Throughput Maximization for Multipath Secure Transmission in Wireless Ad-Hoc Networks

被引:13
|
作者
Bai, Lin [1 ,2 ]
Han, Pengfei [1 ]
Wang, Jingjing [1 ]
Wang, Jiaxing [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Zhongguancun Lab, Beijing 100191, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Ad hoc networks; Throughput; Delays; Wireless communication; Communication system security; Physical layer security; Optimization; Wireless ad-hoc networks; multipath transmission; throughput optimization; physical layer security; bilevel optimization; LAYER SECURITY;
D O I
10.1109/TCOMM.2024.3409539
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless ad-hoc networks play a significant role in environments without fixed infrastructure, especially in military and emergency situations. Due to the openness and wide coverage of wireless channel, it is necessary to establish a secure transmission mechanism against potential eavesdroppers. Traditional secure transmission schemes almost rely on single path transmission and physical layer security techniques which may not provide enough secrecy when eavesdroppers are widely distributed. To address this, in this paper, we propose a multipath secure transmission mechanism for the sake of both guaranteeing the transmission security and maximizing the end-to-end throughput. Furthermore, we give the approximated closed-form expressions of multipath secrecy connection probability (SCP) relying on secret sharing, and a novel bilevel optimization problem is formulated with the constraints of the end-to-end delay and the derived SCP. Finally, simulation results show that our proposed mechanism is beneficial concerning secrecy performance in comparison to traditional mechanisms. Also, a near-optimal throughput is obtained.
引用
收藏
页码:6810 / 6821
页数:12
相关论文
共 50 条
  • [1] Secure Framework for Voice Transmission over Multipath Wireless Ad-hoc Network
    Vaidya, Binod
    Denko, Mieso K.
    Rodrigues, Joel J. P. C.
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4299 - +
  • [2] Secure transmission in wireless ad-hoc networks without CSI at the destination
    He, Hongliang
    Li, Xingmei
    AD HOC NETWORKS, 2024, 152
  • [3] Multipath Routing Protocol for Networks Lifetime Maximization in Ad-Hoc Networks
    Liu, Juanwei
    Chen, Jian
    Kuo, Yonghong
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2713 - 2716
  • [4] Secrecy Capacity Maximization for Secure Cooperative Ad-hoc Networks
    Han, Biao
    Li, Jie
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2796 - 2804
  • [5] Throughput maximization in UWB-based ad-hoc networks
    ChuanYun Zou
    Zygmunt J. Haas
    Sheng Zou
    Science China Information Sciences, 2010, 53 : 2538 - 2547
  • [6] Throughput maximization in UWB-based ad-hoc networks
    HAAS Zygmunt J.
    ScienceChina(InformationSciences), 2010, 53 (12) : 2538 - 2547
  • [7] Throughput maximization in UWB-based ad-hoc networks
    Zou ChuanYun
    Haas, Zygmunt J.
    Zou Sheng
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (12) : 2538 - 2547
  • [8] Throughput Maximization of Ad-hoc Wireless Networks Using Adaptive Cooperative Diversity and Truncated ARQ
    Dai, Lin
    Letaief, Khaled B.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2008, 56 (11) : 1907 - 1918
  • [9] Random access in wireless Ad hoc networks for throughput maximization
    Yang, Bo
    Feng, Gang
    Guan, Xinping
    2006 9TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1- 5, 2006, : 1747 - +
  • [10] Effective of Transmission Power for Wireless Ad-Hoc Networks
    Pomsathit, Auttapon
    Lorphichian, Aekkarat
    Areerachakul, Sirilak
    INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 1962 - 1965