Efficient wireless security through jamming, coding and routing

There is a rich recent literature on how to assist secure communication between a single transmitter and receiver at the physical layer of wireless networks through techniques such as cooperative jamming. In this paper, we consider how these single-hop physical layer security techniques can be extended to multi-hop wireless networks and show how to augment physical layer security techniques with higher layer network mechanisms such as coding and routing. Specifically, we consider the secure minimum energy routing problem, in which the objective is to compute a minimum energy path between two network nodes subject to constraints on the end-to-end communication secrecy and goodput over the path. This problem is formulated as a constrained optimization of transmission power and link selection, which is proved to be NP-hard. Nevertheless, we show that efficient algorithms exist to compute both exact and approximate solutions for the problem. In particular, we develop an exact solution of pseudo-polynomial complexity, as well as an o-optimal approximation of polynomial complexity. Simulation results are also provided to show the utility of our algorithms and quantify their energy savings compared to a combination of (standard) security-agnostic minimum energy routing and physical layer security. In the simulated scenarios, we observe that, by jointly optimizing link selection at the network layer and cooperative jamming at the physical layer, our algorithms reduce the network energy consumption by half.

[1]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[2]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[3]  Upamanyu Madhow,et al.  Receiver-coordinated distributed transmit nullforming with channel state uncertainty , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[4]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[5]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2013 IEEE Rural Electric Power Conference (REPC).

[6]  Marco Gruteser,et al.  Phantom: Physical layer cooperation for location privacy protection , 2012, 2012 Proceedings IEEE INFOCOM.

[7]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[8]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.

[9]  Jill Britton,et al.  Introduction to Tessellations , 1990 .

[10]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[11]  Yuguang Fang,et al.  SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[14]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[15]  Kamal Jain Security based on network topology against the wiretapping attack , 2004, IEEE Wireless Communications.

[16]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[17]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[18]  H. Vincent Poor,et al.  Distributed transmit beamforming: challenges and recent progress , 2009, IEEE Communications Magazine.

[19]  Sisi Liu,et al.  Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2010, IEEE Trans. Mob. Comput..

[20]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[21]  Donald F. Towsley,et al.  Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.

[22]  Raghuraman Mudumbai,et al.  A Scalable Architecture for Distributed Transmit Beamforming with Commodity Radios: Design and Proof of Concept , 2013, IEEE Transactions on Wireless Communications.

[23]  Satoshi Nagata,et al.  Coordinated multipoint transmission and reception in LTE-advanced: deployment scenarios and operational challenges , 2012, IEEE Communications Magazine.

[24]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[25]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[26]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[27]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[28]  Moe Z. Win,et al.  Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.

[29]  Zhiguo Ding,et al.  Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.

[30]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[31]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[32]  Soura Dasgupta,et al.  Fully wireless implementation of distributed beamforming on a software-defined radio platform , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).

[33]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[34]  Raghuraman Mudumbai,et al.  Distributed beamforming with software-defined radios: Frequency synchronization and digital feedback , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[35]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[36]  H. Vincent Poor,et al.  Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.

[37]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[38]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[39]  G. Turin The characteristic function of Hermitian quadratic forms in complex normal variables , 1960 .

[40]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[41]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels with Imperfect ECSI , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[42]  Danny Raz,et al.  A simple efficient approximation scheme for the restricted shortest path problem , 2001, Oper. Res. Lett..

[43]  M.Z. Win,et al.  Physical-layer security in stochastic wireless networks , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[44]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .