Loading [MathJax]/extensions/MathMenu.js
Joint scheduling & jamming for data secrecy in wireless networks | IEEE Conference Publication | IEEE Xplore

Joint scheduling & jamming for data secrecy in wireless networks


Abstract:

The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computationa...Show More

Abstract:

The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee non-zero secrecy rate in single source, single destination multi-hop networks with eavesdroppers for two cases: when eavesdropper locations and channel gains are known and when their positions are unknown. We propose a two-phase solution which consists of finding activation sets and then obtaining transmit powers subject to SINR constraints for the case when eavesdropper locations are known. We introduce methods to find activation sets and compare their performance. Necessary but reasonable approximations are made in power minimization formulations for tractability reasons. For scenarios with no eavesdropper location information, we suggest vulnerability region (the area having zero secrecy rate) minimization over the network. Our results show that in the absence of location information average number of eavesdroppers who have access to data is reduced.
Date of Conference: 13-17 May 2013
Date Added to IEEE Xplore: 08 August 2013
ISBN Information:
Conference Location: Tsukuba, Japan

Contact IEEE to Subscribe

References

References is not available for this document.