Skip to main content
PLOS One logoLink to PLOS One
. 2022 Nov 7;17(11):e0276940. doi: 10.1371/journal.pone.0276940

Enhancement of the performance of wireless sensor networks using the multihop multiantenna power beacon path selection method in intelligent structures

Ahmed Hammad 1,*, M A Mohamed 1, Heba M Abdel-Atty 2
Editor: Kapil Kumar Nagwanshi3
PMCID: PMC9639829  PMID: 36342904

Abstract

Sensor nodes are the building blocks of wireless sensor networks (WSNs), which may gather, analyze, and transmit various types of information to a certain destination. Data collection and transmission to the destination are the main responsibilities of sensor nodes at specified time intervals. However, one of the biggest issues with WSNs is the creation of energy-efficient wireless network algorithms. In this paper, a multi-hop multi-antenna power beacon path selection (MMPS) protocol is proposed. The proposed approach consists of a source, a destination, relays, power beacons generating radio frequency (RF) signals for energy harvesting, and eavesdroppers. We used physical layer security associated with energy harvesting to protect data from eavesdroppers without requiring higher layer data encryption and enhance the energy consumption of wireless networks. The signal’s broadcast strength must be high enough to allow for energy harvesting while being low enough to prevent eavesdropping. The process continues until the data reaches the destination. Comparing the performance of MMPS with those of conventional methods, MMPS enhanced the wireless network outage probability (OP) up to 99.7%, life time, energy consumption, protection from eavesdroppers, and more resistant to hardware impairments which increased the immunity up to 95%.

Introduction

Several routing strategies have been proposed to save energy and enhance network performance. In this respect, wireless sensor networks (WSNs) have dynamic architectures, making energy-aware routing between wireless sensor nodes one of their main issues. previously [1], some authors proposed a centralized genetic-based clustering (CGC) protocol using a new concept called the onion approach, where cluster heads are elected on the basis of a genetic algorithm with three criteria. Their simulation results proved that the CGC protocol significantly extends network lifetime, decreases network energy consumption, and is capable of considerably enhancing packet delivery and keeping nodes operational for longer times. However, these networks lack a specific infrastructure and are formed in inaccessible areas. Thus, constant control over these networks is not practicable. Consequently, they frequently come under attack. Meanwhile, Hatamian et al. [2] proposed a fuzzy rate controller with a congestion-aware routing technique that prioritizes data packets. On the basis of the data value, they proposed a queuing model for determining packet priority. Fuzzy logic and a greedy method were used to reduce packet loss and average energy consumption in nodes. They also proposed a method for enhancing the time, energy, and packet loss limitations while increasing the system quality of service. In a distributed environment, the latency of more upstream traffic must be tested. For instance, wireless nodes are in charge of gathering physiological data from patients and keeping track of their routine medical examinations. WSNs can also be used for interior monitoring in the business sector [3]. The application of WSNs in the military and medical areas emphasizes the significance of data transmission security in these networks. In WSNs, key management is one of the techniques used to secure information transfer between network components. In a previous study [4], sensor nodes were arranged into a binary tree, and the aggregation requests were validated using a shared key, according to the authors’ discussion of a dependable tree-based data aggregation approach. Only after an acknowledgment does the request become aggregated. Meanwhile, a collaborative signal processing framework gathers data from the monitoring region. Heavy calculation and assessment are required for surveillance systems, which leads to the implementation of realistically feasible solutions. In another study [5], the proposed method’s encryption procedures were built in three phases with three keys that may be changed as needed to increase secrecy and security. In the proposed scheme, the network was split into several zones controlled by area managers, which were stronger nodes with extra processing and memory. The proposed approach had better scalability, flexibility, efficiency, and lower power usage. In Alimoradi et al. [6], zones were used to describe a network. The network was organized into non-overlapping hexagonal zones. There were several sensor nodes in each zone. The two forms of communication defined by the proposed approach were intra-zone and inter-zone communication. The proposed method outperformed comparable protocols in terms of attack resistance, energy usage, alive nodes, and communication overhead. Nilsaz Dezfuli and Barati [7] presented a system where the network region was split into several square grids based on a geographical foundation to increase the lifespan and coverage of WSNs. The sensor node in each grid with the highest energy was chosen as a cluster head. The residual part of the zone may then be determined thereafter. The power used for sensing is generally insignificant when compared with the power used for reporting. Thus, creative energy-efficient reporting systems for WSNs are the focus of most research efforts. In a smart environment, various sensors are used to perform or control processes using various approaches. When Internet of things (IoT) systems and smart environments are combined, smart objects perform much better. For instance, Ghorbani Dehkordi and Barati [8] used two-phase clustering and routing as a solution for the multiobjective problem, but the division of the network environment affected the performance. Intelligent sensors deployed in target places and jointly function as a system called WSNs inspect physically dynamic quantities that are also time-sensitive and delay-tolerant or real-time and non-real-time operations. Because of the power-restricted nature of these nodes, the conventional routing protocol does not take data heterogeneity into account while establishing routing pathways. Instead, it focuses on energy-efficient routing to extend the lifetime of the system [9]. Thus, a framework was created in [10] to operate with several sensor nodes, including border, common, and gateway nodes, which conduct sensing under various workloads. One of the critical elements of the applications of sensors is the energy and power modeling of WSNs, a technique for data gathering and hierarchical network management. Thus, creating an independent and effective network among sensor nodes is crucial to providing long network lifetimes and regulated energy consumption of networks [11].

