Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming

This paper considers secure energy-efficient routing in the presence of multiple passive eavesdroppers. Previous work in this area has considered secure routing assuming probabilistic or exact knowledge of the location and channel-state-information (CSI) of each eavesdropper. In wireless networks, however, the locations and CSIs of passive eavesdroppers are not known, making it challenging to guarantee secrecy for any routing algorithm. We develop an efficient (in terms of energy consumption and computational complexity) routing algorithm that does not rely on any information about the locations and CSIs of the eavesdroppers. Our algorithm guarantees secrecy even in disadvantaged wireless environments, where multiple eavesdroppers try to eavesdrop each message, are equipped with directional antennas, or can get arbitrarily close to the transmitter. The key is to employ additive random jamming to exploit inherent non-idealities of the eavesdropper’s receiver, which makes the eavesdroppers incapable of recording the messages. We have simulated our proposed algorithm and compared it with the existing secrecy routing algorithms in both single-hop and multi-hop networks. Our results indicate that when the uncertainty in the locations of eavesdroppers is high and/or in disadvantaged wireless environments, our algorithm outperforms existing algorithms in terms of energy consumption and secrecy.

[1]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[2]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[3]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[4]  R. Negi,et al.  Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[5]  Dennis Goeckel,et al.  Adaptive coding for time-varying channels using outdated fading estimates , 1999, IEEE Trans. Commun..

[6]  Dennis Goeckel,et al.  Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy , 2013, 2013 IEEE International Symposium on Information Theory.

[7]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[8]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[9]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[10]  H. Vincent Poor,et al.  Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.

[11]  Leandros Tassiulas,et al.  Energy conserving routing in wireless ad-hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[12]  Robert Schober,et al.  Combined relay selection and cooperative beamforming for physical layer security , 2012, Journal of Communications and Networks.

[13]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[14]  Donald F. Towsley,et al.  Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.

[15]  Dennis Goeckel,et al.  Jamming-aware minimum energy routing in wireless networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[16]  John S. Thompson,et al.  Power allocation for cooperative-based jamming in wireless networks with secrecy constraints , 2010, 2010 IEEE Globecom Workshops.

[17]  Elif Uysal-Biyikoglu,et al.  Energy efficient wireless unicast routing alternatives for machine-to-machine networks , 2011, J. Netw. Comput. Appl..

[18]  Ariel Orda,et al.  Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.

[19]  Babak Hassibi,et al.  How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.

[20]  Ariel Orda,et al.  Efficient wireless security through jamming, coding and routing , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[21]  Dennis Goeckel,et al.  Energy-Efficient Routing in Wireless Networks in the Presence of Jamming , 2016, IEEE Transactions on Wireless Communications.

[22]  Sven Semmelrodt,et al.  Investigation of different fading forecast schemes for flat fading radio channels , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[23]  Donald F. Towsley,et al.  Secret communication in large wireless networks without eavesdropper location information , 2012, 2012 Proceedings IEEE INFOCOM.

[24]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[25]  Dennis Goeckel,et al.  Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments , 2014, IEEE Transactions on Wireless Communications.

[26]  Zhu Han,et al.  Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.

[27]  Mikael Skoglund,et al.  Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.

[28]  Shunsuke Ihara,et al.  On the Capacity of Channels with Additive Non-Gaussian Noise , 1978, Inf. Control..

[29]  Dennis Goeckel,et al.  Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver , 2012, IEEE Journal on Selected Areas in Communications.

[30]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[31]  Donald F. Towsley,et al.  Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[32]  Dennis Goeckel,et al.  Power allocation to noise-generating nodes for cooperative secrecy in the wireless environment , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[33]  Jan M. Rabaey,et al.  Energy aware routing for low energy ad hoc sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).

[34]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[35]  Teresa H. Meng,et al.  Minimum energy mobile wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[36]  Dennis Goeckel,et al.  Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[37]  Jinhua Zhu,et al.  Model and Protocol for Energy-Efficient Routing over Mobile Ad Hoc Networks , 2011, IEEE Transactions on Mobile Computing.

[38]  Sennur Ulukus,et al.  Optimal Energy and Data Routing in Networks With Energy Cooperation , 2015, IEEE Transactions on Wireless Communications.

[39]  K. J. Ray Liu,et al.  Robust connectivity-aware energy-efficient routing for wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.

[40]  M.Z. Win,et al.  Physical-layer security in stochastic wireless networks , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[41]  Dennis Goeckel,et al.  Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[42]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[43]  Moe Z. Win,et al.  Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.

[44]  Zhiguo Ding,et al.  Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.

[45]  S. M. Heemstra de Groot,et al.  Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.

[46]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[47]  Ness B. Shroff,et al.  Energy-Efficient Interference-Based Routing for Multi-Hop Wireless Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[48]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.