Next Article in Journal
Randomized Parameterized Algorithms for the Kidney Exchange Problem
Previous Article in Journal
Selective Offloading by Exploiting ARIMA-BP for Energy Optimization in Mobile Edge Computing Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secrecy Control of Wireless Networks with Finite Encoding Blocklength

Nanchang of Jiangxi University of Science and Technology, 1180 Shuanggang Road, Nanchang 330013, China
*
Author to whom correspondence should be addressed.
Algorithms 2019, 12(2), 49; https://doi.org/10.3390/a12020049
Submission received: 28 December 2018 / Revised: 15 February 2019 / Accepted: 20 February 2019 / Published: 25 February 2019

Abstract

:
We consider wireless multi-hop networks in which each node aims to securely transmit a message. To guarantee the secure transmission, we employ an independent randomization encoding strategy to encode the confidential message. We aim to maximize the network utility. Based on the finite length of a secrecy codewords strategy, we develop an improved control algorithm, subject to network stability and secrecy outage requirements. On the basis of the Lyapunov optimization method, we design an control algorithm, which is decomposed into end-to-end secrecy encoding, flow control and routing scheduling. The simulation results show that the proposed algorithm can achieve a utility result that is arbitrarily close to the optimal value. Finally, the performance of the proposed control policy is validated with various network conditions.

1. Introduction

A wireless multi-hops network is a decentralized network which is contained by a set of nodes. The message is transmitted over the wireless channel with multi-hops mode. Since the wireless channel is a broadcast channel, it is easy to eavesdrop on the data transmission. Therefore, when designing a network, in addition to considering the quality of service (QoS) constraint, the data transmission security should also be involved. In 1975, Wyner [1] studied a wire-tapped noisy channel and encoded the data to confuse the eavesdropper. After ground-breaking work in [1], many works have tackled the secrecy transmission of wireless networks. Liang et al. [2] considered a cellular network where the base station needed to transmit data to multiuser confidentially, they designed a dynamic control algorithm to maximize the network utility by employing infinite secrecy encoding block. Since secrecy outage was inevitable, Wang et al. [3] investigated the secrecy outage and and secrecy rate in a multiuser wireless systems. Jointly considering the reliability, security and stability, they designed an optimal online control algorithm by exploiting stochastic network optimization method. Later, in [4], the authors also considered a multi-user wireless scenario with imperfectly known channels. They aimed to maximize the worst case of secrecy throughput and developed a low complexity and rapid convergence algorithm for the optimal power allocation. In [5], Koksal et al. investigated a cross-layer security in wireless network and proposed a dynamic control algorithm to maximize the network utility. After that, in [6], aiming to minimize the secrecy outage probability, the authors extended the dynamic control algorithm to a cognitive radio network and developed a bandwidth and resource allocation algorithm.
Recently, on the basis of the works mentioned above, the secrecy control problem in wireless networks has been extensively studied, such as the OFDMA-based wireless network and cognitive wireless network. In [7,8], the authors formulated an analytical framework for secure resource allocation in a downlink OFDMA-based broadband network. Jointly considering the power and subcarrier allocation, they proposed an optimal algorithm to maximize the average aggregate rate of all users for a base station. In [9], the authors extended the cellular network to cognitive network and proposed a scheduling policy to maximize the secrecy rate of second users. In [10,11], they designed a scheduling policy in cognitive radio networks to analyze the ergodic capacity on the impact of fading channel and distributed eavesdroppers. In [12], Maged et al. considered the cognitive wiretap channel and proposed multiple antennas to secure the transmission at the physical layer. They revealed the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.
Although these security control algorithms improved the network performance, most of them focused on the cellular networks. In contrast, for the multi-hop wireless networks, there were few works involved. In [13,14], the authors considered a multi-hop wireless network and proposed an optimal control to maximize the network throughput. However, they did not consider the data transmission security. In [15,16], the authors investigate the confidential message secure transmission in a large scale wireless networks. By using infinite secure encoding blocklength, they derived the secrecy throughput with ideal control policies. After that, Zheng et al. [17] extended the infinite secure encoding blocklength to the finite case and revealed the relation of secrecy outage probability to the length of codewords. As for the mobile ad hoc networks, Li et al. [18] jointly exploited cooperative jamming and secrecy guard zone scheme and derived the exact secrecy throughput based on the physical layer security technology. To enhance security, Zhu et al. [19] employed directional antennas and evaluated the secure secrecy performance in millimeter wave ad hoc networks. While for the wireless multi-hop networks, He [20] proposed a dynamic control algorithm in multi-hop wireless network with untrusted relays. While in [21], Sarikaya et al. considered a multi-hop network with random and independent node distribution. To guarantee the secrecy transmission, they developed a strategy to encode the confidential message with multi-path transmission and infinite coding block length. By using stochastic network optimization [22], they developed a control policy to stable the network and maximize the network utility, which combines end-to-end secrecy encoding, routing scheme and the resource allocation algorithm. However, most of the works mentioned above only focused on cellular networks security or multi-hop wireless networks with multi-path transmission strategy to guarantee the security.
In this paper, we consider the secrecy control problem in multi-hop wireless network, which is extended work of our previous work [23]. In [23], we have developed a secrecy control algorithm to maximize the network utility, while the blocklength of secrecy encoding is infinite. For the case of finite blocklength, it would be much more complicated since perfect secrecy is not possible. To deal with this scenario, We exploit an independent randomization encoding strategy to guarantee the security and define a secrecy outage probability. Given a constraint on the probability of secrecy outage, we develop an improved control algorithm, which is decomposed into end-to-end secrecy encoding, flow control and routing scheduling such that the network stability and secrecy outage constraint are satisfied. Finally, we prove that the performance of proposed control policies can close to the optimal utility result asymptotically.
The rest of the paper is organized as follows. In Section 2, we introduce the network model and problem formulation. Section 3 proposes an improve control policy with finite secrecy codewords. Section 4 evaluates the proposed policy with various network conditions. Finally, the paper is concluded in Section 5.