Motivations and related work

Physical layer security (PLS) [12] has been considered a low-cost alternative to upper-layer encryption for securing data during transmission. Secrecy performance is measured in PLS using secrecy capacity, defined as the variation between the data link channel and eavesdropping link channel capacities. Various algorithms [1315] aimed to optimize the data rate to optimize the effectiveness of secured communication methods for data links. Security improvement strategies in underlay cognitive networks (CNs) have been suggested previously [6, 16]. The transmitters in CNs must alter their broadcast energy to meet interference limits imposed by main users. Cao et al. [17] examined the security and reliability of CNs by determining the intercept probability (IP) during the existence of an external observer and the outage probability (OP) at certified recipients. According to previous studies [18, 19], transmitting wireless sensors on the route path, such as source and relays, could decrease their transmission power to avoid IP at an active eavesdropper. Ayatollahitafti et al. [20] presented chaotic compressive sensing to handle energy efficiency and security challenges simultaneously. Wireless equipment with limited battery power must gather energy from the environment to keep going, which recently popularized energy harvesting (EH) from radio frequency (RF) in mobile ad-hoc networks [21], cognitive radio ad-hoc networks [22], and WSNs [23]. This is why noninfrastructure networks [24] have received a lot of attention as an effective approach for energy-constrained wireless networks. The EH from RF approach enables nodes to harvest their energies from RF signals. In this regard, several authors suggested secure communication algorithms using RF and EH methods in [25, 26]. The secrecy OP of simultaneous wireless communication and power transmission network comprising one base station, one required data receiver, multiple main subscribers, and several EH receivers in UCR platforms was explored in [26]. Meanwhile, Hieu et al. [27] generated formulations of OP for the proposed methods over the Rayleigh fading channel by considering that EH receivers might function as eavesdroppers. They presented the shortest path selection (SPS) protocol, random path selection (RPS) protocol, and best path selection (BPS) protocol as three unique path selection techniques, but their method has only one beacon. A rechargeable helpful jammer with a rechargeable supply was used to prevent eavesdropping in [28]. Other previous studies [2931] presented various viable receiver architectures for simultaneous wireless information and power transfer. In [32], cooperative communication algorithms were used to minimize error rates, enhance system coverage, and improve network lifetime. Other authors investigated the wireless system performance of underlay multihop cognitive radio networks in [33, 34], where secondary users harvest energy from a beacon or a main transmitter. Previously, practically most published works considered wireless equipment hardware transceivers as ideal. However, frequency noises, amplifier amplitude nonlinearity, and I/Q imbalance were common problems in low-cost wireless nodes’ physical transceivers that decrease the performance of wireless networks [3537]. Power beacons (PBs), depending on the time switching model, were described in [38] for attaining great energy consumption and increasing the range of wireless transmission in large-scale wireless communication networks. PBs were incorporated or deployed separately from the base station [39]. In [40], the main network used several primary transmitters that acted as PBs to power the secondary network’s source and relay. The EH CNs throughput performance and OP were examined and evaluated. The big modeling approach with some primary transmitters expanding to infinity was also addressed. Many investigators have lately focused on multi-hop cooperative relays to enhance network performance and increase radio coverage (e.g., [4143]). Compared with conventional method connection, the transmitter in multi-hop networks reduces energy consumption for data transfer. Consequently, it may be found in various applications in the real world, such as WSNs, cellular networks, IoT, vehicle or people roadside, and tracking services [4446].

Problem definition and contributions

According to the above literature, effective energy use with secure routing is a significant area of study interest. However, most current solutions cannot modify routing performance in response to the changing environment and constrained WSN capabilities. Furthermore, contemporary work cannot choose the next hop based on the best choice, and such methods affect the performance of routing across the whole network. Additionally, routing pathways are frequently reorganized during data relay, adding redundancy in terms of both time and communication costs. The continuous transmission of routing and management messages in the setup phase is the cause of this overhead. Consequently, investigating the field of energy efficiency with a lightweight solution to extend the lifetime of the network is necessary. All of the cited previous studies provided helpful information on the performance of EH regarding PLS, allowing system designers to make more precise recommendations. However, most of them focused on dual-hop relaying systems rather than multi-hop relaying systems. Thus, we presented one novel protocol to improve the outage performance for multi-hop multi-path decode-and-forward ultra-dense networks. There are numerous pathways between a secondary source and a secondary destination in the proposed method. One of these is chosen to transmit the source information to the receiver [36]. For packet forwarding, the source and relays on the selected channel must gather energy from the environment beacon RF waves [47, 48]. These transmitting wireless sensors must alter their signal strength in eavesdropper (V) presence to fulfill an interference limitation.

We therefore propose a multi-hop multi-antenna PB path selection (MMPS) approach to increase the e2e simultaneous channel capacity. We provide accurate and asymptotic closed-form formulations of e2e OP for the proposed scheme over the Rayleigh fading channel to measure performance. Simulations using the Monte Carlo approach are then used to confirm our conclusions.

The following are the significant contributions of this paper:

  • The MMPS approach, which picks the path with the maximum end-to-end channel capacity, is proposed as a path selection method using an H number of beacons to achieve the best outage performance.

  • We investigate a real-world WSN application where all hardware transmitters and receivers suffer from limitations.

  • The source and relay nodes use the RF method to avoid eavesdroppers from aggregating source-collected data across several hops. Furthermore, by adjusting their transmitter power, these approved transmitters can restrict the channel capacity gained on the eavesdropping lines.

  • We use a non-cooperative eavesdropping scenario, where eavesdroppers work individually.

  • Over a Rayleigh fading channel, we construct closed-form equations for OP. The results of Monte Carlo simulations are provided to confirm our conclusions.

The following is an overview of the paper’s structure. The system model utilized in this work is described in Section IV. Section V provides an overview of three traditional protocols. Section VI contains the proposed protocol. Section VII presents the performance evaluation and the simulation outcomes. Finally, section VIII concludes the article.

System model

In Fig 1, the proposed protocol is expressed by a system model, where S is the source connected with the destination D in a multi-hop approach. Further, there are N possible pathways between S and D, but just one is chosen to serve the communication between them.

Fig 1. System model of PB-assisted relaying protocols with relay selection methods.

Fig 1

Let us call the count of relays Yk (denoted by Rk,1,Rk,2,...,Rk,Yk) on the kth path, where k = 1, 2, …, N and Yk ≥ 1. Furthermore, active V eavesdroppers are denoted by V1, V2, …, Vu attempting to eavesdrop on the data sent by the source and wireless relay nodes. The RF approach in [49] is used at each hop on the specified path to stop eavesdroppers from using a maximum ratio combiner to integrate the incoming data. We assume that S and the relays, as well as all transmitters, are power-limited. Thus, they must collect the network beacon’s RF energy (identified by PB1, PB2,…, PBH) for data transfer. All the connections are also expected to be low-cost wireless sensor nodes with one antenna operating in half-duplex mode. Consequently, data are sent over orthogonal periods using time division multiple access. Suppose that the transmission of data is divided into orthogonal time slots and that the kth route is chosen. Specifically, in the (i + 1)th time slot, the relay Rk,i sends the Z data from the source to the relay Rk,i+1, where i = 0, 1, 2, …, Yk.

