Optimum routing protection against cumulative eavesdropping in multihop wireless networks

S Bashar, Z Ding - MILCOM 2009-2009 IEEE Military …, 2009 - ieeexplore.ieee.org
We investigate the risk associated with multihop wireless communications due to
eavesdropping. When the same message traverses cross a multihop wireless network …

Energy-efficient secrecy in wireless networks based on random jamming

A Sheikholeslami, M Ghaderi… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper considers secure energy-efficient routing in the presence of multiple passive
eavesdroppers. Previous work in this area has considered secure routing assuming …

Using friendly jamming to improve route security and quality in ad hoc networks

M Adams, VK Bhargava - 2017 IEEE 30th Canadian …, 2017 - ieeexplore.ieee.org
Friendly jamming is a physical layer security technique that utilizes extra available nodes to
jam any eavesdroppers. This paper considers the use of additional available nodes as …

Optimum power allocation against information leakage in wireless network

S Bashar, Z Ding - GLOBECOM 2009-2009 IEEE Global …, 2009 - ieeexplore.ieee.org
We investigate the problem of eavesdropping control in wireless communications networks.
When a confidential message is transmitted through a wireless network, there is a potential …

Secure routing for multihop ad hoc networks with inhomogeneous eavesdropper clusters

G Chen, JP Coon, SE Tajbakhsh - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper studies finding the secure path according to the secrecy connectivity probability
(SCP) in the multihop ad hoc networks in the presence of inhomogeneous eavesdropper …

Secure wireless network connectivity with multi-antenna transmission

X Zhou, RK Ganti, JG Andrews - IEEE Transactions on Wireless …, 2010 - ieeexplore.ieee.org
Information-theoretic security constraints reduce the connectivity of wireless networks in the
presence of eavesdroppers, which motivates better modeling of such networks and the …

Rate allocation for multipath routing in wireless multihop networks with security constraints based on erasure channel modeling

J Choi - IEEE transactions on communications, 2012 - ieeexplore.ieee.org
Multipath routing can offer various advantages for wireless multihop networks. Among those
advantages, in this paper, we focus on an advantage of multipath routing for security using …

Secure routing with power optimization for ad-hoc networks

HM Wang, Y Zhang, DWK Ng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider the problem of joint secure routing and transmit power
optimization for a multi-hop ad-hoc network under the existence of randomly distributed …

Eavesdropper-Tolerance Capability in Two-HopWireless Networks via Cooperative Jamming.

Y Zhang, Y Shen, J Zhu, X Jiang - Adhoc & Sensor Wireless …, 2015 - search.ebscohost.com
Two-hop relay wireless network serves as an important network model for the performance
study of general wireless networks, while cooperative jamming has been a promising …

Position-based jamming for enhanced wireless secrecy

JP Vilela, PC Pinto, J Barros - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Signal interference and packet collisions are typically viewed as negative factors that hinder
wireless communication networks. When security is the primary concern, signal interference …