2. System Models

2.1. Network Model

The wireless Ad hoc network is formed by M legitimate nodes and L links connecting the nodes. As shown in Figure 1, for a link l { 1 , 2 , , L } , let T ( l ) and D ( l ) be the set of transmitter and receiver nodes on link l. The eavesdroppers set is denoted as E. In the network system, each node wishes to transmit its confidential message to the destination via a multi-hops manner against eavesdroppers. We assume the network operates on a time-slotted model and the slot is normalized to integral unit t { 0 , 1 , 2 , } . In this work, there exists a reasonable assumption that the system Channel State Information (CSI) is known. As in [10], each node can get full-CSI by utilizing pilot symbols and CSI feedback process. For example, each node reports a received-signal-strength index to PBS in packets such as RSSI reports. Let S ( t ) = ( S 1 ( t ) , , S L ( t ) ) represent the channel state vector of link set L in slot t, which is a block fading channel and follows independent and identically distribution (i.i.d) and S l ( t ) is the channel state of link l. Note that S l ( t ) contains N < channels which implicates the perfect secrecy [1] cannot satisfy. Let R l ( t ) and R ¯ l e ( t ) denote the achievable rate on link l and the maximum overhearing rate of eavesdropper e, respectively. Since the network is a multi-commodity problem, each flow is identified by its destination node c { 1 , , M } . Let λ n c s ( t ) be the arrival confidential data at node n and destined for node c, which is bounded by λ n c max . As shown in Figure 1, there is a control valve at each node to admit R n c s ( t ) confidential data into the network. For each flow c, let Q n c ( t ) be the queue backlog at node n. If c = n , Q n n ( t ) = 0 for all n and t.
Since the data is transmitted by wireless channel, there exists simultaneous transmission interference. Thus, Link set L can not be fully utilized. Let g be a link set that can be transmitted simultaneously, and G denote the collection of all sets of the link set g, where set G is determined by the network interference model. We also define an indicator variable I g ( t ) to represent the decision of the network in slot t, where I g ( t ) = 1 means the link set g is scheduled in slot t, otherwise it is 0. Similarly, indicator variable I i j n , c = 1 , if link ( i , j ) is employed to transmit the flow generated by source n to node c, otherwise it is 0. Thus, in slot t, the flow rate of source n to node c at link ( i , j ) is
μ i j n ( t ) = R i j ( t ) if ( i , j ) g , I g ( t ) = 1 , I i j n , c = 1 . 0 else
and the time average link rate is
μ ¯ i j n = lim t 1 t τ = 1 t μ i j n ( τ ) .
Due to the broadcast feature of wireless channel, the confidential message is overheard by eavesdroppers. To guarantee the secure transmission of confidential message, we employ Wyner’s encoding scheme [1] to encode the confidential message. Specifically, at each slot t and link l, using independent randomization encoding strategy, the transmitter, according to R l ( t ) and R ¯ l e ( t ) , encodes a mount of R n s ( t ) (may contain multiple flows) confidential message from its arrival data. Such that the maximum output confidential message rate R l s ( t ) can be denoted as R l ( t ) R ¯ l e ( t ) , if R l s ( t ) > R l ( t ) R ¯ l e ( t ) , secrecy outage occurs. Using this secrecy encoding strategy, we can guarantee the transmission security in each link. All the parameters that have been defined or would be used are presented in Table 1.

