2016
DOI: 10.1109/tcomm.2015.2514094
|View full text |Cite
|
Sign up to set email alerts
|

Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying

Abstract: Abstract-In this paper, we study the problem of secure routing in a multihop wireless ad-hoc network in the presence of randomly distributed eavesdroppers. Specifically, the locations of the eavesdroppers are modeled as a homogeneous Poisson point process (PPP) and the source-destination pair is assisted by intermediate relays using the decode-and-forward (DF) strategy. We analytically characterize the physical layer security performance of any chosen multihop path using the end-to-end secure connection probab… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
48
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(49 citation statements)
references
References 30 publications
1
48
0
Order By: Relevance
“…To study the secure transmission problem without eavesdroppers' channel states, stochastic geometry has been introduced as a powerful tool in many works [28]- [31]. These works usually model the distribution of eavesdroppers as homogenous Poisson point process (PPP) and study the secrecy performance for such networks.…”
Section: A Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…To study the secure transmission problem without eavesdroppers' channel states, stochastic geometry has been introduced as a powerful tool in many works [28]- [31]. These works usually model the distribution of eavesdroppers as homogenous Poisson point process (PPP) and study the secrecy performance for such networks.…”
Section: A Backgroundmentioning
confidence: 99%
“…The authors in [29] studied the secrecy performance of multi-input multi-output (MIMO) channels with and without artificial noise. The authors in [30] derived the secure connection probability for relay transmission while the authors in [31] obtained the secrecy outage probability for multi-hop transmission. Although the above works have studied both the singleand multi-hop transmission with a single antenna or multiple antennas, the system parameters are all preset as constants and not able to be adapted according to some available channel states.…”
Section: A Backgroundmentioning
confidence: 99%
“…Additionally, the appropriately modified Viterbi decoding algorithm [14], [15] has also been utilized for solving single-component routing optimization problems, where the route exploration process can be viewed as a trellis graph and thus the routing problem is transformed into a decoding problem. Explicitly, this transformation is reminiscent of the famous Bellman-Ford algorithm [16].…”
Section: Mo-acomentioning
confidence: 99%
“…We consider a W × L rectangular monitoring area, within which there are N sensor nodes and one sink node. The set of all nodes is given by S = {s 1 We assume all sensor nodes are initialized with the same amount of energy. -Each sensor node can be either Cluster Header (CH) or Cluster Member (CM), depending on the design of routing protocol.…”
Section: Assumptionmentioning
confidence: 99%
“…Over the last decade, the research on Wireless Sensor Networks (WSNs) or WANETs has been receiving great attention from academic and industrial communities. WSNs generally include a number of sensor nodes and given sink node deployed in an area, mainly for event monitoring and detection, data collection and transmission [1][2][3][4]. However, sensor nodes are inherently batterypowered, and it is also difficult to recharge their energy once being used.…”
Section: Introductionmentioning
confidence: 99%