TY - GEN
T1 - Efficient wireless security through jamming, coding and routing
AU - Ghaderi, Majid
AU - Goeckel, Dennis
AU - Orda, Ariel
AU - Dehghan, Mostafa
PY - 2013
Y1 - 2013
N2 - There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with higher layer network mechanisms such as coding and routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an o-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half.
AB - There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with higher layer network mechanisms such as coding and routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an o-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half.
UR - http://www.scopus.com/inward/record.url?scp=84890887487&partnerID=8YFLogxK
U2 - https://doi.org/10.1109/SAHCN.2013.6645022
DO - https://doi.org/10.1109/SAHCN.2013.6645022
M3 - منشور من مؤتمر
SN - 9781479902309
T3 - 2013 IEEE International Conference on Sensing, Communications and Networking, SECON 2013
SP - 505
EP - 513
BT - 2013 IEEE International Conference on Sensing, Communications and Networking, SECON 2013
T2 - 2013 10th Annual IEEE Communications Society Conference on Sensing and Communication in Wireless Networks, SECON 2013
Y2 - 24 June 2013 through 27 June 2013
ER -