ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Optimal power allocation for protective jamming in wireless networks: A flow based model

Sarma, Siddhartha and Kuri, Joy (2015) Optimal power allocation for protective jamming in wireless networks: A flow based model. In: COMPUTER NETWORKS, 81 . pp. 258-271.

[img] PDF
com_net-81_258_2015.pdf - Published Version
Restricted to Registered users only

Download (880kB) | Request a copy
Official URL: http://dx.doi.org/10.1016/j.comnet.2015.02.011


We address the problem of passive eavesdroppers in multi-hop wireless networks using the technique of friendly jamming. The network is assumed to employ Decode and Forward (DF) relaying. Assuming the availability of perfect channel state information (CSI) of legitimate nodes and eavesdroppers, we consider a scheduling and power allocation (PA) problem for a multiple-source multiple-sink scenario so that eavesdroppers are jammed, and source-destination throughput targets are met while minimizing the overall transmitted power. We propose activation sets (AS-es) for scheduling, and formulate an optimization problem for PA. Several methods for finding AS-es are discussed and compared. We present an approximate linear program for the original nonlinear, non-convex PA optimization problem, and argue that under certain conditions, both the formulations produce identical results. In the absence of eavesdroppers' CSI, we utilize the notion of Vulnerability Region (VR), and formulate an optimization problem with the objective of minimizing the VR. Our results show that the proposed solution can achieve power-efficient operation while defeating eavesdroppers and achieving desired source-destination throughputs simultaneously. (C) 2015 Elsevier B.V. All rights reserved.

Item Type: Journal Article
Additional Information: Copy right for this article belongs to the ELSEVIER SCIENCE BV, PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS
Keywords: Wireless network; Optimal power allocation; Friendly jamming; Eavesdroppers; Scheduling; Vulnerability region
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 29 May 2015 05:55
Last Modified: 29 May 2015 05:55
URI: http://eprints.iisc.ac.in/id/eprint/51611

Actions (login required)

View Item View Item