We should add that Rk,0S and Rk,Yk+1D for all k. Because there are problems with the hardware, the received signal of the broadcast Rk,iRk,i+1 and Rk,iVu can be respectively described in the following ways:

yRk,i,Rk,i+1=PRk,ihRk,iRk,i+1(Z+ηRk,iRk,i+1)+μRk,iRk,i+1+νRk,iRk,i+1, (1)
yRk,iVu=PRk,ihRk,iVu(Z+ηRk,iVu)+μRk,iVu+νRk,iVu, (2)

where PRk,i represents the transmitter’s transmission power Rk,i,hAB is the coefficient of transmission channel from A to B link, where A, B ∈ {Rk,i, Rk,i+1, Vu}, ηAB and μAB represent the noise made by hardware malfunctions at the transmitter A and receiver B, respectively, and νAB are Additive White Gaussian noises represented as random Gaussian variables with variance N0 and zero mean.

Assuming the Rayleigh fading channel and the channel gain as γAB = |hAB|2, where γAB is an exponential random variable, the cumulative distribution function (CDF) and probability density function (PDF) are given, respectively, as

FγAB(x)=1-exp((-λAB)x), (3)
fγAB(x)=λABexp((-λAB)x), (4)

where λAB is γAB a parameter and equal to 1/ε{γAB} and an predicted operator is ε{.}. is formulated as in [50] to calculate the path loss:

λAB=dABβ, (5)

where dAB is the distance between A and B,where the path loss scale β is (2 ≥ β ≤ 6) as in [35, 51, 52]. The distortion noises can be represented by ηAB and μAB, as a complex with a circular symmetry Zero-mean and variance Gaussian distribution (σABt)2PA, and (σABr)2PAγAB.

All nodes are considered to have used the same design, with the same rates of hardware limitations (i.e., (σABt)2=σa2,σABr=σb2.

Consequently, the instantaneous signal-to-noise ratio (SNR) of Rk,iRk,i+1 and Rk,iVu able to implement this links is

SNRRk,iRk,i+1=PRk,iγRk,iRk,i+1κPRk,iγRk,iRk,i+1+N0, (6)
SNRRk,iVu=PRk,iγRk,iVuκPRk,iγRk,iVu+N0, (7)

where k=σa2+σb2.

We assumed D as a block duration and the (i + 1)th data transmission time slot for the kth path with time duration τk = D/(Yk + 1). Time switching was used in this time slot, where the relay Rk,i harvested its energy from beacon PB at the time ατk, where α ∈ (0 < α < 1) as shown in [33]. The energy harvested by Rk,i can be formulated as

EHRk,i=ηατkPh=1HγRk,i,PBh, (8)

where η represents the EH efficiency 0 < η < 1, P is the transmission power of PB, and γPBRk,i describes the channel gain of the PBRk,i channel. We additionally supposed that the connection between PB and γPBRk,i is a Rayleigh fading channel, and the PDF and CDF of γPBRk,i were formulated as in (3) and (4).

The data were sent using the time duration (1 − α)τk; thus, the power transmitted by the relay Rk,i was formulated from energy conservation as

PRk,imaxEHRk,i(1-α)τkZPBRk,i, (9)

where ZPBRk,i=zPh=1HγRk,i,PBh with z = ηα/(1 − α). The frequency ranges utilized for data transmission and EH were diverse to minimize interference. Furthermore, at each time slot, all of the nodes spent the same amount of time ατk harvesting energy before using it to transmit data.

Assuming the transmitter Rk,i can get the eavesdropping channel state information (CSI) of connections Rk,iVu because the eavesdroppers are active, it can decrease the quality of these links by adjusting the transmission power. Let us call PRk,iV the transmit power of Rk,i, which is modified to account for eavesdropping CSIs. The capacity of the channel between Rk,i and Vu is determined as follows:

CRk,iVu=(1-α)τklog2(1+PRk,iVγRk,iVukPRk,iVγRk,iVu+N0), (10)

Assuming that the eavesdroppers work individually, the channel capacity of the finest eavesdropper is used to calculate the eavesdropping information bit rate at the kth time slot (see [53])

CRk,iVutot=maxu=1,2,...,U(CRk,iVu), (11)
CRk,iVutot=(1-α)τklog2(1+PRk,iVφRk,imaxkPRk,iVφRk,imax+N0), (12)

where

φRk,imax=maxu=1,2,...,U(γRk,iVu), (13)

The probability of an outage (OP) is the foundation of the maximum throughput received at the receiver side and is less than the desired rate (as indicated by Cth).

We already have a set of criteria to prevent eavesdroppers from successfully decoding:

CRk,iVutotCth, (14)
PRk,iVρkN0φRk,imax(1-κρk),(κ<1/ρk) (15)

where

ρk=2cth/(1+α)τk-1, (16)

The max transmitting power of the relay Rk,i can be formulated as (see (9) and (15))

PRk,imax={ZPBRk,iifκ1/ρk.min(ZPBRk,i,ρkN0φRk,imax(1-κρk)),otherwise. (17)

Consequently,the link Rk,iRk,i+1 channel capacity can be formulated as

CRk,iRk,i+1={(1-α)τklog(1+Δ1,k,iκΔ1,k,i+N0)ifκ>1/ρk.(1-α)τklog(1+Δ2,k,iκΔ2,k,i+N0),otherwise. (18)

where

Δ1,k,i=ZPBRk,iγRk,iRk,i+1, (19)
Δ2,k,i=min(ZPBRk,i,ρkN0φRk,imax(1-κρk)), (20)

Thereafter, we can formulate the e2e channel capacity of the kth path as

Cke2e=mini=1,2,...,Yk+1(CRk,iRk,i+1), (21)

Traditional protocols

This section describes three multihop harvest-to-transmit WSNs with path selection methods. Hieu et al. [27] proposed three novel route selection techniques, namely, the SPS, RPS, and BPS protocols, to examine the effect of EH and hardware cognitive problems on the effectiveness of cooperative multihop WSNs during outages. They used a method to harvest energy similar to that in [33]. As a result, BPS is more resistant to hardware failure than RPS and SPS, and it can overcome the Rayleigh block fading on devices with poor hardware quality. The source randomly chooses one of the possible pathways in the first protocol, known as RPS, to send data to the destination. The e2e OP in this protocol may be expressed as

OPRPS=1/Nk=1NPr(Cae2e<Cth), (22)

where (a)∈{1, 2, …, N}

Although the RPS method is straightforward to construct, it may not give good outage performance because of the random selection. Because of the delay limitation, minimizing the number of hops on the chosen route enhances the e2e data rate. Thus, we suggest the SPS protocol as the second protocol. The SPS technique selects the route with the fewest hops number. Thus, the protocol’s e2e OP is written as

OPSPS=Pr(Cbe2e<Cth), (23)

where (b)∈{1, 2, …, N}

Finally, BPS selects the way that offers the most end-to-end channel capacity to maximize system performance. Mathematically, the OP of this protocol can be written as

OPBPS=Pr(Cce2e<Cth), (24)

where (c)∈{1, 2, …, N}

The e2e channel capacity of the kth path is formulated as follows:

Cke2e={(1-α)τklog2(1+mini=1,2,...,Yk+1Δ1,k,iκΔ1,k,i+N0)ifκ>1/ρk.(1-α)τklog2(1+mini=1,2,...,Yk+1Δ2,k,iκΔ2,k,i+N0),otherwise. (25)

Proposed MMPS protocol

We propose a new path selection method for intelligent structures based on the EH technique to extend the lifetime of the network and for suitability for WSNs or ad-hoc networks. The flowchart of the proposed protocol scheme is shown in Fig 2.

