Control of wireless networks with secrecy

Köksal, Can Emre and Erçetin, Özgür and Sarıkaya, Yunus (2013) Control of wireless networks with secrecy. IEEE/ACM Transactions on Networking, 21 (1). pp. 324-337. ISSN 1063-6692 (Print) 1558-2566 (Online)

This is the latest version of this item.

Full text not available from this repository. (Request a copy)


We consider the problem of cross-layer resource allocation in time-varying cellular wireless networks and incorporate information theoretic secrecy as a quality-of-service constraint. Specifically, each node in the network injects two types of traffic, private and open, at rates chosen in order to maximize a global utility function, subject to network stability and secrecy constraints. The secrecy constraint enforces an arbitrarily low mutual information leakage from the source to every node in the network, except for the sink node. We first obtain the achievable rate region for the problem for single-and multiuser systems assuming that the nodes have full channel state information (CSI) of their neighbors. Then, we provide a joint flow control, scheduling, and private encoding scheme, which does not rely on the knowledge of the prior distribution of the gain of any channel. We prove that our scheme achieves a utility arbitrarily close to the maximum achievable utility. Numerical experiments are performed to verify the analytical results and to show the efficacy of the dynamic control algorithm.
Item Type: Article
Uncontrolled Keywords: Cross-layer design; information-theoretic security; multiuser channels; network control; optimal scheduling; wireless secrecy
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Telecommunications
Faculty of Engineering and Natural Sciences > Academic programs > Electronics
Faculty of Engineering and Natural Sciences
Depositing User: Özgür Erçetin
Date Deposited: 16 Jan 2014 09:23
Last Modified: 01 Aug 2019 12:43

Available Versions of this Item

Actions (login required)

View Item
View Item