scispace - formally typeset
Open AccessJournal ArticleDOI

Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying

Reads0
Chats0
TLDR
This paper analytically characterize the physical layer security performance of any chosen multihop path using the end-to-end secure connection probability (SCP) for both colluding and noncolluding eavesdroppers and derives accurate approximations of the SCP.
Abstract
In this paper, we study the problem of secure routing in a multihop wireless ad-hoc network in the presence of randomly distributed eavesdroppers. Specifically, the locations of the eavesdroppers are modeled as a homogeneous Poisson point process (PPP) and the source-destination pair is assisted by intermediate relays using the decode-and-forward (DF) strategy. We analytically characterize the physical layer security performance of any chosen multihop path using the end-to-end secure connection probability (SCP) for both colluding and noncolluding eavesdroppers. To facilitate finding an efficient solution to secure routing, we derive accurate approximations of the SCP. Based on the SCP approximations, we study the secure routing problem, which is defined as finding the multihop path having the highest SCP. A revised Bellman–Ford algorithm is adopted to find the optimal path in a distributed manner. Simulation results demonstrate that the proposed secure routing scheme achieves nearly the same performance as exhaustive search.

read more

Content maybe subject to copyright    Report

Citations
More filters

Table Of Integrals Series And Products

TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Journal ArticleDOI

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

TL;DR: This paper provides a latest survey of the physical layer security research on various promising 5G technologies, includingPhysical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, and so on.
Journal ArticleDOI

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

TL;DR: A comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions.
Journal ArticleDOI

Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations

TL;DR: Numerical results show that the proper use of relay transmission can enhance the secrecy throughput and extend the secure coverage range in IoT networks, where the communication is exposed to eavesdroppers with unknown number and locations.
Journal ArticleDOI

Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers

TL;DR: The analytical expression for the secure connection probability (SCP) of the legitimate ground link in the presence of non-colluding UEDs is derived and reveals some useful trends in the SCP as a function of the transmit signal to jamming power ratio, the locations of the UAV jammer, and the height of UAVs.
References
More filters
Book

Table of Integrals, Series, and Products

TL;DR: Combinations involving trigonometric and hyperbolic functions and power 5 Indefinite Integrals of Special Functions 6 Definite Integral Integral Functions 7.Associated Legendre Functions 8 Special Functions 9 Hypergeometric Functions 10 Vector Field Theory 11 Algebraic Inequalities 12 Integral Inequality 13 Matrices and related results 14 Determinants 15 Norms 16 Ordinary differential equations 17 Fourier, Laplace, and Mellin Transforms 18 The z-transform
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Book

Data networks

TL;DR: Undergraduate and graduate classes in computer networks and wireless communications; undergraduate classes in discrete mathematics, data structures, operating systems and programming languages.
Book

Integer programming

TL;DR: The principles of integer programming are directed toward finding solutions to problems from the fields of economic planning, engineering design, and combinatorial optimization as mentioned in this paper, which is a standard of graduate-level courses since 1972.
Related Papers (5)