Optimal Placement and Power Allocation for Jammers in Wireless Mesh Networks

被引:0
作者
Lall, S. [1 ]
Alfa, A. S. [1 ,2 ]
Maharaj, B. T. [1 ]
机构
[1] Univ Pretoria, Dept Elect Elect & Comp Engn, Pretoria, South Africa
[2] Univ Manitoba, Dept Elect & Comp Engn, Winnipeg, MB, Canada
来源
2015 IEEE 82ND VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL) | 2015年
关键词
Jammer Placement; Jammer Power Allocation; Optimization; Wireless Jammers; Wireless Mesh Networks; Wireless Network Security; PHYSICAL-LAYER SECURITY; EAVESDROPPER;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A novel physical-layer based security method that utilizes jammers to generate additional interference for devices that are eavesdropping on wireless network communication is proposed. The scheme involves the intelligent placement of continuous jammers in order to achieve maximum protection and data confidentiality for wireless mesh networks with multiple eavesdroppers, sources and destinations. Furthermore, the scheme is optimized in terms of the transmitting power associated with each jammer so that the energy expended by the jammers is kept at a minimum. The protection scheme precludes the use of any cryptographic techniques and is only physical-layer based. The security method is modeled as a minimization mixed integer non-linear problem and is approximated as the sequential solution of two linear optimization sub-problems relating to the placement and power allocation of the wireless jammers. The placement of the jammers takes the form of a multiple demand multidimensional knapsack problem with a minimization objective. The power allocation problem is modeled as a linear real-valued minimization optimization problem. The performance of the proposed security method is evaluated through appropriate simulations conducted on random network instances.
引用
收藏
页数:7
相关论文
共 25 条
[1]   Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers [J].
Al-nahari, Azzam Y. ;
Krikidis, Ioannis ;
Ibrahim, Ahmed S. ;
Dessouky, Moawad I. ;
Abd El-Samie, Fathi E. .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2014, 25 (04) :445-460
[2]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[3]  
[Anonymous], 2010, J GUANGDONG TECHNICA, DOI DOI 10.1109/ICMULT.2010.5631429)
[4]  
Ara M, 2013, IEEE ICC, P3413, DOI 10.1109/ICC.2013.6655076
[5]  
Awoyemi BS, 2015, IEEE WCNC, P1759, DOI 10.1109/WCNC.2015.7127734
[6]  
Barnes S.D., 2014, Proc. Int. Symp. Telecommun. Technol, P128
[7]   Physical-Layer Security in Distributed Wireless Networks Using Matching Theory [J].
Bayat, Siavash ;
Louie, Raymond H. Y. ;
Han, Zhu ;
Vucetic, Branka ;
Li, Yonghui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) :717-732
[8]   The wireless network jamming problem [J].
Commander, ClaytonW. ;
Pardalos, Panos M. ;
Ryabchenko, Valeriy ;
Uryasev, Stan ;
Zrazhevsky, Grigoriy .
JOURNAL OF COMBINATORIAL OPTIMIZATION, 2007, 14 (04) :481-498
[9]   Security in wireless ad-hoc networks - A survey [J].
Di Pietro, R. ;
Guarino, S. ;
Verde, N. V. ;
Domingo-Ferrer, J. .
COMPUTER COMMUNICATIONS, 2014, 51 :1-20
[10]  
Di Renzo Marco, 2009, Proceedings of the 2009 International Conference on Advanced Technologies for Communications (ATC 2009), P313, DOI 10.1109/ATC.2009.5349370