compromised nodes because they can en-crypt and decrypt the information. Therefore, compro-mised nodes can eliminate all the efforts to preventattacks [10]. According to the operation mode, the attacksof compromised nodes can be uncooperative or active [9].The uncooperative compromised nodes do not relay theinformation at all. The active compromised nodes willmaliciously modify the relay information and inject falsi-fied information. If there are active compromised nodesand the receiver treats them as trusted nodes, it will easilylead to symbol detection errors. Therefore, the impact ofactive attacks is more threatening than uncooperative at-tacks from the compromised nodes. Active attacks fromjust a few compromised nodes around the event wouldmake the entire network fail due to the garbled informa-tion collected from these compromised nodes. Ref. [11]elaborates the impact of the attacks from active compro-mised nodes and shows how easily the garbling can leadto a failed data transmission through an example. The sim-ulations in Section 6 will also illustrate this impact andshow that the conventional system without compromisednodes detection will fail due to the high bit error rate.

A variety of techniques has been proposed to secureWSNs’ communication. In [12,13], the threats andvulnerabilities to WSNs, security requirements and

secured communication solutions are summarized. Cryp-tography based approaches, either using public key cryp-tography or using symmetric key cryptography, arewidely used for communication security in WSNs[9,14,15]. For the WSNs of small size sensor nodes, sym-metric key cryptography is more time and energy efficient.On the other hand, physical-layer secured communicationtechniques are more promising, since they can be moreeffective in resolving the boundary, efficiency, and linkreliability issues [16]. Li and Hwu [16] and Kim and Villas-enor [17] exploited signal randomization which, whencombined with channel diversity, effectively randomizesthe eavesdropper’s signals but not the authorized recei-ver’s signals. In [18] the security of communications is en-hanced by adding artificial noise to the transmissionprocess in the physical layer with extra MIMO antennas.Their scheme assumes a key management system in ahigher layer and the artificial noise is generated by thekeys shared with neighboring nodes. However, none ofthese schemes detects and defends against node compro-mise. Moreover, all these schemes need extra MIMO anten-nas to achieve data assurance, which largely reduces theadvantage of MIMO technique. On the other hand, Maoand Wu proposed a cross-layer scheme that uses pseudo-random tracing symbols at the physical layer and direct se-quence spread spectrum symbols at the application layerfor tracing and identifying the compromised nodes [11].However, the insertion of tracing symbols will increasethe overhead of the transmission and reduce the data rate.The complexity of the system and the power consumptionwill also be increased for tracing symbol transmission andextraction.

In this paper, we proposed a cross-layer secured com-munication scheme for cooperative MIMO communicationin wireless sensor networks to overcome the external andactive compromised nodes attacks. The scheme combines acryptographic technique implemented in higher layers anddata assurance analysis at the physical layer to providebetter communication security. An efficient key manage-ment system is proposed for the cryptographic processesensuring data confidentiality, message authentication,etc. It provides secured communication and routing usinga small number of keys shared between the clusters whichcooperate on data transmission and reception. The situa-tion where some of the cooperative nodes are compro-mised and try to corrupt the communications by sendinggarbled signals is also investigated. A novel informationtheory based detection approach is proposed to identifythe compromised nodes and recover the symbols in trans-mission process at physic layer. It can identify all the com-promised nodes in the latest configured cooperativetransmission groups, if the compromised nodes are lessthan half in the cooperative cluster and the number ofthe nodes in this cluster is not larger than that of its allneighboring clusters. If the number of the nodes in thecluster under detection is larger than that of its all neigh-boring clusters, the proposed detection approach could de-tect all the compromised nodes if the number of thecompromised nodes is less than one third of the numberof the nodes in the largest neighboring cluster. After thecompromised nodes are detected, the key management

96 L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105

Page 4: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

system can call the key revocation to isolate these nodesand reconfigure the cooperative MIMO network.

Comparing with existing schemes [7,9–18], our pro-posed scheme detects and defends against compromisednodes without the need for extra MIMO antennas or thetracing symbols. Moreover, the proposed scheme requiresmuch smaller number of pre-loaded keys for key establish-ment and prevents the compromised nodes to pretend tobe trustworthy nodes. Furthermore, by adjusting the secu-rity level, the proposed scheme can achieve different trade-offs between energy and communication efficiency and thecredibility of the received data.

The rest of this paper is organized as follows. Section 2provides the system model and the proposed framework ofthe cross-layer secured communication scheme. Section 3elaborates the cluster formation and the cooperative relayscheme. Section 4 presents the security key managementscheme. Section 5 first presents in detail the algorithmsfor compromised nodes detection and then shows thesymbol recovery method in the physical layer that elimi-nates the garbled symbol, and finally gives the key revoca-tion and network recovery scheme. Section 6 shows theperformance of the proposed secured communicationscheme for cooperative MIMO networks through computersimulations. Finally, a conclusion is drawn in Section 7.

2. System model and the proposed cross-layer securedcommunication scheme

2.1. System model

In this paper, a multi-hop cooperative wireless sensornetwork that relays multiple source data back to the sinkis considered. As shown in Fig. 1, the WSN consists of aset of sensor nodes that are equipped with a single-anten-na radio. These single-antenna nodes are called primarynodes. Information collected by multiple local sensorsneeds to be aggregated and relayed to a remote sink. Thesensor nodes between the source nodes and the sink willform into clusters and serve as relay nodes to improvethe communication quality using the benefit of the MIMOtechnique. These clusters are also called virtual MIMOnodes in the rest of the paper, such as nodes 1;2 inFig. 1. The transmission link between two virtual MIMOnodes is called virtual MIMO link.