Fig 2. The flow chart for the data transmission of (MMPS) scheme.

Fig 2

First, we evaluated the performance of MMPS, and the path with the maximum e2e channel capacity was picked. Second, we used the SNR to calculate the e2e OP and generate a throughput expression.

Cqe2e=maxm=1,2,...,N(Cke2e), (26)

where (q)∈{1, 2, …, N}, and the e2e OP for MMPS can be formulated as

OPMMe2e=Pr(Cqe2e<Cth)=k=1NPr(Cke2e<Cth), (27)
Pr(Cqe2e<Cth)={Pr(mini=1,2,...,Yk+1log2(Δ1,q,iκΔ1,q,i+N0)<ρq)ifκ1/ρk.Pr(mini=1,2,...,Yk+1log2(Δ2,q,iκΔ2,q,i+N0)<ρq)otherwise (28)

where OPMMe2e is expressed from OP at the most direct route, and the exact form of OP can be given as

OP={Pr(Δ1,a,iκΔ1,a,i+N0)<ρa)ifκ1/ρa.Pr(Δ2,a,iκΔ2,a,i+N0)<ρa)otherwise (29)

Performance evaluation

We used Monte Carlo simulations in this part to evaluate the theoretical formulas and compare our results with SPS, RPS, and BPS [27]. A matrix research facility was used to generate the simulation outcomes (MATLAB R2020a). We executed separate trials to get the e2e OP for the MMPS protocol compared with the other described protocols. In each session, we built Rayleigh channel coefficients for every link. Table 1 shows a two-dimensional grid where each coordinate is displayed. We used markers, solid lines, and dashed lines for all scenarios to represent simulation outcomes, precise theoretical results, and asymptotic theoretical findings, respectively.

Table 1. Coordinates of network component.

Component Coordinates
Source S → (0, 0)
Relays R(iYK+1,0)
Destination D → (1, 0)
Beacon PB → (xPB, yPB)
Eavesdroppers V → (xV, yV)

As shown in Fig 3, we studied the effect of beacon P’s transmission power (dB) on the magnitude of OP in the scenario when the eavesdroppers work individually by setting the components as shown in Table 2. As shown, there is an inverse relationship between the power of the beacon and OP, and the theoretical and simulation findings agree well. When P (dB) is low, for example, when the power in the figure is equal to −5 dB, we can detect that OP approaches 1; when the power of the beacon grows, the OP numbers decline. Thus, boosting the transmission power can help protect the physical layer versus eavesdropping assaults. In addition, when comparing the three traditional protocols, the BPS protocol clearly gets the highest OP. However, when we used the proposed MMPS protocol and added more PBs to the network by setting H = 2, the MMPS protocol very clearly achieves the highest OP among RPS, SPS and BPS protocols by 99.6%, 99.7% and 49.3% respectively. Furthermore, raising the transmission power of the proposed method can improve its outage performance.

Fig 3. OP as a function of transmitting power P in (db).

Fig 3

Table 2. Simulation conditions for each figure.

Component Fig 3 Fig 4 Fig 5 Fig 6 Fig 7
Y [2, 3, 4] [2, 3, 4] [2, 3, 4] [2, 3, 4] [2, 3, 4]
R 0.5 0.5 0.5 0.5 0.5
u 2 2 2 2 2
(xPB, yPB) (0.5,0.1) (0.5,0.1) (—,0.1) (0.5,0.1) (0.5,0.1)
(xV, yV) (0.5,1) (0.5,1) (0.5,1) (0.5,—) (0.5,1)
η 0.1 0.1 0.1 0.1 0.1
α 0.1 0.1 0.1 0.1 -
H 2 4 4 4 4
κ 0.1 - 0.1 0.1 0.1

The mark (—) means that a certain component is variable.

Fig 4 shows the scenarios where eavesdroppers do not cooperate with the OP as a function of the number of impairments at two distinct broadcast powers of beacon P = 15 dB and the wireless network is adjusted by the components shown in Table 2. The OP numbers of MMPS, BPS, RPS, and SPS rose as κ grew, as can be seen in this graph. The MMPS still beat RPS, SPS, and BPS at all curve points. Furthermore, in high areas, the OP of all algorithms converged toward 1, specifically at κ ≥ 0.55, which is consistent with the preceding section’s findings. The figure also illustrates that the MMPS algorithm is much more resistant to hardware failure than RPS, SPS, and BPS by 99.5%, 99.6%, 87.7% respectively, allowing it to function efficiently on devices with poor hardware quality.

Fig 4. OP as a function of κ.

Fig 4

The probability of an outage is presented as a function of xPB in Fig 5 upon simulation by the components shown in Table 2. Apparently, when xPB grows to around 0.4, the outage performances of the proposed algorithms improve until they reach an optimal value, beyond which they fall. Using this model, we can identify the location of the beacon where the OP achieves the ideal value. That is, once xPB is around 0.4, the OP of MMPS is minimized; when it is about 0.3 or 0.35, the OP values of RPS, SPS, and BPS are minimized.

Fig 5. OP as a function of xPB.

Fig 5

In Fig 6, we investigated the impact of yV on OP upon simulation by the components shown Table 2 and set xPB = 0.4 as the optimal value. As can be observed from the figure, OP rises when the eavesdroppers move far from the data path. Thus, when yV = 0, OP has the worst effects as the connection between Vu and S or Rk,i is the smallest.

Fig 6. OP as a function of yV.

Fig 6

In Fig 7, using the simulation components shown in Table 2 the OP is shown as a function of the EH ratio α when the eavesdroppers work individually. Because it affects the received power at the ideal relay path and the transmission power of the source and relay nodes, as shown in the figure, the EH ratio α is significant in this situation. These graphs show the ideal value during which the OP can be decreased. Accordingly, the more energy that can be extracted from the beacon, the higher the value of α. Consequently, relay nodes can utilize more energy to transmit data from S to D. The higher the value of α, the less the amount of time necessary for communication (1 − α)τk between SR or RR. Thus, we can get the optimum outage performance when α reaches its optimal value. For example, the best value for MMPS equals 0.3, as shown in Fig 7.

