Title :
Efficient wireless security through jamming, coding and routing
Author :
Ghaderi, Majid ; Goeckel, Dennis ; Orda, Ariel ; Dehghan, Mehdi
Author_Institution :
Univ. of Calgary, Calgary, AB, Canada
Abstract :
There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with higher layer network mechanisms such as coding and routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an o-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half.
Keywords :
cooperative communication; encoding; energy consumption; jamming; polynomials; radio receivers; radio transmitters; telecommunication network routing; telecommunication security; ε-optimal approximation; NP-hard; augment physical layer security techniques; coding; constrained optimization; cooperative jamming; efficient wireless security; end-to-end communication secrecy; energy path; energy savings; layer network mechanisms; link selection; multihop wireless networks; network energy consumption; physical layer security; polynomial complexity; pseudo-polynomial complexity; receiver; routing; secure communication; security-agnostic minimum energy routing; single-hop physical layer security techniques; transmission power; transmitter; wireless networks; Communication system security; Jamming; Optimization; Physical layer; Routing; Security;
Conference_Titel :
Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2013 10th Annual IEEE Communications Society Conference on
Conference_Location :
New Orleans, LA
DOI :
10.1109/SAHCN.2013.6645022