Among the cooperative strategies, the amplify-and-for-ward and decode-and-forward are most widely used. Inthe amplify-and-forward strategy, the relay nodes simplyboost the energy of the signal received from the senderand retransmit to the receiver. In the decode-and-forwardstrategy, the relay nodes will perform physical layerdecoding (signal detection and demodulation) and thenforward the decoded results. Although the amplify-and-forward relay has lower relay power consumption, it alsoamplifies the noise in the received signal and is not suit-able for long-haul transmission. Moreover, decoding maybe necessary when data aggregation and/or fusion is re-quired at some local points such as cluster heads. Further-more, considering that the decode-and-forward relay canbe extended to combine with coding techniques and is eas-ier to incorporate into network protocols [19], it will beconsidered in this paper.

Consider that the transmitting and receiving clustershave mT and mR nodes, respectively. The received signalat the virtual receiving MIMO node can be represented as[20]

y ¼ Hsþw ð1Þ

where y ¼ ½y1; y2; . . . ; ymR�T is a mR � 1 vector representing

the received signals at the receiving cluster,s ¼ ½s1; s2; . . . ; smT �

T is a mT � 1 vector representing the trans-mitted signal at the transmitting cluster, H is the a mR �mT

matrix of channel coefficients, w ¼ ½w1;w2; . . . ;wmR �T is a

mR � 1 vector representing the additive Gaussian noisecomponents, they are identically distributed and mutuallystatistically independent, each having zero mean and two-sided power spectral density 2N0.

Since this paper focuses on how to secure the commu-nications in a cooperative MIMO network, we assume thatthe channel matrix H is known at the receiving cluster, butnot at the transmitting cluster. This is feasible and can beachieved by using proper channel estimation method thatis performed frequently enough to track the channel vari-ations [21]. Usually the channel estimation is based onthe known sequence of bits, which is unique for a certaintransmitter and which is repeated in every transmissionburst. Thus, the channel matrix H can be estimated foreach burst separately by exploiting the known transmittedbits and the corresponding received samples.

2.2. Proposed cross-layer secured communication scheme

We propose a cross-layer secured communicationscheme for cooperative MIMO wireless sensor networks,as shown in Fig. 2. Based on the security level set by thesink, each of the primary nodes in the receiving/detectionprocess will determine whether it needs to perform com-promised nodes detection during the sink defined timeperiod. If detection is not needed, normal cooperative datatransmission or relay will be conducted during this timeperiod. Otherwise, compromised nodes detection will beperformed. If the detection results indicate that there isno compromised node, normal cooperative data transmis-sion or relay will be conducted for the rest of the time per-iod. Otherwise, symbol recovery will be conducted to

1

2 3

4

Sink NodeInformation Flow

Virtual MIMO Link

Single AntennaPrimary Nodes

Virtual MIMO Node 3Formed by MultiplePrimary Nodes

Fig. 1. System model.

L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105 97

Page 5: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

eliminate the garbled symbol. The detection report willthen be sent to the sink and normal cooperative data trans-mission or relay will be conducted for the rest of the timeperiod. On the other hand, if the sink receives the report ofcompromised nodes, the key management system will in-voke the key revocation to maintain the accuracy of thenext detection and stop compromised nodes getting infor-mation from the network and reconfigure the cooperativeMIMO network.

To operate the proposed cross-layer secured communi-cation scheme, there are three major tasks: (1) how to formthe cooperative MIMO network with distributed primarynodes; (2) how to establish secret key and build securedcommunication and routing, and (3) when and how to de-tect the compromised nodes. The accomplishments ofthese three tasks are presented in the next three sections.

3. Cooperative network architecture and transmissionscheme

This section discusses the cluster-based cooperativenetwork architecture and the cooperative transmissionscheme. It provides the fundamentals for the secured com-munication scheme described in Sections 4 and 5.

3.1. Cooperative MIMO networking architecture andformation

Let G be a network of single-antenna wireless nodes andV be the set of nodes in G. A d-clustering of V is a node-disjoint division of V, where the distance of two nodes ina d-cluster is not larger than d. Let A and B be two d-clus-ters with mT (mT P 1) and mR (mR P 1) nodes, respec-tively. If the distance of any node of A and any node of Bdoes not exceed DðD� dÞ, a D-mT �mR cooperative MIMOtransmission link can be defined between A and B, where

node i in A uses its antenna as the ith antenna cooperatingthe transmission and node j in B uses its antenna as the jthantenna cooperating the reception. In order to avoid confu-sion, in this paper, a single-antenna wireless node in G iscalled as primary node, a d-cluster is called as virtual MIMOnode, and a D-mT �mR cooperative MIMO transmissionlink is called as virtual MIMO link. Given d and D, a cooper-ative MIMO (CMIMO) radio network of G can be repre-sented as an undirected graph GCMIMO ¼ ðVCMIMO; ECMIMOÞ,where VCMIMO is the set of the d-clusters, and ECMIMO is theset of edges. An edge ðA; BÞ 2 ECMIMO if and only ifA;B 2 VCMIMO and there is a D-mT �mR cooperative MIMOlink between A and B. A cooperative MIMO network canbe formed from the given G; d, and D as follows [8]:

1. the primary nodes in G self-form a cooperativeMIMO radio network GCMIMO by using a distributedclustering algorithm on G,

2. the virtual MIMO nodes (d-clusters) form a multi-hop backbone tree by using a distributed Span-ning-Tree formation algorithm on GCMIMO, and

3. the routing for data dissemination, data gatheringand unicast is constructed by the paths of the back-bone tree.

After the CMIMO network formation, the structures ofthe clusters and backbone tree are maintained. Each clus-ter A has a cluster ID. Each primary node in A retains thefollowing information: ID of cluster A, IDs of all primarynodes in A, IDs and sizes of the clusters which are theneighbors of A in the backbone tree.