Fig 7. OP as a function of α.

Fig 7

Conclusion

We examined the effects of hardware limitations besides EH on the throughput performance of multi-hop multi-path collaborative WSNs by presenting a unique path selection approach called the MMPS. Furthermore, we computed the proposed protocol’s OP accurately and asymptotically in the context of several beacons, several eavesdropping assaults, and Rayleigh block fading, where the source S and wireless relay sensors can collect the beacon’s RF signals. The considered EH and hardware limitation system performed securely according to simulation findings. MMPS was resistant to hardware issues, allowing it to work better with devices with poor hardware quality. Finally, the performance may be enhanced by positioning the beacon in the proper location and selecting an appropriate EH ratio α.

Supporting information

S1 File

(DOCX)

Data Availability

All relevant data are within the paper and its Supporting information files.

Funding Statement

The author(s) received no specific funding for this work.

References

  • 1. Hatamian M, Barati H, Movaghar A, Naghizadeh A. CGC: centralized genetic-based clustering protocol for wireless sensor networks using onion approach. Telecommun Syst. 2016;62: 657–674. doi: 10.1007/s11235-015-0102-x [DOI] [Google Scholar]
  • 2. Hatamian M, Almasi Bardmil M, Asadboland M, Hatamian M, Barati H. Congestion-Aware Routing and Fuzzy-based Rate Controller for Wireless Sensor Networks. Radioengineering. 2016;25: 114–123. doi: 10.13164/re.2016.0114 [DOI] [Google Scholar]
  • 3. Hamid Barati, Ali Movaghar, Ali Barati,Arash azizi mazreah. A review of coverage and routing for wireless sensor networks. International Journal of Electronics and Communication Engineering. 2008;2: 67–73. [Google Scholar]
  • 4. Hasheminejad E, Barati H. A reliable tree-based data aggregation method in wireless sensor networks. Peer Peer Netw Appl. 2021;14: 873–887. doi: 10.1007/s12083-020-01025-x [DOI] [Google Scholar]
  • 5. Havashemi rezaeipour K, Barati H. A hierarchical key management method for wireless sensor networks. Microprocess Microsyst. 2022;90: 104489. doi: 10.1016/j.micpro.2022.104489 [DOI] [Google Scholar]
  • 6. Alimoradi P, Barati A, Barati H. A hierarchical key management and authentication method for wireless sensor networks. International Journal of Communication Systems. 2022;35. doi: 10.1002/dac.5076 [DOI] [Google Scholar]
  • 7. Nilsaz Dezfuli N, Barati H. Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks. IET Communications. 2019;13: 578–584. doi: 10.1049/iet-com.2018.5329 [DOI] [Google Scholar]
  • 8. Ghorbani Dehkordi E, Barati H. Cluster based routing method using mobile sinks in wireless sensor network. International Journal of Electronics. 2022; 1–13. doi: 10.1080/00207217.2021.2025451 [DOI] [Google Scholar]
  • 9. Hajipour Z, Barati H. EELRP: energy efficient layered routing protocol in wireless sensor networks. Computing. 2021;103: 2789–2809. doi: 10.1007/s00607-021-00996-w [DOI] [Google Scholar]
  • 10. Sharifi SS, Barati H. A method for routing and data aggregating in cluster‐based wireless sensor networks. International Journal of Communication Systems. 2021;34. doi: 10.1002/dac.4754 [DOI] [Google Scholar]
  • 11. Nilsaz Dezfouli N, Barati H. A distributed energy-efficient approach for hole repair in wireless sensor networks. Wireless Networks. 2020;26: 1839–1855. doi: 10.1007/s11276-018-1867-0 [DOI] [Google Scholar]
  • 12. Zhu F, Yao M. Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming. IEEE Trans Veh Technol. 2016;65: 1835–1841. doi: 10.1109/TVT.2015.2412152 [DOI] [Google Scholar]
  • 13. Luo J, Hu J, Wu D, Li R. Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks. IEEE Trans Industr Inform. 2015;11: 112–121. doi: 10.1109/TII.2014.2374071 [DOI] [Google Scholar]
  • 14. Khan A, Khan M, Ahmed S, Abd Rahman MA, Khan M. Energy harvesting based routing protocol for underwater sensor networks. PLoS One. 2019;14: e0219459. doi: 10.1371/journal.pone.0219459 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 15. Zhang T, Cai Y, Huang Y, Duong TQ, Yang W. Secure Full-Duplex Spectrum-Sharing Wiretap Networks with Different Antenna Reception Schemes. IEEE Transactions on Communications. 2016; 1–1. doi: 10.1109/TCOMM.2016.2625257 [DOI] [Google Scholar]
  • 16. Cao Z, Ji X, Wang J, Zhang S, Ji Y, Wang J. Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks. IEEE Trans Wirel Commun. 2019;18: 6030–6042. doi: 10.1109/TWC.2019.2941944 [DOI] [Google Scholar]
  • 17. Adnan AI, Hanapi ZM, Othman M, Zukarnain ZA. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks. PLoS One. 2017;12: e0170273. doi: 10.1371/journal.pone.0170273 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 18. Tran Tin P, The Hung D, Nguyen T, Duy T, Voznak M. Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-Hop Transmission with and without Presence of Hardware Impairments. Entropy. 2019;21: 217. doi: 10.3390/e21020217 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 19. Dinh Tran H, Trung Tran D, Choi SG. Secrecy performance of a generalized partial relay selection protocol in underlay cognitive networks. International Journal of Communication Systems. 2018;31: e3806. doi: 10.1002/dac.3806 [DOI] [Google Scholar]
  • 20. Ayatollahitafti V, Ngadi MA, Mohamad Sharif J bin, Abdullahi M. An Efficient Next Hop Selection Algorithm for Multi-Hop Body Area Networks. PLoS One. 2016;11: e0146464. doi: 10.1371/journal.pone.0146464 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 21. Bhardwaj A, El-Ocla H. Multipath Routing Protocol Using Genetic Algorithm in Mobile Ad Hoc Networks. IEEE Access. 2020;8: 177534–177548. doi: 10.1109/ACCESS.2020.3027043 [DOI] [Google Scholar]
  • 22. Wang D, Song Y. ECCO: A Novel End-to-End Congestion Control Scheme in Multi-Hop Cognitive Radio Ad Hoc Networks. IEEE Trans Cogn Commun Netw. 2019;5: 93–102. doi: 10.1109/TCCN.2018.2889337 [DOI] [Google Scholar]
  • 23. Hao S, Hong Y, He Y. An Energy-Efficient Routing Algorithm Based on Greedy Strategy for Energy Harvesting Wireless Sensor Networks. Sensors. 2022;22: 1645. doi: 10.3390/s22041645 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 24. Lu X, Wang P, Niyato D, Kim DI, Han Z. Wireless networks with rf energy harvesting: A contemporary survey. IEEE Communications Surveys and Tutorials. 2015;17: 757–789. doi: 10.1109/COMST.2014.2368999 [DOI] [Google Scholar]
  • 25. Singh A, Bhatnagar MR, Mallik RK. Secrecy Outage Performance of SWIPT Cognitive Radio Network With Imperfect CSI. IEEE Access. 2020;8: 3911–3919. doi: 10.1109/ACCESS.2019.2962382 [DOI] [Google Scholar]
