Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying

In this paper, we study the problem of secure routing in a multihop wireless ad-hoc network in the presence of randomly distributed eavesdroppers. Specifically, the locations of the eavesdroppers are modeled as a homogeneous Poisson point process (PPP) and the source-destination pair is assisted by intermediate relays using the decode-and-forward (DF) strategy. We analytically characterize the physical layer security performance of any chosen multihop path using the end-to-end secure connection probability (SCP) for both colluding and noncolluding eavesdroppers. To facilitate finding an efficient solution to secure routing, we derive accurate approximations of the SCP. Based on the SCP approximations, we study the secure routing problem, which is defined as finding the multihop path having the highest SCP. A revised Bellman-Ford algorithm is adopted to find the optimal path in a distributed manner. Simulation results demonstrate that the proposed secure routing scheme achieves nearly the same performance as exhaustive search.

[1]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[2]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Xiangyun Zhou,et al.  When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[5]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[6]  G. Nemhauser,et al.  Integer Programming , 2020 .

[7]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[8]  Dimitri P. Bertsekas,et al.  Data Networks , 1986 .

[9]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[10]  Walid Saad,et al.  Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks , 2012, IEEE Transactions on Wireless Communications.

[11]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[12]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[13]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[14]  Dennis Goeckel,et al.  Jamming-aware minimum energy routing in wireless networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[15]  Xiangyun Zhou,et al.  Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.

[16]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[17]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[18]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[19]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[20]  Jeffrey G. Andrews,et al.  Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.

[21]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[22]  T. Mattfeldt Stochastic Geometry and Its Applications , 1996 .

[23]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[24]  Il-Min Kim,et al.  Optimal power allocation for secure multi-carrier relay systems , 2011, 2011 8th International Workshop on Multi-Carrier Systems & Solutions.

[25]  S. Amari,et al.  Closed-form expressions for distribution of sum of exponential random variables , 1997 .

[26]  Zhiguo Ding,et al.  Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.

[27]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[28]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[29]  Abbas Jamalipour,et al.  Outage Performance Analysis of Imperfect-CSI-Based Selection Cooperation in Random Networks , 2014, IEEE Transactions on Communications.

[30]  Mohamed Saad,et al.  Joint Optimal Routing and Power Allocation for Spectral Efficiency in Multihop Wireless Networks , 2014, IEEE Transactions on Wireless Communications.

[31]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[32]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[33]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.