3.2. Cooperative transmission scheme

The multiple antennas in MIMO radio systems are usedto provide diversity gain and multiplexing gain. In this pa-

Anycompromised

node?

Secured datatransmission withkey managementscheme

data transmission/relayNormal cooperative

Normal cooperativedata transmission/relay

Symbol recovery Send detection report

StartDetection?

YesNo

YesNo

NoReceive keyrevocationmessage?Yes

Key revocation forpreventing data leaking

data transmission/relayNormal cooperative

Virtual MIMO link

Compromised nodes detection knit with key management

Fig. 2. Cross-layer secured communication scheme for cooperative MIMO networks.

98 L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105

Page 6: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

per, we consider diversity gain only. There are two types ofcommunication in a cooperative MIMO relay network: lo-cal/intra communication at virtual MIMO nodes andlong-haul/inter communication between virtual MIMOnodes [3,22]. The following MIMO scheme cooperativelyrelays kðk P 1Þ source data in a cluster A back to thedestination:

MIMO Scheme for data relay between virtual nodes Aand B

1. First hop between virtual nodes A and B:Fig. 3 shows the first hop cooperative transmissionbetween virtual nodes A and B. It includes local trans-mission in virtual node A, and long-haul transmissionbetween virtual nodes A and B.Step 1 (Local transmission at A): Each primary node iin A with source data Ii broadcasts its data to all othernodes using different timeslots. After this step, eachnode in A has source data sequence I ¼ I1; I2; . . . ; Ik.Step 2 (long-haul transmission between A and Busing multiple mT �mR MIMO link): Suppose thereare jAj and mR cooperative nodes in transmission sideA and in reception side B, respectively. mT nodes in clus-ter A with smallest IDs will attend the data transmis-sion, where

mT ¼jAj; if jAj 6 jDjround ðjDj þ 1Þ � 2

3

� �; if jAj > jDj

(ð2Þ

roundð�Þ stands for round to nearest integer, D is detec-tion cluster, which is the larger cluster between clusterB and the cluster before A in the relay route, and jDj isthe number of cooperative nodes in D. Detailed deriva-tion for Eq. (2) is given in Section 5. Since each node in Ahas the list of IDs of the primary nodes in A and knowsthe sizes of A’s neighboring cluster, it can decide jDj, cal-culate mT , and judge if it should attend the data trans-mission.After nodes’s self-selection, each attending node withthe ith smallest ID in A acts as the ith antenna and en-codes the data sequence I using mT �mR MIMO coding.All mT nodes in A broadcast encoded sequence to the mR

nodes in B at the same time. Each node of the mR nodesin B receives combined mT encoded sequences I.Step 3 (Local transmission at B): (i) Each primary nodein B broadcasts the received data to all other primarynodes using different timeslots. (ii) After receiving thedata from the other primary nodes, each primary nodein B decodes the received data back to the originalsource data sequence I.

2. Other hops between virtual nodes B and C:The transmission in the hops other than the first hopconsists the long-haul transmission between virtual

nodes B and C that is similar to Step 2 in the first hopand the local transmission at C that is similar to Step3 in the first hop. The only change is to replace A andB to B and C, respectively.

Eq. (2) will also be used as the condition for compro-mised nodes detection in Section 5.

4. Security key management scheme

The key management system is based on shared/sym-metric key cryptography. It only needs a small number ofpre-loaded keys. Since localization itself is a very challeng-ing problem, the key establishment in this work usestopology knowledge instead of the location knowledgewhich are used in existing work [23].

Types of keys: Fig. 4 shows the two types of keys usedin the cooperative MIMO communications. They are:

� Shared keys, C-keyðAÞ, for local communication at eachcluster.� Shared keys, L-keyðA;BÞ, for long-haul communication

at each link of two clusters A and B in the backbone tree.When the primary nodes in A and B cooperate on datatransmission and reception, each node in A usesL-keyðA;BÞ to encrypt the transmission data and eachnode in B uses the same key to decrypt the receiveddata.

Key pre-distribution: For each primary node u inWSNs, a shared key, pre-keyðb;uÞ, is pre-distributed atthe sink b and at the node u, respectively.

Key establishment: We proposed an key establishmentalgorithm as shown in Algorithm 1.

Algorithm 1. Key Establishment (Assume that the CMIMOnetwork is already formed)

1: A special node u (e.g., the primary node with thesmallest ID) at each cluster A sends a key request tothe sink b with a plain message (u’s ID, b’s ID) andan encrypted message (u’s ID, b’s ID, u’s member-listof the cluster, u’s neighbor-list of the backbone)encrypted by using pre-keyðu; bÞ.

2: When b receives the key request from u; b decryptsthe message by using pre-keyðb;uÞ. After b receivesthe key requests from all nodes, it has the topologyof the whole cooperative MIMO network. Then, bgenerates a C-keyðAÞ for each cluster A, and anL-keyðA;BÞ for link AB of each cluster B in A’sneighbor-list of the backbone. b disseminates thekey response to each primary node x in cluster A asfollows: a plain message (b’s ID, x’s ID) and anencrypted message (b’s ID, x’s ID, C-keyðAÞ, a list ofL-keyðA;BÞ for each cluster B in A’s neighbor-list)encrypted by pre-keyðb; xÞ.

3: When primary node x receives a key response, xdecrypts the message by using pre-keyðx; bÞ to getC-key or L-keys.

A 4X3 long−haul MIMO link

AB

Fig. 3. Cooperative MIMO data transmission scheme.