  • 26. Singh A, Bhatnagar MR, Mallik RK. Secrecy Outage of a Simultaneous Wireless Information and Power Transfer Cognitive Radio System. IEEE Wireless Communications Letters. 2016;5: 288–291. doi: 10.1109/LWC.2016.2544828 [DOI] [Google Scholar]
  • 27. Hieu TD, Duy TT, Kim B-S. Performance Enhancement for Multihop Harvest-to-Transmit WSNs With Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises. IEEE Sens J. 2018;18: 5173–5186. doi: 10.1109/JSEN.2018.2829145 [DOI] [Google Scholar]
  • 28. el Shafie A, Niyato D, Al-Dhahir N. Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks. IEEE Wireless Communications Letters. 2016;5: 384–387. doi: 10.1109/LWC.2016.2565466 [DOI] [Google Scholar]
  • 29. Wu F, Xiao L, Yang D, Cuthbert L, Liu X. Simultaneous Wireless Information and Power Transfer Mechanism in Interference Alignment Relay Networks. Mobile Information Systems. 2016;2016: 1–9. doi: 10.1155/2016/1685054 [DOI] [Google Scholar]
  • 30. Zhang R, Ho CK. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer. IEEE Trans Wirel Commun. 2013;12: 1989–2001. doi: 10.1109/TWC.2013.031813.120224 [DOI] [Google Scholar]
  • 31. Huang G, Tu W. On Opportunistic Energy Harvesting and Information Relaying in Wireless-Powered Communication Networks. IEEE Access. 2018;6: 55220–55233. doi: 10.1109/ACCESS.2018.2872757 [DOI] [Google Scholar]
  • 32. Mansourkiaie F, Ahmed MH. Cooperative routing in wireless networks: A comprehensive survey. IEEE Communications Surveys and Tutorials. 2015;17: 604–626. doi: 10.1109/COMST.2014.2386799 [DOI] [Google Scholar]
  • 33. Xu C, Zheng M, Liang W, Yu H, Liang Y-C. Outage Performance of Underlay Multihop Cognitive Relay Networks With Energy Harvesting. IEEE Communications Letters. 2016;20: 1148–1151. doi: 10.1109/LCOMM.2016.2547985 [DOI] [Google Scholar]
  • 34. Xu C, Zheng M, Liang W, Yu H, Liang Y-C. End-to-End Throughput Maximization for Underlay Multi-Hop Cognitive Radio Networks With RF Energy Harvesting. IEEE Trans Wirel Commun. 2017;16: 3561–3572. doi: 10.1109/TWC.2017.2684125 [DOI] [Google Scholar]
  • 35. Duy TT, Duong TQ, da Costa DB, Bao VNQ, Elkashlan M. Proactive Relay Selection With Joint Impact of Hardware Impairment and Co-Channel Interference. IEEE Transactions on Communications. 2015;63: 1594–1606. doi: 10.1109/TCOMM.2015.2396517 [DOI] [Google Scholar]
  • 36. Solanki S, Singh V, Upadhyay PK. RF Energy Harvesting in Hybrid Two-Way Relaying Systems With Hardware Impairments. IEEE Trans Veh Technol. 2019;68: 11792–11805. doi: 10.1109/TVT.2019.2944248 [DOI] [Google Scholar]
  • 37. Sharma PK, Upadhyay PK. Cognitive Relaying With Transceiver Hardware Impairments Under Interference Constraints. IEEE Communications Letters. 2016;20: 820–823. doi: 10.1109/LCOMM.2016.2533500 [DOI] [Google Scholar]
  • 38. Zhong C, Chen X, Zhang Z, Karagiannidis GK. Wireless-Powered Communications: Performance Analysis and Optimization. IEEE Transactions on Communications. 2015;63: 5178–5190. doi: 10.1109/TCOMM.2015.2488640 [DOI] [Google Scholar]
  • 39. Xia M, Aissa S. On the Efficiency of Far-Field Wireless Power Transfer. IEEE Transactions on Signal Processing. 2015;63: 2835–2847. doi: 10.1109/TSP.2015.2417497 [DOI] [Google Scholar]
  • 40. Amodu OA, Othman M, Noordin NK, Ahmad I. Outage Minimization of Energy Harvesting-Based Relay-Assisted Random Underlay Cognitive Radio Networks With Interference Cancellation. IEEE Access. 2021;9: 109432–109446. doi: 10.1109/ACCESS.2021.3101047 [DOI] [Google Scholar]
  • 41. Ogundile O, Alfa A. A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks. Sensors. 2017;17: 1084. doi: 10.3390/s17051084 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 42.Sun H, Naraghi-Pour M, Sheng W, Zhang R. Outage Analysis of Hop-by-Hop Relay Selection in Multi-Hop Cognitive Relay Networks. ICC 2020—2020 IEEE International Conference on Communications (ICC). IEEE; 2020. pp. 1–6.
  • 43. Onwuegbuzie IU, Razak SA, Isnin IF, Al-dhaqm A, Anuar NB. Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks. PLoS One. 2022;17: e0264683. doi: 10.1371/journal.pone.0264683 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 44. Rabby MKM, Alam MS, Shawkat MSA. A priority based energy harvesting scheme for charging embedded sensor nodes in wireless body area networks. PLoS One. 2019;14: e0214716. doi: 10.1371/journal.pone.0214716 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 45. Elaraby S, Soliman HY, Abdel-Atty HM, Mohamed MA. Joint 2D-DOA and Carrier Frequency Estimation Technique Using Nonlinear Kalman Filters for Cognitive Radio. IEEE Access. 2017;5: 25097–25109. doi: 10.1109/ACCESS.2017.2768221 [DOI] [Google Scholar]
  • 46.Selim M, Kamal A, Elsayed K, Abd-El-Atty H, Alnuem M. A novel approach for back-haul Self Healing in 4G/5G HetNets. 2015 IEEE International Conference on Communications (ICC). IEEE; 2015. pp. 3927–3932.
  • 47. Bhatnagar MR, Mallik RK, Tirkkonen O. Performance Evaluation of Best-Path Selection in a Multihop Decode-and-Forward Cooperative System. IEEE Trans Veh Technol. 2016;65: 2722–2728. doi: 10.1109/TVT.2015.2419451 [DOI] [Google Scholar]
  • 48.Van NT, Duy TT, Hanh T, Vo Nguyen Quoc Bao. Outage analysis of energy-harvesting based multihop cognitive relay networks with multiple primary receivers and multiple power beacons. 2017 International Symposium on Antennas and Propagation (ISAP). IEEE; 2017. pp. 1–2.
  • 49. Jianhua Mo, Meixia Tao, Yuan Liu. Relay Placement for Physical Layer Security: A Secure Connection Perspective. IEEE Communications Letters. 2012;16: 878–881. doi: 10.1109/LCOMM.2012.042312.120582 [DOI] [Google Scholar]
  • 50. Laneman JN, Tse DNC, Wornell GW. Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior. IEEE Trans Inf Theory. 2004;50: 3062–3080. doi: 10.1109/TIT.2004.838089 [DOI] [Google Scholar]
  • 51. Matthaiou M, Papadogiannis A, Bjornson E, Debbah M. Two-Way Relaying Under the Presence of Relay Transceiver Hardware Impairments. IEEE Communications Letters. 2013;17: 1136–1139. doi: 10.1109/LCOMM.2013.042313.130191 [DOI] [Google Scholar]
  • 52. Bjornson E, Matthaiou M, Debbah M. A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments. IEEE Transactions on Communications. 2013;61: 4512–4525. doi: 10.1109/TCOMM.2013.100913.130282 [DOI] [Google Scholar]
  • 53. Ding X, Song T, Zou Y, Chen X. Security-Reliability Tradeoff for Friendly Jammer Assisted User-Pair Selection in the Face of Multiple Eavesdroppers. IEEE Access. 2016;4: 8386–8393. doi: 10.1109/ACCESS.2016.2607783 [DOI] [Google Scholar]

