{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:17:09Z","timestamp":1761401829849,"version":"build-2065373602"},"reference-count":44,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2016,11,12]],"date-time":"2016-11-12T00:00:00Z","timestamp":1478908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the National Science Foundation of China","award":["(No. 61501507)"],"award-info":[{"award-number":["(No. 61501507)"]}]},{"name":"the Jiangsu Provincial Natural Science Foundation of China","award":["(No. BK20150719)"],"award-info":[{"award-number":["(No. BK20150719)"]}]},{"name":"the Australian Research Council Discovery Project","award":["DP150103905"],"award-info":[{"award-number":["DP150103905"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper\u2019s channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.<\/jats:p>","DOI":"10.3390\/s16111908","type":"journal-article","created":{"date-parts":[[2016,11,14]],"date-time":"2016-11-14T11:39:50Z","timestamp":1479123590000},"page":"1908","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming"],"prefix":"10.3390","volume":"16","author":[{"given":"Maoqiang","family":"Yang","sequence":"first","affiliation":[{"name":"College of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0076-2844","authenticated-orcid":false,"given":"Bangning","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Yuzhen","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Nan","family":"Yang","sequence":"additional","affiliation":[{"name":"Research School of Engineering, Australian National University, Canberra, ACT 2601, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1544-6921","authenticated-orcid":false,"given":"Daoxing","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Bin","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Communications Engineering, PLA University of Science and Technology, No. 2 Biaoying, Qinhuai District, Nanjing 210007, China"}]}],"member":"1968","published-online":{"date-parts":[[2016,11,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TIFS.2016.2516917","article-title":"Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach","volume":"11","author":"Deng","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","article-title":"A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks","volume":"63","author":"Gope","year":"2016","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/TII.2015.2509442","article-title":"Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks","volume":"12","author":"Sun","year":"2016","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Liau, Q.Y., Leow, C.Y., and Ding, Z. (2016). Physical layer security using two-path successive relaying. Sensors, 16.","DOI":"10.3390\/s16060846"},{"key":"ref_5","first-page":"60","article-title":"In Multi-agent based framework for secure and reliable communication among open clouds, Network Protocols and Algorithms","volume":"6","author":"Mehmood","year":"2014","journal-title":"Macrothink Inst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MCOM.2016.7452265","article-title":"Cloud-centric multi-level authentication as a service for secure public safety device networks","volume":"54","author":"Butun","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MCOM.2015.7120011","article-title":"The challenges facing physical layer security","volume":"53","author":"Trappe","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2840","DOI":"10.1109\/ACCESS.2016.2575863","article-title":"Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations","volume":"4","author":"Xu","year":"2016","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Curiac, D.I. (2016). Wireless sensor network security enhancement using directional antennas: State of the art and research challenges. Sensors, 16.","DOI":"10.3390\/s16040488"},{"key":"ref_10","unstructured":"Song, H., Rawat, D.B., Jeschke, S., and Brecher, C. (2016). Cyber-Physical Systems: Foundations, Principles and Applications, Elsevier\/Academic Press. [1st ed.]."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sheng, G., Wang, Y., Lv, Z., and Song, H. (2016). Multiple-antenna systems and multiuser communications: Fundamentals and an overview of software-based modeling techniques. Comput. Electr. Eng.","DOI":"10.1016\/j.compeleceng.2016.08.015"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1049\/iet-com.2015.0229","article-title":"Precoder-and-receiver design scheme for multi-user coordinated multi-point in LTE-A and fifth generation systems","volume":"10","author":"Xu","year":"2016","journal-title":"IET Commun."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","article-title":"Safeguarding 5G wireless communication networks using physical layer security","volume":"53","author":"Yang","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1771","DOI":"10.1109\/TCOMM.2015.2419634","article-title":"Artificial noise: Transmission optimization in multi-input single-output wiretap channels","volume":"63","author":"Yang","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2170","DOI":"10.1109\/TVT.2015.2419318","article-title":"Optimal transmission with artificial noise in MISOME wiretap channels","volume":"65","author":"Yang","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/TCOMM.2012.12.110670","article-title":"Transmit antenna selection for security enhancement in MIMO wiretap channels","volume":"61","author":"Yang","year":"2013","journal-title":"IEEE Trans. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1109\/TWC.2013.013014.131248","article-title":"Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels","volume":"13","author":"Yan","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4058","DOI":"10.1109\/ACCESS.2016.2593012","article-title":"Secure transmission in spectrum sharing MIMO channels with generalized antenna selection over Nakagami-m channels","volume":"4","author":"Huang","year":"2016","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/TVT.2015.2397195","article-title":"On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping","volume":"65","author":"Zhu","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/TVT.2015.2392753","article-title":"Transmit antenna selection in cognitive MIMO relaying with multiple primary transceivers","volume":"65","author":"Yeoh","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3831","DOI":"10.1109\/TCOMM.2016.2573822","article-title":"On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI","volume":"64","author":"Pan","year":"2016","journal-title":"IEEE Trans. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1741","DOI":"10.1109\/JSAC.2013.130908","article-title":"On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming","volume":"31","author":"Park","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"7274","DOI":"10.1109\/TVT.2015.2490099","article-title":"Destination aided cooperative jamming for dual-hop amplify-and-forward MIMO untrusted relay systems","volume":"65","author":"Xiong","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"8014","DOI":"10.1109\/TVT.2015.2510502","article-title":"On secrecy performance of a multi-antenna jammer aided secure communications with imperfect CSI","volume":"65","author":"Chen","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1109\/TIFS.2014.2374356","article-title":"Secrecy transmission with a helper: To relay or to jam","volume":"10","author":"Hao","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1109\/TVT.2014.2336092","article-title":"Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer","volume":"64","author":"Zheng","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2537","DOI":"10.1109\/TWC.2015.2504526","article-title":"Ergodic achievable secrecy rate of multiple-antenna relay systems with cooperative jamming","volume":"15","author":"Zhao","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Li, Z., Jing, T., Ma, L., Huo, Y., and Qian, J. (2016). Worst-case cooperative jamming for secure communications in CIOT networks. Sensors, 16.","DOI":"10.3390\/s16030339"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1109\/LCOMM.2016.2537329","article-title":"Secure transmission in spectrum sharing relaying networks with multiple antennas","volume":"20","author":"Zhang","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"6843","DOI":"10.1109\/TWC.2016.2591940","article-title":"Secure transmission in cooperative relaying networks with multiple antennas","volume":"15","author":"Huang","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1109\/TCOMM.2012.062512.110196","article-title":"Multiuser switched diversity scheduling schemes","volume":"60","author":"Shaqfeh","year":"2012","journal-title":"IEEE Trans. Commun."},{"key":"ref_32","unstructured":"Holter, B., Alouini, M.S., Oien, G.E., and Hong-Chuan, Y. (2004, January 26\u201329). Multiuser switched diversity transmission. Proceedings of the IEEE Vehicular Technology Conference, Los Angeles, CA, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Yang, M., Guo, D., Huang, Y., Duong, T.Q., and Zhang, B. (2016). Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks. IEEE Trans. Commun.","DOI":"10.1109\/TCOMM.2016.2606396"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Yang, M., Guo, D., Huang, Y., Duong, T.Q., and Zhang, B. (2016). Secure multiuser scheduling in downlink dual-hop regenerative relay networks over Nakagami-m fading channels. IEEE Trans. Wirel. Commun.","DOI":"10.1109\/TWC.2016.2610965"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TCOMM.2003.811408","article-title":"Performance analysis of multibranch switched diversity systems","volume":"51","author":"Alouini","year":"2003","journal-title":"IEEE Trans. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1756","DOI":"10.1109\/TCOMM.2015.2412939","article-title":"Opportunistic relay selection for secrecy enhancement in cooperative networks","volume":"63","author":"Zhong","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/TCOMM.2015.2497308","article-title":"Secure switch-and-stay combining (SSSC) for cognitive relay networks","volume":"64","author":"Fan","year":"2016","journal-title":"IEEE Trans. Commun."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","article-title":"Wireless information-theoretic security","volume":"54","author":"Bloch","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","article-title":"Optimal relay selection for physical-layer security in cooperative wireless networks","volume":"31","author":"Zou","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/TIFS.2014.2360437","article-title":"Security enhancement of cooperative single carrier systems","volume":"10","author":"Wang","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"5039","DOI":"10.1109\/TCOMM.2015.2494012","article-title":"Cooperative beamforming and user selection for improving the security of relay-aided systems","volume":"63","author":"Hoang","year":"2016","journal-title":"IEEE Trans. Commun."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1049\/el.2015.4375","article-title":"Ergodic secrecy capacity for downlink multiuser networks using switch-and-examine combining with post-selection scheduling scheme","volume":"52","author":"Yang","year":"2016","journal-title":"IET Electron. Lett."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/JSAC.2012.120215","article-title":"On the application of cooperative transmission to secrecy communications","volume":"30","author":"Ding","year":"2012","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_44","unstructured":"Gradshteyn, I.S., and Ryzhik, I.M. (2007). Table of Integrals, Series, and Products, Elsevier\/Academic Press. [7th ed.]."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/11\/1908\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:35:26Z","timestamp":1760211326000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/11\/1908"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,12]]},"references-count":44,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2016,11]]}},"alternative-id":["s16111908"],"URL":"https:\/\/doi.org\/10.3390\/s16111908","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2016,11,12]]}}}