L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105 99

Page 7: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

Remark:

When b disseminates the key response to a primarynode x, it delivers a package to x which includes the plainmessage (b’s ID, x’s ID), encrypted message (b’s ID, x’s ID,and a list of L-keyðA;BÞ). The key responses for n primarynodes are distributed by performing depth-first travel onthe backbone tree of the CMIMO network. Due to the coop-erative communication, when a virtual MIMO node on thebackbone tree receives a key response, all primary nodes inthe virtual node receive the same key response. Therefore,the time required for key distribution is Oðnþ tÞ, where nis the number of primary nodes, and t is the size of thebackbone tree which is the number of virtual MIMO nodes.

Secured Communication and Routing:After the key establishment, the communication in each

local virtual MIMO node A uses C-key(A) and in link AB atthe backbone uses L-key(AB). Since the routing uses thepaths on the backbone tree, cooperative data relay issecured.

In the proposed key management scheme, each primarynode u needs only one pre-distribution key. After keyestablishment, each primary node u has one C-key and kL-keys, where k is the number of the neighbors that u’scluster has in the backbone tree. It is very small numberof keys and affordable for small and inexpensive nodes.The total number of C-keys and L-keys in the whole net-work are n (the number of clusters), and n� 1 (the numberof edges in the backbone tree), respectively. The proposedkey management system is more efficient than other exist-ing systems: it uses shared/symmetric key cryptographywhich requires small size of keys, it needs only a smallnumber of keys at each primary nodes, and key establish-ment can be performed without location knowledge.Therefore, it is affordable for small and inexpensive nodes.

5. Compromised nodes detection with information andnetwork recovery

In this Section, the algorithms for compromised nodesdetection is presented first. After detection, the symbolrecovery method is used to eliminate the impacts of thecompromised nodes. The proposed detection and recoverycan be applied to scenarios where the transmitting anddetection clusters have different numbers of cooperativenodes. Finally, the key revocation algorithm is used to iso-late the compromised nodes in the topology and the clus-ters are self-reconfigured. After key revocation, thecompromised nodes are not able to affect the network orget information from the network.

5.1. Compromised nodes detection

In cooperative communications with multiple nodesand sophisticated relay rules, the security enforcement isa challenging and delicate task [11]. Here we present aphysical layer identification approach that detects compro-mised nodes without increasing the transmission over-head. The system complexity will also be maintained inmost cases.

Before we present the distributed algorithm for com-promised nodes detection, we propose an algorithm shownin Algorithm 2 to determine at each cluster whether thecompromised nodes detection is needed. In this algorithm,the sink broadcasts a time interval tI and security level0 6 sl 6 1 at the beginning of the WSN deployment. Itmay broadcast the adjusted time interval tI and security le-vel sl during the operation of the WSN when necessary. Theshorter the time interval or the lower the security level, themore compromised nodes detections will be performed.

Algorithm 2. Start detection at cluster D?

1: At the beginning of each time interval tI , therandom number generator at the node h with thesmallest ID in the cluster D generates a uniformlydistributed random number l between 0 and 1.

2: h compares l with the sink defined security level, sl.3: if l > sl then4: Node h broadcasts the detection message to other

nodes in the cluster.5: Each node in the detection cluster perform

compromised nodes detection in this time intervalbefore data transmission and relay.

6: else7: No detection. The clusters perform normal

cooperative data transmission or relay operation.8: end if

After the cluster decides that the compromised nodesdetection is needed, the cluster will use symbols of time spantd for detection, where td � tI . The starting point of td is uni-formly distributed in the sink defined time interval tI .

Remarks:

1. In this proposed scheme for cooperative compromisednodes detection, the detection cluster is always thereceiving cluster, either in the receiving side of a trans-mission-receiving pair or through listening. On theother hand, the detection is conducted at random times,the compromised nodes in a transmitting cluster do notknow when to pretend to be trustworthy nodes. If thecompromised nodes always pretend to be trustworthynodes by transmitting correct data, they are not consid-ered to be compromised nodes because all the data theytransmitted are correct.

2. Detecting the compromised nodes at random times hastwo advantages. First, in the fixed-time detectionscheme [24], the compromised nodes can pretend tobe trustworthy nodes by sending the correct data only

AB

C−key(A)

C−key(B)

L−key(A, B)

Fig. 4. Keys used in the proposed secured communication system.

100 L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105

Page 8: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

at the detection time. However, in this proposedscheme, the compromised nodes cannot pretend to betrustworthy nodes since they do not know when thedetection process will be performed. Second, the secu-rity level is adapted according to the detected numberof compromised nodes, so that the energy and commu-nications of the whole WSN can be saved.

In multi-hop WSNs, except the sink cluster, any one ofthe clusters will serve as the cluster to-be-detected whenit is selected as relay cluster by the routing scheme. Con-sider two consecutive detection pairs as shown in Fig. 5,where cluster B is the cluster for detecting compromisednodes in cluster A and cluster C is the detection clusterfor cluster B. If there are compromised nodes in B;B maydetect the compromised nodes in A with higher error rate.However, these compromised nodes will be detected by Cand removed from B with key revocation in the (B; C)detection pair. After this, B will not have compromisednodes and can detect compromised nodes in A with highaccuracy. Therefore, without loss of generality, in thefollowing algorithm for compromised nodes detection,we assume that the detection cluster does not have com-promised node.

Fig. 6 shows the model for compromised nodesdetection, where A is the transmitting cluster and D isthe detection cluster.

In the following description of the compromisednodes detection algorithm, the diversity gain isobtained by letting all transmission nodes in cluster Atransmit the same data stream. It can be easily extendedwhen the space–time code is used as explained inremarks. As shown in Fig. 6, the mT primary nodes in Atransmit s1 ¼ s2 ¼ � � � ¼ smT ¼ ðI ¼ I1; I2; . . . ; IkÞ, whereIi; i ¼ 1;2; . . . ; k are data symbols. The primary nodes in Dcollect the data for detection. When the detection is needed,the node with the smallest ID in D requests all the nodes inits cluster to broadcast the received symbols at differenttime slots. Due to the small distance between the nodes inthe same cluster, it is reasonable to assume that there isno error during this broadcast process when appropriateerror correction coding scheme is used. After local broad-cast, each primary node in D has complete received datasequence y and will perform distributed detection toidentify compromised nodes in cluster A. Algorithm 3describes the compromised nodes detection algorithm ateach primary node in D.

