SecDCF: An Optimized Cross-Layer Scheduling Scheme Based on Physical Layer Security

Scheduling schemes of wireless networks determine packet transmission opportunities for each network node by considering network parameters such as link quality, transmission rate, and delay. However, security has not been taken into account in these schemes, although it plays a critical role in network performance. In this paper a new scheduling scheme is proposed to determine packet transmissions under the constraint of achieving perfect physical layer security. Incorporating this new scheduling scheme into the distributed coordination function (DCF) of IEEE 802.11 medium access control (MAC) leads to a secure MAC protocol called SecDCF. Simulations are conducted to evaluate the performance of SecDCF, and results illustrate that SecDCF significantly outperform IEEE 802.11 DCF when physical layer security is enforced.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Matthew S. Gast 802.11 Wireless Networks - the Definitive Guide: Creating and Administering Wireless Networks: Covers 802.11a, G, N and I (2nd Ed.) , 2002 .

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Scott D. Lathrop,et al.  Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[5]  G. Simons Great Expectations: Theory of Optimal Stopping , 1973 .

[6]  Lang Tong,et al.  Single-user channel estimation and equalization , 2000, IEEE Signal Process. Mag..

[7]  David Siegmund,et al.  Great expectations: The theory of optimal stopping , 1971 .

[8]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[9]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[10]  Martin Herdegen Optimal Stopping and Applications Example 2 : American options , 2009 .

[11]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[12]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[13]  Ender Tekin,et al.  Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming" , 2010, IEEE Trans. Inf. Theory.

[14]  Junshan Zhang,et al.  Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach , 2009, IEEE Transactions on Information Theory.