Optimal power allocation for protective jamming in wireless networks: A flow based model


Autoria(s): Sarma, Siddhartha; Kuri, Joy
Data(s)

2015

Resumo

We address the problem of passive eavesdroppers in multi-hop wireless networks using the technique of friendly jamming. The network is assumed to employ Decode and Forward (DF) relaying. Assuming the availability of perfect channel state information (CSI) of legitimate nodes and eavesdroppers, we consider a scheduling and power allocation (PA) problem for a multiple-source multiple-sink scenario so that eavesdroppers are jammed, and source-destination throughput targets are met while minimizing the overall transmitted power. We propose activation sets (AS-es) for scheduling, and formulate an optimization problem for PA. Several methods for finding AS-es are discussed and compared. We present an approximate linear program for the original nonlinear, non-convex PA optimization problem, and argue that under certain conditions, both the formulations produce identical results. In the absence of eavesdroppers' CSI, we utilize the notion of Vulnerability Region (VR), and formulate an optimization problem with the objective of minimizing the VR. Our results show that the proposed solution can achieve power-efficient operation while defeating eavesdroppers and achieving desired source-destination throughputs simultaneously. (C) 2015 Elsevier B.V. All rights reserved.

Formato

application/pdf

Identificador

http://eprints.iisc.ernet.in/51611/1/com_net-81_258_2015.pdf

Sarma, Siddhartha and Kuri, Joy (2015) Optimal power allocation for protective jamming in wireless networks: A flow based model. In: COMPUTER NETWORKS, 81 . pp. 258-271.

Publicador

ELSEVIER SCIENCE BV

Relação

http://dx.doi.org/10.1016/j.comnet.2015.02.011

http://eprints.iisc.ernet.in/51611/

Palavras-Chave #Electrical Communication Engineering
Tipo

Journal Article

PeerReviewed