Secrecy Rate Maximization With Outage Constraint in Multihop Relaying Networks

In this letter, we study the secure transmission in multihop wireless networks with randomize-and-forward relaying, in the presence of randomly distributed eavesdroppers. By considering adaptive encoder with ON–OFF transmission scheme, we investigate the optimal design of the wiretap code and routing strategies to maximize the secrecy rate while satisfying the secrecy outage probability constraint. We derive the exact expressions for the optimal rate parameters of the wiretap code. Then, the secure routing problem is solved by revising the classical Bellman–Ford algorithm. Simulation results are conducted to verify our analysis.

[1]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Yueming Cai,et al.  Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks , 2013, IEEE Communications Letters.

[4]  Dimitri P. Bertsekas,et al.  Data Networks , 1986 .

[5]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[6]  Naofal Al-Dhahir,et al.  Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.

[7]  Naofal Al-Dhahir,et al.  Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.

[8]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[9]  Xiangyun Zhou,et al.  Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.

[10]  Ariel Orda,et al.  Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.

[11]  Dennis Goeckel,et al.  Energy-Efficient Routing in Wireless Networks in the Presence of Jamming , 2016, IEEE Transactions on Wireless Communications.

[12]  T. Mattfeldt Stochastic Geometry and Its Applications , 1996 .

[13]  Xiangyun Zhou,et al.  When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.

[14]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[15]  Meng Zhang,et al.  Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.

[16]  Suili Feng,et al.  Secure Routing in Full-Duplex Jamming Multihop Relaying , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[17]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[18]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[19]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[20]  Meng Zhang,et al.  Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[22]  Aylin Yener,et al.  End-to-End Secure Multi-Hop Communication with Untrusted Relays , 2008, IEEE Transactions on Wireless Communications.