{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T10:46:39Z","timestamp":1758278799847,"version":"3.40.5"},"reference-count":26,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T00:00:00Z","timestamp":1642032000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Project of Science and Technology Plan of Liaoning Province","award":["20180550911"],"award-info":[{"award-number":["20180550911"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Sensors"],"published-print":{"date-parts":[[2022,1,13]]},"abstract":"<jats:p>In traditional wireless sensor networks, information transmission usually uses data encryption methods to prevent information from being stolen illegally. However, once the encryption methods are leaked, eavesdropping nodes can easily obtain information. LT codes are rateless codes; if it is attacked by random channel noise, the decoding process will change and the decoding overhead will also randomly change. When it is used for physical layer communication of wireless sensor networks, it ensures that the destination node recovers all the information without adding the key, while the eavesdropping node can only obtain part of the information to achieve wireless information security transmission. To reduce the intercept efficiency of eavesdropping nodes, a physical layer security (PLS) method of LT codes with double encoding matrix reorder (DEMR-LT codes) is proposed. This method performs two consecutive LT code concatenated encoding on the source symbol, and part of the encoding matrix is reordered according to the degree value of each column from large to small, which reduces the probability of eavesdropping nodes recovering the source information. Experimental results show that compared with other LT code PLS schemes, DEMR-LT codes only increase the decoding overhead by a small amount. However, it can effectively reduce the intercept efficiency of eavesdropping nodes and improve information transmission security.<\/jats:p>","DOI":"10.1155\/2022\/6106786","type":"journal-article","created":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T04:50:48Z","timestamp":1642135848000},"page":"1-12","source":"Crossref","is-referenced-by-count":2,"title":["LT Codes with Double Encoding Matrix Reorder Physical Layer Secure Transmission"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2032-4187","authenticated-orcid":true,"given":"Hang","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, Liaoning 121001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7864-9585","authenticated-orcid":true,"given":"Fanglin","family":"Niu","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, Liaoning 121001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6166-405X","authenticated-orcid":true,"given":"Ling","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, Liaoning 121001, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0741-6845","authenticated-orcid":true,"given":"Si","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou, Liaoning 121001, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"crossref","first-page":"11374","DOI":"10.1109\/ACCESS.2018.2806423","article-title":"A novel physical layer secure key generation and refreshment scheme for wireless sensor networks","volume":"6","author":"K. Moara-Nkwe","year":"2018","journal-title":"IEEE Access"},{"issue":"2","key":"2","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1109\/TWC.2018.2890609","article-title":"Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection","volume":"18","author":"S. Atapattu","year":"2019","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"3","doi-asserted-by":"crossref","first-page":"2662","DOI":"10.1109\/TIFS.2019.2905759","article-title":"Physical layer security in wireless sensor networks using distributed co-phasing","volume":"14","author":"R. Chopra","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"4","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"C. E. Shannon","year":"1949","journal-title":"The Bell System Technical Journal"},{"issue":"8","key":"5","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"A. D. Wyner","year":"1975","journal-title":"Bell System Technical Journal"},{"issue":"4","key":"6","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1109\/TVT.2017.2779508","article-title":"Three artificial-noise-aided secure transmission schemes in wiretap channels","volume":"67","author":"S. H. Yan","year":"2018","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"7","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/TWC.2016.2617328","article-title":"Optimal relay selection for secure cooperative communications with an adaptive eavesdropper","volume":"16","author":"L. Yang","year":"2017","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"8","doi-asserted-by":"crossref","first-page":"19620","DOI":"10.1109\/ACCESS.2017.2752199","article-title":"Joint cooperative beam-forming and jamming for physical-layer security of decode-and-forward relay networks","volume":"5","author":"H. Y. Guo","year":"2017","journal-title":"IEEE Access"},{"key":"9","doi-asserted-by":"crossref","first-page":"58353","DOI":"10.1109\/ACCESS.2019.2905764","article-title":"The secrecy capacity optimization artificial noise: a new type of artificial noise for secure