期刊文献+

An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks 被引量:1

An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks
在线阅读 下载PDF
导出
摘要 In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping. In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping.
出处 《China Communications》 SCIE CSCD 2016年第1期176-184,共9页 中国通信(英文版)
基金 supported by the Natural Science Foundation of Anhui Provincial Education Department under Grant No.KJ2013Z048 the Natural Science Foundation of Anhui Provincial Colleges and Universities under Grant No.KJ2014A234
关键词 transmission scheduling eavesdropping secrecy outage probability secrecy rate rayleigh fading 最优调度方案 传输数据 无线Ad 中断概率 网络窃听 防窃听 保密 最大化
作者简介 WANG Yajun, received his M.S. degree in computer science from Anhui University, Hefei,Anhui, China ,in 2012. He is a Lecturer of School of Mathematical and Information Engineering in Anhui Science and Tech- nology University. His main research interests includewireless network security, quality of service (QoS), and routing and congestion control protocols for ad hoc networks.E-mail: wangyajun_1978@sina.cnLIAO Tongqing, Associate Professor at the School of Electronic and Information Engineering, AnHui Uni- versity, Hefei, China. He received his M.S. degree in electronic science and technology from AnHui Uni- versity, Hefei, China, and the Ph.D. degree in optical from Nankai University, Tianjin, China in 2005 and 2009 respectively. His research interests include mi- crowave technology, antennas and propagation ,op- tical communication and fiber sensing technology.WANG Chuanan, received his M.S. degree in School of Computer from Jiangsu University,Zhenjiang,Ji- angsu,China,in 2010. He is currently working towards his Ph.D.degree at the School of Computer Science, Beijing University of Posts and Telecommunica- tions, Beijing, China. He is a Lecturer of School of Mathematical and Information Engineering in Anhui Science and Technology University. His research in- terests include network security and computer appli- cation technology.
  • 相关文献

参考文献23

  • 1CONTI M , GIORDANO S, "Mobile ad hoc networking: Milestones, challenges, and new research directions", IEEE Communications Magazine, vol. 52, no. 1, pp 85-96, January, 2014.
  • 2SADJADPOUR H R, WANG Z, and GARCIA-LUNA-ACEVES J J, "The capacity of wireless ad hoc networks with multi-packet reception", IEEE Transactions on Communications, vol. 58, no. 2, pp 600-610, Feburary, 2014.
  • 3RANGANATHAN K and ARORA S,"Enabling grassroots communication: A memory-aided broadcast mechanism for a community radio service on an ad hoc device-to-device mobile network"D/EEE Transactions on Communications, vol. 62, no. 3, pp1138-1150, March, 2014.
  • 4Mukunda N S, Padmanabhi V, and Srinivas A, "A remote patient monitoring system in an ad hoc sensor network environment", International Conference on Information Technology and Multimedia, Lumpur India, November ,2011.
  • 5OCHIAI H, MITRAN P. POOR H , V et al. "Collaborative beamforming for distributed wireless ad hoc sensor networks", IEEE Transactions on Signal Processing, vol. 53, no. 11, pp 4110-4124, November, 2005.
  • 6MELODIA T, POMPILI D, and AKYILDIZ I F, "On the interdependence of distributed topology control and geographical routing in ad hoc and sensor networks", IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, pp 520-532, March, 2005.
  • 7JEONG C, KIM I, and DONG K," Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system", IEEE Transactions on Signal Processing, vol. 60, no. 1, pp 310-325, January, 2012.
  • 8MUKHERJEE A, "Imbalanced beamforming by a multi-antenna source for secure utilization of an untrusted relay", IEEE Communications Letters, vol. 17, no. 7, pp 1309-1312 , Jul. 2013.
  • 9SHANNON C E, "Communication theory of secrecy systems", Bell System Technical Journal, vol. 28, pp 656-715, 1949.
  • 10STAMP M. Information security Principles and practice, 2nd Edition, John Wiley & Sons, 2011.

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部