Algorithm 3. Compromised nodes detection

1: After receive complete data sequence y, eachprimary node in the detection cluster D performsInverse Channel Detection [20] to estimate thetransmitted symbols s. The inverse channel detectormultiplies a weighting matrix that is inverse orpseudo-inverse of the channel matrix H with thereceived symbols to estimate the transmittedsymbols s, that is, s ¼WHy, where W is an jDj �mT

weighting matrix and jDj is the number of nodes in

D; ð�ÞH represents Hermitian transpose. According tothe system model in Section 2, the matrix ofchannel coefficients H is assumed known to thedetection cluster. Moreover, since mT 6 jDj asshown in Eq. (2), W can be determined by

W ¼H�1; if mT ¼ jDj

ðHHHÞ�1HH ; if jDj > mT

(ð3Þ

2: Based on the assumption that all data streamssi ð1 6 i 6 mTÞ transmitted by the non-compromised nodes should be the same, thedetecting primary node can identify thecompromised nodes xi (if any) and record their IDsby checking whether xi transmitted the samesymbols as the majority nodes. To check that, therecovered data streams from different transmittingnodes will be sorted into groups, where nodes areassigned to the same group if they contain identicalsymbols. The group with largest number of nodes isassumed to be trustworthy nodes. All the othernodes are classified as compromised nodes.

3: When compromised node j in A is detected byprimary node u in D, the encrypted detection reportwith a plain message (u’s ID, the sink’s ID b) and anencrypted message (u’s ID, the sink’s ID b; j’s ID)encrypted by pre-keyðu; bÞ will be sent by eachdetecting primary node. This message will then berelay to the sink b by the cooperative MIMO schemefor data relay. The sink will use majority rule todetermine whether a reported node is reallycompromised or not, that is, if more than half of theprimary nodes in the detection cluster claimed thatnode j is compromised, the sink will classify node jas compromised node.

Remarks:

1. Comparing with [11], no tracing symbols are needed inthe proposed compromised nodes detection algorithm,therefore, the proposed algorithm does not have theoverhead and the system complexity is lower withoutthe need of tracing symbol transmission and extraction.

2. The proposed algorithm for compromised nodes detec-tion will also work well when the space–time code isused. In this case, the symbol-by-symbol comparisonwill be replaced by the pattern comparison, where each

A B CDetectDetect

Fig. 5. Example of consecutive detection pairs.

Fig. 6. Model for compromised nodes detection.

L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105 101

Page 9: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

pattern that includes several symbols is determined bythe selected space–time code. Therefore, the full MIMObenefits can still be maintained with the proposedalgorithm.

3. Simple sorting algorithm can be used for grouping inthe second step when detecting the compromisednodes in transmitting cluster A. The total number ofcomparisons in the algorithm is OðmT logðmTÞÞ, wheremT is the number of primary nodes in cluster A.

In above proposed algorithm for compromised nodesdetection, in order to illustrate the selection of detectioncluster and the maximum number of compromised nodesthat can be identified, let’s consider a two-hop data relaypath as show in Fig. 7, where Pre A cluster relays data tocluster A, then A relays data to cluster Post A. LetjAj; jPre Aj, and jPost Aj denote the number of nodes in clus-ters A; Pre A, and Post A, respectively. We consider threecases to cover all the scenarios for selecting the detectioncluster to identify the compromised nodes in cluster Aand determining the maximum number of compromisednodes that can be identified.

Select the detection cluster to identify the compro-mised nodes in A

Case 1. jAj 6 jPost Aj (A is cluster 1 in Fig. 1) In this case,the compromised nodes in cluster A are detectedby cluster Post A. The maximum number ofcompromised nodes that can be identified isjAj=2� 1.

Case 2. jAj > jPost Aj and jAj 6 jPre Aj (A is cluster 3 inFig. 1) In this case, the compromised nodes incluster A are detected by cluster Pre A when Arelays data to cluster Post A. The Pre A clusterwill listen A’s transmission. The maximum num-ber of compromised nodes that can be identifiedis jAj=2� 1.

Case 3. jAj > jPost Aj and jAj > jPre Aj (A is cluster 2 inFig. 1).In this case, the compromised nodes in cluster Aare detected by the larger cluster of Pre A andPost A. According to the CMIMO Network trans-mission scheme, mT nodes are self-selected totransmit or relay data and the rest keep idle.The maximum number of detectable compro-mised nodes in A and the value of mT can bedetermined using the following equations:

Nmax þmT ¼ jDj

Nmax ¼mT

2� 1

ð4Þ

where Nmax is the maximum number of compromised nodesin the transmitting cluster A and jDj is the number of nodesin the detection cluster. The first part of Eq. (4) guaranteesthat the number of transmitted nodes is not exceed thatthe number of nodes in detection cluster which is requiredby Eq. (3), even when the compromised nodes keepsending garbled data when they are required to keep idle.The second part of Eq. (4) guarantees that the number ofthe compromised nodes is less than half of the transmittingnodes, so that by comparing the transmitted data indifferent nodes, the compromised nodes could be identified.By solving Eq. (4), we have

Nmax ¼ ðjDj þ 1Þ � 13� 1

mT ¼ ðjDj þ 1Þ � 23

ð5Þ

If the solutions of Nmax and/or mT in Eq. (5) are not integer,they will be rounded to the closest integer. For example,when jDj is 4, 5, or 6, we can detect one compromised nodeby setting mT to 3, 4, or 5. When jDj is 7, we can detect twocompromised node by setting mT to 5.