communication in MIMO system","volume":"7","author":"Y. B. Gu","year":"2019","journal-title":"IEEE Access"},{"issue":"12","key":"10","doi-asserted-by":"crossref","first-page":"11414","DOI":"10.1109\/TVT.2017.2729561","article-title":"Joint feedback and artificial noise design for secure communications over fading channels without Eavesdropper\u2019s CSI","volume":"66","author":"H. L. He","year":"2017","journal-title":"IEEE Transactions on Vehicular Technology"},{"first-page":"1","article-title":"A cluster-based cooperative jamming scheme for secure communication in wireless sensor network","author":"T. Zhu","key":"11"},{"issue":"4","key":"12","first-page":"1055","article-title":"Secret data transmission in wireless sensor network with physical layer network coding","volume":"33","author":"Q. Liu","year":"2017","journal-title":"Journal of Information Science & Engineering"},{"issue":"1","key":"13","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1109\/TVT.2018.2885869","article-title":"Fountain-coding-based secure communications exploiting outage prediction and limited feedback","volume":"68","author":"L. Sun","year":"2019","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"5","key":"14","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1109\/LCOMM.2014.030914.140030","article-title":"Exploiting fountain codes for secure wireless delivery","volume":"18","author":"H. Niu","year":"2014","journal-title":"IEEE Communications Letters"},{"issue":"6","key":"15","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1049\/ip-com:20050237","article-title":"Fountain codes","volume":"152","author":"D. J. C. MacKay","year":"2005","journal-title":"IEE Proceedings-Communications"},{"key":"16","first-page":"1","article-title":"An efficient key management scheme in hierarchical wireless sensor networks","author":"X. Zhang","year":"2015"},{"key":"17","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1016\/j.future.2017.10.026","article-title":"EDAK: an efficient dynamic authentication and key management mechanism for heterogeneous WSNs","volume":"92","author":"S. Athmani","year":"2019","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"18","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s11277-018-5471-5","article-title":"Local dynamic key management scheme based on layer-cluster topology in WSN","volume":"103","author":"B. Sun","year":"2018","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"19","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3390\/computers9010004","article-title":"A novel security protocol for wireless sensor networks with cooperative communication","volume":"9","author":"A. Al Hayajneh","year":"2020","journal-title":"Computers"},{"issue":"24","key":"20","doi-asserted-by":"crossref","first-page":"5456","DOI":"10.3390\/s19245456","article-title":"Exploiting opportunistic scheduling schemes and WPT-based multi-hop transmissions to improve physical layer security in wireless sensor networks","volume":"19","author":"K. Shim","year":"2019","journal-title":"Sensors"},{"issue":"1","key":"21","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/TII.2015.2509442","article-title":"Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks","volume":"12","author":"L. Sun","year":"2015","journal-title":"IEEE Transactions on Industrial Informatics"},{"first-page":"1","article-title":"Security enhanced via dynamic fountain code design for wireless delivery","author":"W. Y. Li","key":"22"},{"first-page":"1","article-title":"Secure communication based on fountain code and channel feedback","author":"D. T. Huang","key":"23"},{"issue":"7","key":"24","doi-asserted-by":"crossref","first-page":"7992","DOI":"10.1109\/TVT.2020.2992619","article-title":"Fountain-coding aided secure transmission with delay and content awareness","volume":"69","author":"L. Sun","year":"2020","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"18","key":"25","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.1049\/iet-com.2018.5486","article-title":"Improved online fountain codes","volume":"12","author":"Y. L. Zhao","year":"2018","journal-title":"IET Communications"},{"issue":"9","key":"26","doi-asserted-by":"crossref","first-page":"5313","DOI":"10.1109\/TCOMM.2020.2997400","article-title":"Design and analysis of online fountain codes for intermediate performance","volume":"68","author":"J. X. Huang","year":"2020","journal-title":"IEEE Transactions on Communications"}],"container-title":["Journal of Sensors"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/6106786.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/6106786.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/js\/2022\/6106786.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T04:51:04Z","timestamp":1642135864000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/js\/2022\/6106786\/"}},"subtitle":[],"editor":[{"given":"Kashif","family":"Naseer","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,13]]},"references-count":26,"alternative-id":["6106786","6106786"],"URL":"https:\/\/doi.org\/10.1155\/2022\/6106786","relation":{},"ISSN":["1687-7268","1687-725X"],"issn-type":[{"type":"electronic","value":"1687-7268"},{"type":"print","value":"1687-725X"}],"subject":[],"published":{"date-parts":[[2022,1,13]]}}}