DocumentCode
170792
Title
Scheduling in a secure wireless network
Author
Xuan Wang ; Yi Chen ; Lin Cai ; Jianping Pan
Author_Institution
Univ. of Victoria, Victoria, BC, Canada
fYear
2014
fDate
April 27 2014-May 2 2014
Firstpage
2184
Lastpage
2192
Abstract
We consider a scheduling problem in a wireless network which consists of one base station, N legitimate users and one (or more) eavesdropper(s). The scheduling problem jointly considers the reliability, security and stability of the system, and is to allocate wireless resources to the legitimate users, stabilize the system and maximize the secure transmission rate. Based on the stochastic network optimization framework, the scheduling problem is decomposed to an online optimization problem. A scheduling algorithm and a low computational complexity algorithm that both do not consider power adaptation are proposed, along with a power adaptive one. Extensive simulations are conducted to show the impact of the information arrival rate and the eavesdropper´s channel condition on the system performance. These observations provide important insights and guidelines for the design and resource management of future wireless networks using secure communication technologies.
Keywords
computational complexity; optimisation; radio networks; resource allocation; scheduling; telecommunication security; wireless channels; base station; computational complexity algorithm; eavesdropper channel; information arrival rate; legitimate user; online optimization; resource management; scheduling algorithm; secure wireless network; stochastic network optimization framework; system reliability; system stability; transmission rate; wireless resource allocation; Computational complexity; Fading; Receivers; Reliability; Security; Wireless networks;
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM, 2014 Proceedings IEEE
Conference_Location
Toronto, ON
Type
conf
DOI
10.1109/INFOCOM.2014.6848161
Filename
6848161
Link To Document