Based on the above approach for selecting detectioncluster, we add which cluster D detects in the algorithmStart detection at cluster D as follows:

Since the nodes of D know the size of Pre D and Post D,where the cluster Pre D is the cluster that relays data to D,and the cluster Post D is the cluster that D relays data to.***

1. if jDjP jPre Dj and/or jDjP jPost DjD detects Pre D and/or Post D.

2. else if mT of Pre D and/or Post D is ðjDj þ 1Þ � 23

D detects Pre D and/or Post D.

If the cluster D needs to detect the compromised nodesin both clusters Pre D and Post D, it first checks clusterPre D then cluster Post D.

Summarizing the above three cases, it is clear that thedetection algorithm can identify all the compromisednodes if they are less than half in the cooperative transmis-sion cluster and the number of all nodes in this cluster isnot larger than that of all its neighboring clusters. If thenumber of nodes in this cluster is larger than that of itsall neighboring clusters, the proposed detection approachcan detect all the compromised nodes if they are less thanone third of the number of all nodes in the neighboringcluster that has the larger number of nodes.

5.2. Symbol recovery method that eliminates the garbledsymbol

When the compromised nodes are detected, the sinkwill forward the ID of the compromised node to the receiv-ing cluster. The receiving cluster then decodes the messageby simply setting the columns in channel matrix that cor-responds to the compromised nodes to zero. This will elim-inate the use of the malicious data by ignoring the symbolstransmitted from the compromised nodes.

A Post−APre−A

Fig. 7. Selection of cluster for detection.

102 L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105

Page 10: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

5.3. Key revocation and network recovering

If the sink determines that there is compromised nodein cluster A, it will start the key revocation and networkrecovering process. This approach is used to prevent com-promised nodes from getting information in the networkand sending false reports.

In key revocation, the sink b takes the following actionsfor key revocation and network recovery:

1. The sink b sends all nodes v in cluster A other than x akey revocation information with a plain message(b’s ID, v’s ID) and an encrypted message (b’s ID, v’sID, new C-keyðAÞ, and ID list of the compromised nodes)encrypted by pre-keyðb;vÞ.

2. For each A’s neighbor B in the backbone tree, b sendseach node v in A and in B other than x a key revocationinformation with a plain message (b’s ID, v’s ID) and anencrypted message (b’s ID, v’s ID, new L-keyðA;BÞ)encrypted by pre-keyðb;vÞ.

3. When node v in A and B receives a key revocation infor-mation from the above steps 1) and 2), it decrypts themessage by pre-keyðv ; bÞ and gets a new C-key orL-key. In this way, the C-key for local communicationin virtual node A and the L-key for long-haul communi-cation between A and each of its neighboring clusters inthe backbone tree are revoked. The compromised nodex does not have the new keys and will be not able to getinformation from the network.

Remark:When a compromised node in a cluster A is detected by

A’s parent, a report is sent back to the sink b from A’s par-ent to A’s grandparent, and then from A’s grandparent toA’s great-grandparent, etc., on the backbone tree. If eachnode keeps a record which indicates from whom it receivesthe report, b can send the key revocation packages to A andits neighbors via the path that reverses the path that thereport traveled. Therefore, the time for key revocation isOðhþ kÞ, where h is the height of the backbone tree andk is the number of A’s neighbors.

6. Simulation results

In this section we investigate the performance of theproposed compromised nodes detection algorithm andthe cooperative secured communication system throughcomputer simulations. Since this paper deals with securedcommunication scheme, MATLAB, a commonly-used simu-lation tool for communications research, is selected. In thesimulations, multiple single-antenna sensor nodes arephysically grouped together to form a MIMO system. Theactive compromised nodes attack is considered. Insteadof relaying the received information, the compromisednodes transmit randomly generated symbols. Similar tothe existing works presented in [11], the multi-path scat-tered environment is considered. The channels are blockRayleigh fading channels, i.e., the channel coefficient ma-trix H is constant during the transmission of one symbol,but is randomly changing between symbols. Different

channels are identically distributed and statistically inde-pendent. Binary phase shift keying (BPSK) is chosen asthe modulation scheme. 100 received symbols are usedin the proposed algorithms for compromised nodes identi-fication. The maximum likelihood detector is used for sym-bol demodulation.

Since compromised nodes detection is performed be-tween one transmitting virtual MIMO node and one receiv-ing virtual MIMO node, the performance evaluation onlyevaluates one hop as shown in Fig. 6 to demonstrate theeffectiveness of the proposed algorithm. Fig. 8 shows theaccuracy of the proposed algorithm for compromised nodesdetection when there is one compromised node in the trans-mitting cluster. The accuracy is defined as the ratio of cor-rectly identified compromised nodes and normal nodes toall nodes. Since all the compromised nodes detection casesrequire jDjP mT , where jDj is the number of nodes in thedetection cluster and mT is the self-selected nodes in trans-mission, in this simulation, the transmitting cluster has 4nodes and the detection cluster has 5 nodes. It is clear thatthe proposed algorithm has high identification accuracy,since when the SNR is larger than�4 dB, the proposed algo-rithm can identify the compromised node close to 100%.

