DocumentCode :
54441
Title :
Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers
Author :
Ghaderi, Majid ; Goeckel, Dennis ; Orda, Ariel ; Dehghan, Mostafa
Author_Institution :
Dept. of Comput. Sci., Univ. of Calgary, Calgary, AB, Canada
Volume :
14
Issue :
7
fYear :
2015
fDate :
July 1 2015
Firstpage :
1433
Lastpage :
1448
Abstract :
There is a rich recent literature on information-theoretically secure communication at the physical layer of wireless networks, where secret communication between a single transmitter and receiver has been studied extensively. In this paper, we consider how single-hop physical layer security techniques can be extended to multi-hop wireless networks. We show that guaranteed security can be achieved in multi-hop networks by augmenting physical layer security techniques, such as cooperative jamming, with the higher layer network mechanisms, such as routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an ε-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half.
Keywords :
computational complexity; energy conservation; jamming; optimisation; radio links; radio receivers; radio transmitters; telecommunication network routing; telecommunication power management; telecommunication security; NP-hard; constrained optimization; cooperative jamming; end-to-end communication secrecy; energy consumption reduction; energy saving; information-theoretically secure communication; link selection; multihop wireless network eavasdropper; pseudopolynomial complexity; receiver; secure minimum energy routing problem; single-hop physical layer security technique; transmitter; Communication system security; Interference; Jamming; Physical layer; Routing; Security; Wireless communication; Wireless security; cooperative secrecy; minimum energy; secure routing;
fLanguage :
English
Journal_Title :
Mobile Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1233
Type :
jour
DOI :
10.1109/TMC.2014.2354031
Filename :
6891269
Link To Document :
بازگشت