Decision Letter 0

Kapil Kumar Nagwanshi

31 Aug 2022

PONE-D-22-22300Enhance the Performance of Wireless Sensor Networks by Using Multi-hop Multi-antenna Power Beacons Path Selection Method in Intelligent StructuresPLOS ONE

Dear Dr. Hammad,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Oct 15 2022 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Kapil Kumar Nagwanshi, PhD

Academic Editor

PLOS ONE

[Note: HTML markup is below. Please do not edit.]

Journal requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please update your submission to use the PLOS LaTeX template. The template and more information on our requirements for LaTeX submissions can be found at http://journals.plos.org/plosone/s/latex.

3. We note that you have stated that you will provide repository information for your data at acceptance. Should your manuscript be accepted for publication, we will hold it until you provide the relevant accession numbers or DOIs necessary to access your data. If you wish to make changes to your Data Availability statement, please describe these changes in your cover letter and we will update your Data Availability statement to reflect the information you provide.

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: N/A

Reviewer #2: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: This paper studied the "Enhance the Performance of Wireless Sensor Networks by Using Multi-hop Multi-antenna Power Beacons Path Selection Method in Intelligent Structures". The quality should be improved. Major revision should be done for this version of the paper as follows:

* The abstract should be rewritten. The results should be briefly stated in the abstract.

* The keyword should be written.

* The motive of the proposed method is not clear. The motivation of the proposed method should be stated in the introduction.

* Related work has not been written. In the RELATED WORK section should focus more on differences between this paper and other works to highlight the novelty of this paper. Also the disadvantages and shortcomings of the previous methods that are addressed in the proposed method must be stated.

*More achievements on this topic should be added for the Section "introductions" and "Related work" . * The cost analysis of the algorithms should be added.

* Some references are missed. At the same time, many important recent references are missing, which can support the idea of this paper, the following references should be added in the Section "References":

1- (2016). CGC: centralized genetic-based clustering protocol for wireless sensor networks using onion approach. Telecommunication systems, 62(4), 657-674.

2- (2016). Congestion-aware routing and fuzzy-based rate controller for wireless sensor networks. Radioengineering, 25(1), 114-123.

3- (2021). A reliable tree-based data aggregation method in wireless sensor networks. Peer-to-Peer Networking and Applications, 14(2), 873-887.

4- (2022). A hierarchical key management method for wireless sensor networks. Microprocessors and Microsystems, 90, 104489.

5- 2022). A hierarchical key management and authentication method for wireless sensor networks. International Journal of Communication Systems, 35(6), e5076.

6- (2019). Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks. IET Communications, 13(5), 578-584.

7- (2008). A review of coverage and routing for wireless sensor networks. International Journal of Electronics and Communication Engineering, 2(1), 67-73.

8- (2022). Cluster based routing method using mobile sinks in wireless sensor network. International Journal of Electronics, 1-13.

9-(2021). EELRP: energy efficient layered routing protocol in wireless sensor networks. Computing, 103(12), 2789-2809.

10-(2021). A method for routing and data aggregating in cluster‐based wireless sensor networks. International Journal of Communication Systems, 34(7), e4754.

11- (2020). A distributed energy-efficient approach for hole repair in wireless sensor networks. Wireless Networks, 26(3), 1839-1855.

* In the Performance Evaluation section, specify what methods are compared with the proposed method.

* Mathematics modelling to analyze the method is not enough. The relative key equations should be embedded into the algorithms.

* The parameter of each equation must be described after using it. The parameters of some equations are not described.

Reviewer #2: 1. Page 1- Abstract. What is equipment malfunction? Please elaborate.

2. Page 3- Significant Contributions. Authors are required to provide a brief summary of the stated contribution: “Using not cooperate eavesdropping scenario”.

3. Page 1- Abstract. The proposed protocol improves the protection for multi-hop uncooperative wireless sensor networks. Authors need to provide an explanation for the “uncooperative wireless sensor networks”. What is the significance of multi-hop uncooperative wireless sensor networks in context of proposed research?