Fig. 9 compares the performance of the proposed cooper-ative communication system with the conventional systemthat does not detect compromised nodes in terms of bit errorrate (BER). There is one compromised node in the transmit-ting cluster, and the transmitting cluster has 4 nodes and thedetection cluster has 5 nodes. The BER performance of thesystem when there is no compromised nodes is also pre-sented with the dashed line as a reference of the optimumperformance. The dotted line is for the conventional systemwhere the receiving cluster does not detect compromisednodes and uses the garbled data from the compromisednodes in symbol demodulation. The solid line is for the pro-posed system. Comparing with the conventional system, itis clear that the proposed system significantly improvesthe reliability of the communication when SNR is higherthan �8 dB. Comparing with the system without compro-mised node, the performance loss of the proposed system

−12 −11 −10 −9 −8 −7 −6 −5 −4 −3 −20.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SNR (dB)

Det

ectio

n Ac

cura

cy

mT=4, |D|=5, one compromised node

Fig. 8. Accuracy of the proposed compromised nodes detector.

L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105 103

Page 11: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

is because the diversity gain is smaller when the data fromthe compromised nodes are eliminated.

Table 1 gives more simulation results in terms of detec-tion accuracy and the BER for different mT ; jDj, and thenumber of compromised nodes. The SNR is �6 dB. The sys-tem number 1, 2 and 3 represents the system free of com-promised nodes, the system that does not detectcompromised nodes and uses the garbled data from thecompromised nodes in symbol demodulation, and the pro-posed system, respectively. For the first two types of sys-tems, there is no compromised nodes detection andtherefore the detection accuracy is not applicable (NA) tothem. Simulations have been conducted for all the caseswith 4 6 jDj 6 7;4 6 mT 6 7, and �12 6 SNR 6 �2. Therest results are available upon request. It is clear that theproposed schemes significantly improved the accuracy ofthe data transmission of the cooperative communicationsystem when comparing with the system without compro-mised node detection.

7. Conclusions

This paper proposed a secure cooperative MIMO com-munication system under active compromised nodes,

where some of the relay nodes are compromised and tryto corrupt the communications by sending garbled signals.To combat the compromised nodes, we propose a cross-layer secured communication scheme for cooperativeMIMO communication in wireless sensor networks toovercome the external and active compromised nodes at-tacks. The scheme combines cryptographic techniqueimplemented in higher layers with data assurance analysisat the physical layer to provide better communicationsecurity. The cryptography provides secured data trans-mission between authorized nodes and it also secureskey revocation and network recovery. An information the-ory based algorithm for compromised nodes detection isproposed. It can identify all the compromised nodes inthe latest configured cooperative node groups, providedthat the compromised nodes are less than half in the coop-erative cluster and the number of all nodes in this cluster isnot larger than that of its all neighbors. If the number of allnodes in this cluster is larger than that of its all neighbors,the proposed detection approach could detect all the com-promised nodes if they are less than one third of the num-ber of all nodes in the neighboring cluster that has thelargest number of nodes. The effectiveness and efficiencyof the proposed algorithm for compromised nodes detec-tion is demonstrated through computer simulations. Thesimulation results also show the significant improvementin the accuracy of received information.

Acknowledgment

This work is supported in part by U.S. AFRL/RY ContractFA8650-05-D-1912, 2010–2011.

References

[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey onsensor networks, IEEE Commun. Mag. 40 (2002) 102–114.

[2] J. Mietzner, R. Schober, L. Lampe, W.H. Gerstacker, P.A. Hoeher,Multiple-antenna techniques for wireless communications – acomprehensive literature survey, IEEE Commun. Surveys Tuts. 11(2009) 87–105.

[3] S. Hussain, A. Azim, J.H. Park, Energy efficient virtual MIMOcommunication for wireless sensor networks, Telecommun. Syst.42 (2009) 139–140.

[4] S.K. Jayaweera, Virtual MIMO-based cooperative communication forenergy-constrained wireless sensor networks, IEEE Trans. WirelessCommun. 5 (2006) 984–989.

[5] W. Chen, Y. Yuan, C. Xu, K. Liu, Z. Yang, Virtual MIMO protocol basedon clustering for wireless sensor network, in: Proc. IEEE Symp.Computer and Communications, Cartagena, Murcia, Spain, 2005, pp.335–340.

[6] J. Liu, Energy-efficient cross-layer design of cooperative MIMOmulti-hop wireless sensor networks using column generation,Wireless Personal Commun. J. 66 (2012) 185–205.

[7] M.R. Islam, J. Kim, Energy efficient cooperative MIMO in wirelesssensor network, in: Proc. IEEE International Conference onIntelligient Sensors, Sensor Networks and InformationProcessing(ISSNIP), Sydney, Australia, 2008, pp. 505–510.

[8] W. Chen, H. Miao, L. Hong, J. Savage, H. Adas, Cross layer design ofheterogeneous virtual MIMO radio networks with multi-optimization, in: Proc. IEEE International Parallel and DistributedProcessing Symposium on Advances in Parallel and DistributedComputing Models, Atlanta, GA, USA, 2010, pp. 1–8.

[9] Y. Zhou, Y. Fang, Y. Zhang, Securing wireless sensor networks, asurvey, IEEE Commun. Surveys Tuts. 10 (2008) 6–28.

[10] C. Karlof, D. Wagner, Secure routing in wireless sensor networks:attacks and countermeasures, in: Proc. 1st IEEE InternationalWorkshop on Sensor Network Protocols and Applications,Anchorage, AL, USA, 2003, pp. 113–127.

−12 −11 −10 −9 −8 −7 −6 −5 −4 −3 −2

100

10−5

10−4

10−3

10−2

10−1

SNR (dB)

Bit E

rror r

ate

mT=4, |D|=5, one compromised node

no compromised nodeno detection for compromised nodeproposed system

Fig. 9. Performance comparison.

Table 1Performance evaluation for secure cooperative MIMO networks.

