Security/QoS-aware route selection in multi-hop wireless ad hoc networks | IEEE Conference Publication | IEEE Xplore

Security/QoS-aware route selection in multi-hop wireless ad hoc networks


Abstract:

Recently extensive works have been devoted to the performance analysis of physical layer security in wireless communication systems. However, the combination of physical ...Show More

Abstract:

Recently extensive works have been devoted to the performance analysis of physical layer security in wireless communication systems. However, the combination of physical layer security and quality of service (QoS) for route selection in multi-hop wireless ad hoc networks (WANETs) still remains an open technical challenge. As an initial step towards this end, this paper focuses on a multi-hop WANET with two typical transmission schemes amplify-and-forward (AF) and decode-and-forward (DF), and explores the route selection with the consideration of both security and QoS. We first derive the closed-form expressions of secrecy outage probability (SOP) and connection outage probability (COP) for a single hop link, and further extend the results to an end-to-end route. Then we conduct the performance comparison between the AF scheme and DF scheme. Finally, based on both the SOP and COP of a route, we formulate the route metric and propose a flexible route selection algorithm which enables us to select the suitable route for message delivery according to different security and QoS requirements.
Date of Conference: 22-27 May 2016
Date Added to IEEE Xplore: 14 July 2016
ISBN Information:
Electronic ISSN: 1938-1883
Conference Location: Kuala Lumpur, Malaysia

I. Introduction

Network security has become a major concern in modern communication networks [1]. For wireless ad hoc networks (WANETs), protecting the secrecy of user messages is more challenging due to both the broadcast nature of wireless channel and the lack of central administration [2]. The traditional approach for guaranteeing the security in a wireless environment is to employ the cryptographic techniques at network layer [3]. However, the cryptographic-based method is not applicable in a resource-limited WANET since it incurs high computing complexity and thus the high energy consumption.

Contact IEEE to Subscribe

References

References is not available for this document.