4. Page 8-Performance Evaluation. Authors have used Monte-Carlo simulation to evaluate the performance of proposed protocol. Authors include a few references or citations regarding the Monte Carlo simulation.

5. Authors can add a separate section of the “Related Works” to investigate the recent published work for proposing the approach.

6. How does the multi-hop, multi-path wireless sensor network protect against eavesdropping? Show with the help of security analysis.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

PLoS One. 2022 Nov 7;17(11):e0276940. doi: 10.1371/journal.pone.0276940.r002

Author response to Decision Letter 0


5 Oct 2022

Response letter for the manuscript editor

Dear professor Dr Solna Carreon Santos

Editorial Department

Journal of PLOS ONE

Subject: Submission of revised paper manuscript

We authors would like to acknowledgement the reviewers for their critical looking at the article and constructive comments for possible publication. We also appreciate the editor for your great contribution and considered our manuscript entitled “Enhancement of the Performance of Wireless Sensor Networks Using the Multihop Multiantenna Power Beacon Path Selection Method in Intelligent Structures” (PONE-D-22-22300R1) for possible publication if the comments are well addressed and satisfied the editors and reviewers. We have carefully reviewed the comments and have revised the manuscript and abstract accordingly. Our responses are given in a point-by-point as comment and its response. We tried to address all the specific comments from the editor and reviewers. We hope the revised version is now suitable for publication and look forward to hearing from you in due course. If you need further information about it, we are waiting for you.

Sincerely

Ahmed Hammad

Department of Electronics and Communications Engineering, Mansoura University, Mansoura, Egypt P.O. Box 35516, email, ahmed_khairt@std.mans.edu.eg

On the behalf of co-authors

Comments from Editor

We confirm that the submission contains "minimal data set”, which PLOS defines as consisting of the data set used to reach the conclusions drawn in the manuscript with related metadata and methods, and any additional data required to replicate the reported study findings in their entirety. This includes:

1) The values behind the means, standard deviations and other measures reported. These values are shown in detail in the manuscript.

2) The values used to build graphs. These values found in Table 1 and Table 2.

3) The points extracted from images for analysis.

• Fig 3, OP as a function of transmitting power P in (db)

• Fig 4, OP as a function of level of impairments

Comments from Reviewer 1

Comment: The abstract should be rewritten. The results should be briefly stated in the abstract.

Response: Thank you for pointing this out. We agree with this comment. Therefore, we have rewritten the abstract.

Comment: The keyword should be written.

Response: Agree. We have written the keyword to emphasize this point.

Comment: The motive of the proposed method is not clear. The motivation of the proposed method should be stated in the introduction.

Response: We agree with this and have incorporated your suggestion throughout the manuscript in section II named by Motivations and related work.

Comment: Related work has not been written. In the RELATED WORK section should focus more on differences between this paper and other works to highlight the novelty of this paper. Also, the disadvantages and shortcomings of the previous methods that are addressed in the proposed method must be stated.

Response: We agree with this and have incorporated your suggestion throughout the manuscript in section II named by Motivations and related work.

Comment: More achievements on this topic should be added for the Section "introductions" and "Related work".

Response: We agree with this and have incorporated your suggestion throughout the manuscript.

Comment: Some references are missed. At the same time, many important recent references are missing, which can support the idea of this paper, the following references should be added in the Section "References"

Response: We agree with this and have incorporated your suggestion throughout the manuscript.

Comment: In the Performance Evaluation section, specify what methods are compared with the proposed method.

Response: Agree. We have done to emphasize this point.

Comment: Mathematics modelling to analyze the method is not enough. The relative key equations should be embedded into the algorithms.

Response: You have raised an important point here. However, we believe that most of relative key equations are embedded into the algorithm, because the references added for the compared algorithms have all the required equations.

Comment: The parameter of each equation must be described after using it. The parameters of some equations are not described.

Response: Agree. We have done to emphasize this point.

Comments from Reviewer 2

Comment: 1. Page 1- Abstract. What is equipment malfunction? Please elaborate.

Response: Most of published publications on performance evaluation make the transceiver hardware in wireless terminals perfect assumptions. However, in reality, it is suffered from phase noises, amplifier-amplitude non-linearity, and in phase and quadrature imbalance (IQI), all of which considerably worsen the performance of wireless communication systems.

Comment: 2. Page 3- Significant Contributions. Authors are required to provide a brief summary of the stated contribution: “Using not cooperate eavesdropping scenario”.

Response: Agree. We have done to emphasize this point.

Comment: 3. Page 1- Abstract. The proposed protocol improves the protection for multi-hop uncooperative wireless sensor networks. Authors need to provide an explanation for the “uncooperative wireless sensor networks”. What is the significance of multi-hop uncooperative wireless sensor networks in context of proposed research?

Response: We use a non-cooperative eavesdropping scenario, where eavesdroppers don’t work as a team, but they work individually.

Comment: 4. Page 8-Performance Evaluation. Authors have used Monte-Carlo simulation to evaluate the performance of proposed protocol. Authors include a few references or citations regarding the Monte Carlo simulation.

Response: Agree. We have done to emphasize this point.

Comment: 5. Authors can add a separate section of the “Related Works” to investigate the recent published work for proposing the approach.

Response: Agree. We have done to emphasize this point.

Comment: 6. How does the multi-hop, multi-path wireless sensor network protect against eavesdropping? Show with the help of security analysis.

Response: Agree. We have done to emphasize this poin

Attachment

Submitted filename: Response to Reviewers.docx

Decision Letter 1

Kapil Kumar Nagwanshi

18 Oct 2022

Enhancement of the Performance of Wireless Sensor Networks Using the Multihop Multiantenna Power Beacon Path Selection Method in Intelligent Structures

PONE-D-22-22300R1

Dear Dr. Hammad,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Kapil Kumar Nagwanshi, PhD

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #2: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: No

Reviewer #2: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: The authors have considered the concerns. Necessary corrections have been made. The article is acceptable in this form

Reviewer #2: No further changes are required.

All comments are properly addressed by the authors. The paper is accepted without revision.

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

**********

Acceptance letter

Kapil Kumar Nagwanshi

20 Oct 2022

PONE-D-22-22300R1

Enhancement of the Performance of Wireless Sensor Networks Using the Multihop Multiantenna Power Beacon Path Selection Method in Intelligent Structures

Dear Dr. Hammad:

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department.

If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact onepress@plos.org.

If we can help with anything else, please email us at plosone@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Kapil Kumar Nagwanshi

Academic Editor

PLOS ONE


Articles from PLOS ONE are provided here courtesy of PLOS

RESOURCES