Throughput Maximization for Multipath Secure Transmission in Wireless Ad-Hoc Networks

被引:13
|
作者
Bai, Lin [1 ,2 ]
Han, Pengfei [1 ]
Wang, Jingjing [1 ]
Wang, Jiaxing [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Zhongguancun Lab, Beijing 100191, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Ad hoc networks; Throughput; Delays; Wireless communication; Communication system security; Physical layer security; Optimization; Wireless ad-hoc networks; multipath transmission; throughput optimization; physical layer security; bilevel optimization; LAYER SECURITY;
D O I
10.1109/TCOMM.2024.3409539
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless ad-hoc networks play a significant role in environments without fixed infrastructure, especially in military and emergency situations. Due to the openness and wide coverage of wireless channel, it is necessary to establish a secure transmission mechanism against potential eavesdroppers. Traditional secure transmission schemes almost rely on single path transmission and physical layer security techniques which may not provide enough secrecy when eavesdroppers are widely distributed. To address this, in this paper, we propose a multipath secure transmission mechanism for the sake of both guaranteeing the transmission security and maximizing the end-to-end throughput. Furthermore, we give the approximated closed-form expressions of multipath secrecy connection probability (SCP) relying on secret sharing, and a novel bilevel optimization problem is formulated with the constraints of the end-to-end delay and the derived SCP. Finally, simulation results show that our proposed mechanism is beneficial concerning secrecy performance in comparison to traditional mechanisms. Also, a near-optimal throughput is obtained.
引用
收藏
页码:6810 / 6821
页数:12
相关论文
共 50 条
  • [31] Scalable Multipath Exploration in Ad-Hoc Networks
    Trapp, Markus
    Rossberg, Michael
    Schaefer, Guenter
    2013 CONFERENCE ON NETWORKED SYSTEMS (NETSYS), 2013, : 9 - 18
  • [32] Interference of Overhearing by Eavesdropper Nodes for Secure Wireless Ad-Hoc Networks
    Amano, Hinano
    Higaki, Hiroaki
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2020, PART IV, 2020, 12252 : 246 - 260
  • [33] Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks
    Hsueh, Ching-Tsung
    Li, Yu-Wei
    Wen, Chih-Yu
    Ouyang, Yen-Chieh
    SENSORS, 2010, 10 (02) : 1251 - 1278
  • [34] Throughput of optimal spatial reuse TDMA for wireless ad-hoc networks
    Grönkvist, J
    Nilsson, J
    Yuan, D
    VTC2004-SPRING: 2004 IEEE 59TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, PROCEEDINGS, 2004, : 2156 - 2160
  • [35] An analytical model for evaluating usable throughput in ad-hoc wireless networks
    Futernik, Albert
    Haimovich, Alexander M.
    2008 42ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-3, 2008, : 809 - +
  • [36] Towards throughput and delay optimal routing for wireless ad-hoc networks
    Gupta, Parul
    Javidi, Tara
    CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, 2007, : 249 - 254
  • [37] On the Multicast Throughput Capacity of Network Coding in Wireless Ad-hoc Networks
    Karande, Shirish
    Wang, Zheng
    Sadjadpour, Hamid R.
    Garcia-Luna-Aceves, J. J.
    2ND ACM INTERNATIONAL WORKSHOP ON FOUNDATIONS OF WIRELESS AD HOC AND SENSOR NETWORKING AND COMPUTING, 2009, : 21 - 27
  • [38] Multicast Throughput Order of Network Coding in Wireless Ad-hoc Networks
    Karande, Shirish S.
    Wang, Zheng
    Sadjadpour, Hamid R.
    Garcia-Luna-Aceves, J. J.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2011, 59 (02) : 497 - 506
  • [39] Secure, disjoint, multipath source routing Protocol(SDMSR) for mobile ad-hoc networks
    Berton, Sebastien
    Yin, Hao
    Lin, Chuang
    Min, Geyong
    GCC 2005: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2006, : 387 - +
  • [40] Wireless ad-hoc control networks
    Bu, SR
    Naghdy, F
    2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 839 - 844