Minimum energy routing and jamming to thwart wireless network eavesdroppers

M Ghaderi, D Goeckel, A Orda… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
There is a rich recent literature on information-theoretically secure communication at the
physical layer of wireless networks, where secret communication between a single …

Efficient wireless security through jamming, coding and routing

M Ghaderi, D Goeckel, A Orda… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
There is a rich recent literature on how to assist secure communication between a single
transmitter and receiver at the physical layer of wireless networks through techniques such …

Energy-efficient secrecy in wireless networks based on random jamming

A Sheikholeslami, M Ghaderi… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper considers secure energy-efficient routing in the presence of multiple passive
eavesdroppers. Previous work in this area has considered secure routing assuming …

Secure routing with power optimization for ad-hoc networks

HM Wang, Y Zhang, DWK Ng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider the problem of joint secure routing and transmit power
optimization for a multi-hop ad-hoc network under the existence of randomly distributed …

Security-capacity trade-off in large wireless networks using keyless secrecy

S Vasudevan, D Goeckel, DF Towsley - Proceedings of the eleventh …, 2010 - dl.acm.org
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless
fading channels to achieve secret communication in a large wireless network of n randomly …

A game with randomly distributed eavesdroppers in wireless ad hoc networks: A secrecy EE perspective

Y Kwon, X Wang, T Hwang - IEEE Transactions on Vehicular …, 2017 - ieeexplore.ieee.org
We study energy-efficient secure communication using the combined approach of game
theory and stochastic geometry in a large-scale wireless network, where legitimate …

On secrecy capacity scaling in wireless networks

OO Koyluoglu, CE Koksal… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
This paper studies the achievable secure rate per source-destination pair in wireless
networks. First, a path loss model is considered, where the legitimate and eavesdropper …

Optimum power allocation against information leakage in wireless network

S Bashar, Z Ding - GLOBECOM 2009-2009 IEEE Global …, 2009 - ieeexplore.ieee.org
We investigate the problem of eavesdropping control in wireless communications networks.
When a confidential message is transmitted through a wireless network, there is a potential …

Secure wireless network connectivity with multi-antenna transmission

X Zhou, RK Ganti, JG Andrews - IEEE Transactions on Wireless …, 2010 - ieeexplore.ieee.org
Information-theoretic security constraints reduce the connectivity of wireless networks in the
presence of eavesdroppers, which motivates better modeling of such networks and the …

Tree formation with physical layer security considerations in wireless multi-hop networks

W Saad, X Zhou, B Maham, T Basar… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Physical layer security has emerged as a promising technique that complements existing
cryptographic approaches and enables the securing of wireless transmissions against …