• DocumentCode
    54441
  • Title

    Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers

  • Author

    Ghaderi, Majid ; Goeckel, Dennis ; Orda, Ariel ; Dehghan, Mostafa

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Calgary, Calgary, AB, Canada
  • Volume
    14
  • Issue
    7
  • fYear
    2015
  • fDate
    July 1 2015
  • Firstpage
    1433
  • Lastpage
    1448
  • Abstract
    There is a rich recent literature on information-theoretically secure communication at the physical layer of wireless networks, where secret communication between a single transmitter and receiver has been studied extensively. In this paper, we consider how single-hop physical layer security techniques can be extended to multi-hop wireless networks. We show that guaranteed security can be achieved in multi-hop networks by augmenting physical layer security techniques, such as cooperative jamming, with the higher layer network mechanisms, such as routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an ε-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half.
  • Keywords
    computational complexity; energy conservation; jamming; optimisation; radio links; radio receivers; radio transmitters; telecommunication network routing; telecommunication power management; telecommunication security; NP-hard; constrained optimization; cooperative jamming; end-to-end communication secrecy; energy consumption reduction; energy saving; information-theoretically secure communication; link selection; multihop wireless network eavasdropper; pseudopolynomial complexity; receiver; secure minimum energy routing problem; single-hop physical layer security technique; transmitter; Communication system security; Interference; Jamming; Physical layer; Routing; Security; Wireless communication; Wireless security; cooperative secrecy; minimum energy; secure routing;
  • fLanguage
    English
  • Journal_Title
    Mobile Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1233
  • Type

    jour

  • DOI
    10.1109/TMC.2014.2354031
  • Filename
    6891269