Security/QoS-Aware Route Selection in Multi-hop Wireless Ad Hoc Networks

被引:10
作者
Xu, Yang [1 ]
Liu, Jia [2 ]
Shen, Yulong [3 ]
Jiang, Xiaohong [2 ]
Taleb, Tarik [4 ]
机构
[1] Xidian Univ, Sch Econ & Management, Xian 710071, Peoples R China
[2] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido 0418655, Japan
[3] Xidian Univ, State Key Lab ISN, Xian 710071, Peoples R China
[4] Aalto Univ, Dept Commun & Networking, Helsinki 11000, Finland
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2016年
关键词
Route selection; physical layer security; QoS; AF; DF; PHYSICAL LAYER SECURITY; CHANNELS; SECRECY;
D O I
10.1109/ICC.2016.7510878
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently extensive works have been devoted to the performance analysis of physical layer security in wireless communication systems. However, the combination of physical layer security and quality of service (QoS) for route selection in multi-hop wireless ad hoc networks (WANETs) still remains an open technical challenge. As an initial step towards this end, this paper focuses on a multi-hop WANET with two typical transmission schemes amplify-and-forward (AF) and decode-and- forward (DF), and explores the route selection with the consideration of both security and QoS. We first derive the closed-form expressions of secrecy outage probability (SOP) and connection outage probability (COP) for a single hop link, and further extend the results to an end-to-end route. Then we conduct the performance comparison between the AF scheme and DF scheme. Finally, based on both the SOP and COP of a route, we formulate the route metric and propose a flexible route selection algorithm which enables us to select the suitable route for message delivery according to different security and QoS requirements.
引用
收藏
页数:6
相关论文
共 21 条
  • [1] Abolhasan M., 2004, AD HOC NETW, V2, P1, DOI DOI 10.1016/S1570-8705(03)00043-X
  • [2] Asymptotically-Exact Performance Bounds of AF Multi-Hop Relaying over Nakagami Fading
    Amarasuriya, Gayan
    Tellambura, Chintha
    Ardakani, Masoud
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2011, 59 (04) : 962 - 967
  • [3] Chen L, 2014, IEEE ICC, P1941, DOI 10.1109/ICC.2014.6883607
  • [4] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [5] Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers
    Ghaderi, Majid
    Goeckel, Dennis
    Orda, Ariel
    Dehghan, Mostafa
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (07) : 1433 - 1448
  • [6] Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks
    Goeckel, Dennis
    Vasudevan, Sudarshan
    Towsley, Don
    Adams, Stephan
    Ding, Z.
    Leung, K.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (10) : 2067 - 2076
  • [7] Gradshteyn S., 2014, Table of Integrals, Series, and Products, V8th
  • [8] Kaufman C., 2002, NETWORK SECURITY PRI
  • [9] On Secrecy Capacity Scaling in Wireless Networks
    Koyluoglu, O. Ozan
    Koksal, Can Emre
    El Gamal, Hesham
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (05) : 3000 - 3015
  • [10] The relay-eavesdropper channel: Cooperation for secrecy
    Lai, Lifeng
    El Gamal, Hesham
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) : 4005 - 4019