Systemnumber

jDj mT Number ofcompromised node

BER Detectionaccuracy

1 4 3 0 0.01955 NA2 4 3 0 0.02115 NA3 4 3 0 0.01916 1.0001 4 3 1 0.01981 NA2 4 3 1 0.13356 NA3 4 3 1 0.05659 0.9731 5 5 1 0.00313 NA2 5 5 1 0.03794 NA3 5 5 1 0.00991 0.9631 7 5 2 0.00054 NA2 7 5 2 0.08657 NA3 7 5 2 0.01324 0.923

104 L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105

Page 12: Author's personal copy...Physical layer security Compromised nodes detection Cryptography Information theory abstract Emerging cooperative MIMO communication is a promising technology

Author's personal copy

[11] Y. Mao, M. Wu, Tracing malicious relays in cooperative wirelesscommunications, IEEE Trans. Inform. Forensics Sec. 2 (2007) 198–212.

[12] X. Chen, K. Makiki, K. Yen, N. Pissinou, Sensor network security: asurvey, IEEE Commun. Surveys Tuts. 11 (2009) 52–73.

[13] A. Jain, K. Kant, M.R. Tripathy, Security solutions for wireless sensornetworks, in: Proc. IEEE Second Intl. Conf. Advanced Computing andCommunication Technologies, Rohtak, Haryana, India, 2012, pp.430–433.

[14] V.C. Sekhar, M. Sarvabhatla, Security in wireless sensor networkswith public key techniques, in: Proc. IEEE Intl. Conf. ComputerCommunication and Informatics, Coimbatore, India, 2012, pp. 1–16.

[15] H.K.D. Sarma, A. Kar, R. Mall, Secure routing protocol for mobilewireless sensor network, in: Proc. IEEE Sensors ApplicationsSymposium, San Antonio, TX, USA, 2011, pp. 93–99.

[16] X. Li, J. Hwu, Using antenna array redundancy and channel diversityfor secure wireless transmissions, J. Commun. 2 (2007) 24–32.

[17] H. Kim, J.D. Villasenor, Secure MIMO communications in a systemwith equal numbers of transmit and receive antennas, IEEECommun. Lett. 12 (2008) 386–388.

[18] H. Wen, G. Gong, A MIMO based Cross-layer Approach to Augmentthe Security of Wireless Networks, Tech. Rep. CACR 2008-21,University of Waterloo, 2008.

[19] J.N. Leneman, D.N.C. Tse, G.W. Wornell, Cooperative diversity inwireless networks: efficient protocols and outage behavior, IEEETrans. Inform. Theory 50 (2004) 3062–3080.

[20] J.G. Proakis, Digital Communications, ffith ed., McGraw-Hill, NewYork, NY, 2008.

[21] S.M. Alamouti, A simple transmit diversity technique for wirelesscommunications, IEEE J. Sel. Areas Commun. 16 (1998) 1451–1458.

[22] S. Cui, A.J. Goldsmith, A. Bahai, Energy-efficiency of mmio andcooperative mimo techniques in sensor networks, IEEE J. Sel. AreasCommun. 22 (2004) 1089–1098.

[23] X. Du, M. Guizani, Y. Xiao, H.-H. Chen, A routing-driven elliptic curvecryptography based key management scheme for heterogeneoussensor networks, IEEE Trans. Wireless Commun. 8 (2009) 1223–1229.

[24] W. Chen, M. McNeal, L. Hong, Cross-layered design of securityscheme for cooperative MIMO networks, in: Proc. IEEE InternationalConference on Wireless Information Technology and Systems,Honolulu, HI, USA, 2010, pp. 1–4.

Dr. Liang Hong received the B.S. and the M.S.degrees in Electrical Engineering from South-east University, Nanjing, China in 1994 and1997, respectively, and the Ph.D. degree inElectrical Engineering from University ofMissouri, Columbia, Missouri in 2002. He wasa Research Associate at Siemens CorporateResearch, Princeton, New Jersey from Febru-ary 2003 to July 2003. Since August 2003, hehas been with the Department of Electrical &Computer Engineering at Tennessee StateUniversity where he is now Associate Profes-

sor. His research interests include cognitive radio, modulation classifi-cation, error control coding, noise and interference reduction, and

wireless multimedia communications and networks. He has authored andcoauthored over 30 technical refereed papers and served as the technicalcommittee member for many international conferences. He also served assession chairs for several academic conferences. Throughout his academiccareer, he has served as Co-PI of NSF funded research projects andinvolved in several federal and industry funded projects.

Dr. Wei Chen received the B.A. degree inMathematics in Shanghai Maritime Univer-sity, China in 1982, and the M.S. and the Ph.D.degrees in Computer and Information Sciencein Osaka University, Japan in 1991 and 1994,respectively. She was an Assistant Professorand Associate Professor in Nagoya Institute ofTechnology, Japan during 1994–1998 and1999–2000, respectively. She was an Associ-ate Professor in Nanzan University, Japan in2001. She has been a Professor in TennesseeState University since 2002. Her research

interests include cognitive radio networks, wireless sensor, ad hoc, andmobile networks, network security, parallel/distributed computing, andbioinformatics. Dr. Chen has been the principal investigator in SensorDirectorate at MLP program (Air Force) since 2006. She and her team haveconducted a number of innovative research projects such as ‘‘Cross-Lay-ered Design of MIMO Radio Networks’’ and ‘‘Cooperative and NetworkedMethods for Spectrum Sharing and Interference Reduction’’. She has alsoled and engaged in the research of wireless sensor networks, networksecurity, bioinformatics and some other areas funded by ARO, DTRA,NASA and NSF. She received IBM Faculty Award in 2010, Research Awardsin Tennessee State University (TSU) in 2006 and Most Outstanding Fac-ulty Award in College of Engineering at TSU in 2012. She has over 80 peer-reviewed journal/conference publications, and has served as editor/associated-editor, committee chair/member for a number journals andinternational conferences.

L. Hong, W. Chen / Ad Hoc Networks 14 (2014) 95–105 105