2017
DOI: 10.1016/j.comnet.2017.05.012
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer security-aware routing and performance tradeoffs in ad hoc networks

Abstract: Abstract-The application of physical layer security in ad hoc networks has attracted considerable academic attention recently. However, the available studies mainly focus on the single-hop and two-hop network scenarios, and the price in terms of degradation of communication quality of service (QoS) caused by improving security is largely uninvestigated. As a step to address these issues, this paper explores the physical layer securityaware routing and performance tradeoffs in a multi-hop ad hoc network. Specif… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 49 publications
0
11
0
Order By: Relevance
“…On the other hand, to limit the information leakage at bit-level, the physical layer security technique is exploited to guarantee the secure video transmission [114]. Moreover, physical layer security aware routing for multi-hop ad hoc networks are investigated [115][116][117]. Other researchers study the physical layer authentication [118,119].…”
Section: Other Important Research Workmentioning
confidence: 99%
“…On the other hand, to limit the information leakage at bit-level, the physical layer security technique is exploited to guarantee the secure video transmission [114]. Moreover, physical layer security aware routing for multi-hop ad hoc networks are investigated [115][116][117]. Other researchers study the physical layer authentication [118,119].…”
Section: Other Important Research Workmentioning
confidence: 99%
“…Later, Yao et al [23] studied the PLS-based routing in a multihop wireless network with the decode-and-forward relaying scheme. In our previous studies [43]- [45], we investigated that how to design the routing protocol which can guarantee the transmission security while ensuring the communication quality of service, and explored the tradeoff issue between the two aspects. More recently, Xu et al [46] designed a secure routing mechanism for multi-hop cognitive radio networks with the aid of artificial noise.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, diverse applications of PLS in wireless communication systems have been proposed in the literature. For example, the works of [14]- [16] studied PLS for 5G wireless networks; the works of [17]- [23] discussed the cooperative jamming and relay selection strategies in two hop cooperative networks with the consideration of PHY-SCE; the works of [24]- [27] explored the PLS based routing in multi-hop wireless networks. For a detailed survey on PLS in wireless communication systems, please kindly refer to [28]- [32] and the references therein.…”
Section: Introductionmentioning
confidence: 99%