Joint Scheduling & Jamming for Data Secrecy in Wireless Networks


Autoria(s): Sarma, Siddhartha; Shukla, Samta; Kuri, Joy
Data(s)

2013

Resumo

The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee non-zero secrecy rate in single source, single destination multi-hop networks with eavesdroppers for two cases: when eavesdropper locations and channel gains are known and when their positions are unknown. We propose a two-phase solution which consists of finding activation sets and then obtaining transmit powers subject to SINR constraints for the case when eavesdropper locations are known. We introduce methods to find activation sets and compare their performance. Necessary but reasonable approximations are made in power minimization formulations for tractability reasons. For scenarios with no eavesdropper location information, we suggest vulnerability region (the area having zero secrecy rate) minimization over the network. Our results show that in the absence of location information average number of eavesdroppers who have access to data is reduced.

Formato

application/pdf

Identificador

http://eprints.iisc.ernet.in/48185/1/Int_sym_Mod_Opt_Mob_Hoc_Wir_Net_2013.pdf

Sarma, Siddhartha and Shukla, Samta and Kuri, Joy (2013) Joint Scheduling & Jamming for Data Secrecy in Wireless Networks. In: 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, MAY 13-17, 2013, Tsukuba, Japan, pp. 248-255.

Publicador

IEEE

Relação

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6576441&tag=1

http://eprints.iisc.ernet.in/48185/

Palavras-Chave #Electronic Systems Engineering (Formerly, (CEDT) Centre for Electronic Design & Technology)
Tipo

Conference Proceedings

NonPeerReviewed