Security/QoS-aware route selection in multi-hop wireless ad hoc networks

Recently extensive works have been devoted to the performance analysis of physical layer security in wireless communication systems. However, the combination of physical layer security and quality of service (QoS) for route selection in multi-hop wireless ad hoc networks (WANETs) still remains an open technical challenge. As an initial step towards this end, this paper focuses on a multi-hop WANET with two typical transmission schemes amplify-and-forward (AF) and decode-and-forward (DF), and explores the route selection with the consideration of both security and QoS. We first derive the closed-form expressions of secrecy outage probability (SOP) and connection outage probability (COP) for a single hop link, and further extend the results to an end-to-end route. Then we conduct the performance comparison between the AF scheme and DF scheme. Finally, based on both the SOP and COP of a route, we formulate the route metric and propose a flexible route selection algorithm which enables us to select the suitable route for message delivery according to different security and QoS requirements.

[1]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[5]  Liang Chen,et al.  Secure network coding for wireless routing , 2014, 2014 IEEE International Conference on Communications (ICC).

[6]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[7]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[8]  Bruce Schneier,et al.  Cryptographic Design Vulnerabilities , 1998, Computer.

[9]  Walid Saad,et al.  Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks , 2012, IEEE Transactions on Wireless Communications.

[10]  Masoud Ardakani,et al.  Asymptotically-Exact Performance Bounds of AF Multi-Hop Relaying over Nakagami Fading , 2011, IEEE Transactions on Communications.

[11]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[12]  Yuguang Fang,et al.  On the Price of Security in Large-Scale Wireless Ad Hoc Networks , 2011, IEEE/ACM Transactions on Networking.

[13]  Donald F. Towsley,et al.  Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.

[14]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[15]  Xiangyun Zhou,et al.  Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.

[16]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[17]  Ariel Orda,et al.  Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.

[18]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[19]  João Barros,et al.  Position-Based Jamming for Enhanced Wireless Secrecy , 2011, IEEE Transactions on Information Forensics and Security.