Towards achieving full secrecy rate in wireless networks: A control theoretic approach

In this paper, we consider a single-user secure data communication system. Data packets arriving at the transmitter are enqueued at a data queue to be transmitted to the receiver over a block fading channel, securely from an eavesdropper that listens to the transmitter over another independent block fading channel. We address two separate problems, both of which involve the maximization of a long-term average utility, defined as a function of the number of secure packets transmitted in each time slot. We propose a transmission controller and an admission controller based on simple index policies that do not rely on any prior statistical information on the data arrival process. The former chooses a random key generation (and transmission) rate as well as the secure data transmission rate in each time slot. Part of the data is secured by the available secrecy rate while the other part is encrypted by the key bits, enqueued at both the transmitter and the receiver. The latter chooses the amount of data admitted by the transmitter to be enqueued in the data queue. We show that our controller pair has a provably efficient performance. Also, we illustrate via simulations that the use of a key queue reduces the queuing delay for the data packets, while serving packets that are admitted at the maximum admissible rate. To our best knowledge, this is the first work that addresses the queuing delay in the context of secrecy.

[1]  Ness B. Shroff,et al.  Joint Power and Secret Key Queue Management for Delay Limited Secure Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[2]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[3]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[4]  Sennur Ulukus,et al.  The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.

[5]  Özgür Erçetin,et al.  Control of Wireless Networks With Secrecy , 2010, IEEE/ACM Transactions on Networking.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Donald F. Towsley,et al.  Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.

[8]  Ness B. Shroff,et al.  Resource Allocation in Sensor Networks with Renewable Energy , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[9]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[10]  Martin Haenggi,et al.  Secrecy coverage , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[11]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[12]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[13]  C. Emre Koksal,et al.  On the effect of colluding eavesdroppers on secrecy capacity scaling , 2010, 2010 European Wireless Conference (EW).

[14]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[15]  Alexander L. Stolyar,et al.  Greedy primal-dual algorithm for dynamic resource allocation in complex networks , 2006, Queueing Syst. Theory Appl..

[16]  A. Robert Calderbank,et al.  Modeling location uncertainty for eavesdroppers: A secrecy graph approach , 2010, 2010 IEEE International Symposium on Information Theory.

[17]  C. Emre Koksal,et al.  On the Effect of Colluding Eavesdroppers on Secrecy Scaling , 2009 .

[18]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[19]  Leandros Tassiulas,et al.  Jointly optimal routing and scheduling in packet radio networks , 1992, IEEE Trans. Inf. Theory.

[20]  Moustafa Youssef,et al.  On the delay limited secrecy capacity of fading channels , 2009, 2009 IEEE International Symposium on Information Theory.

[21]  Michael J. Neely Energy Optimal Control for Time-Varying Wireless Networks , 2006, IEEE Trans. Inf. Theory.

[22]  H. Vincent Poor,et al.  Secret communication with feedback , 2008, 2008 International Symposium on Information Theory and Its Applications.

[23]  Ness B. Shroff,et al.  A framework for opportunistic scheduling in wireless networks , 2003, Comput. Networks.