Opportunistic Transmission Scheduling for Secure Wireless Links: An Optimal Stopping Approach

被引:0
|
作者
Poulakis, Marios I. [1 ]
Vassaki, Stavroula [1 ]
Panagopoulos, Athanasios D. [1 ]
机构
[1] Natl Tech Univ Athens NTUA, Sch Elect & Comp Engn, Athens, Greece
来源
2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING) | 2015年
关键词
Fading channels; oppostunistic scheduling; optimal stopping; physical layer security; secrecy capacity; AD-HOC NETWORKS; SECRECY CAPACITY; PHYSICAL LAYER; CHANNELS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Secure communications constitute a major concern in wireless networks' design. Toward this direction, physical layer security can achieve confidential data transmission from an information-theoretic viewpoint. This paper focuses on investigating the secure transmission of information over Nakagami-m fading channels in the presence of an eavesdropper. Specifically, we propose a distributed scheduler that opportunistically exploits the time-varying fading channel characteristics with a view to maximizing the expected secrecy throughput of a wireless link. The proposed multi-threshold scheduling policy postpones the communication up to an acceptable deadline until the secure-optimal time instant is found, based on the optimal stopping theory. The performance of the proposed scheduler is evaluated through simulations for various link parameters, while its achieved secrecy gain is examined and compared with other heuristic schemes.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Secure Transmission of Delay-Sensitive Data Over Wireless Fading Channels
    Ozmen, Mustafa
    Gursoy, M. Cenk
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (09) : 2036 - 2051
  • [22] Multi user Opportunistic Spectrum Access in Cognitive Radio Networks: An Optimal Stopping Approach with Spectrum Partition
    Chen, Yang
    Chen, Jin
    Xu, Yuhua
    Xu, Chenglong
    2013 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2013), 2013,
  • [23] Distributed Coalition Formation Games for Secure Wireless Transmission
    Saad, Walid
    Han, Zhu
    Basar, Tamer
    Debbah, Merouane
    Hjorungnes, Are
    MOBILE NETWORKS & APPLICATIONS, 2011, 16 (02) : 231 - 245
  • [24] Resource-Redistributive Opportunistic Scheduling for Wireless Systems
    Cho, Hangyu
    Andrews, Jeffrey G.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (07) : 3510 - 3522
  • [25] Mobile Edge Computing via Wireless Power Transfer Over Multiple Fading Blocks: An Optimal Stopping Approach
    Gu, Qi
    Jian, Yiheng
    Wang, Gongpu
    Fan, Rongfei
    Jiang, Hai
    Zhong, Zhangdui
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) : 10348 - 10361
  • [26] Inverted Antenna Subset Transmission technique for Secure Millimeter-Wave Wireless Communication
    Hong, Yuanquan
    Jing, Xiaojun
    Gao, Hui
    Sun, Songlin
    Huang, Hai
    Gao, Ning
    Xie, Jianxiao
    Li, Bohan
    2017 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2017, : 1003 - 1008
  • [27] Energy-Efficient Transmission Strategy by Using Optimal Stopping Approach for Mobile Networks
    Peng, Ying
    Wang, Gaocai
    Wang, Nao
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [28] Physically Secure sub-THz Wireless Links
    Sengupta, Kaushik
    Lu, Xuyang
    Venkatesh, Suresh
    Tang, Bingjun
    2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2020,
  • [29] Secure Transmission in Wireless Powered Massive MIMO Relaying Systems: Performance Analysis and Optimization
    Chen, Xiaoming
    Chen, Jian
    Liu, Tao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (10) : 8025 - 8035
  • [30] Analysis of Secure Unicast Links in Stochastic Wireless Networks
    Vuppala, Satyanaranaya
    Abreu, Giuseppe
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013, : 1588 - 1593