2.2. Problem Formulation

In [23], we have proposed a control algorithm according to the secrecy encoding, where the confidential message is encoded into an infinite codewords. Thus, it would involve an infinitely long delay to decode the confidential message. In this paper, we remove the assumption of infinite codewords, i.e., N < . Since the confidential message is encoded into a finite codeword, the perfect secrecy for all message can not be guaranteed. Thus, to embody the security of confidential message, we define the notion of secrecy outage. The secrecy outage occurs if the confidential message is intercepted by eavesdroppers. To evaluate the state of secrecy outage, we assume each source node can collect the knowledge of the confidential message accumulated by eavesdroppers. Such that the source node can identify the occurrence of secrecy outage. Although this assumption is somewhat ideal, it provides a better insight on the performance of secure communication in multi-hop network. In addition, according to the state of secrecy outage, each secrecy codeword k would encode different confidential message R n k , c s . Thus, an encoding scheme needs to be designed to satisfy the requirement of secrecy outage. Let R n p , c s be the average confidential message rate transmitted from node n to c, p n o u t ( R n k , c s ) denote the average secrecy outage of codeword k at node n, γ n be the maximum allowable portion of confidential message intercepted by the eavesdropper.
We aim to determine a joint scheduling, secrecy encoding scheme and routing algorithm that maximizes aggregate network utility. Let U n c ( x ) be utility obtained by source n destined to node c when the confidential transmission rate is x bits/channel use. We assume that U n c ( · ) is a continuously differentiable, increasing and strictly concave function. There is a finite backlog at the transport layer, which contains the secrecy-encoded messages. In each slot, source node n determines the amount of encoded information admitted to its queue at the network level. Let λ n c s ( t ) be the amount of traffic injected into the queue of source n and destined to node c at slot t. Our objective is to support the traffic demand to achieve a long term confidential rate that maximizes the sum of utilities. Then the optimization problem can be formulated as following:
max R n p , c s ( t ) , I g ( t ) , I i j n , c ( t ) : n , c U n c ( r ¯ n p , c s )
s . t . 0 R n p , c s ( t ) λ n c s ( t ) for all ( n , c )
{ j | ( i , j ) L } μ ¯ i j n { i | ( i , j ) L } μ ¯ i j n 0
R ¯ n o u t γ n R ¯ n c s
where R ¯ n c s = lim K 1 K k = 1 K R n n , c s , R ¯ n o u t = lim K 1 K k = 1 K R n n , c s p n o u t ( R n k , c s ) . Constraint (4) guarantees the average confidential message rate is not larger than the message arrival rate; Constraint (5) is the input flows and output flows constraint at the intermediate nodes; Constraint (6) is the requirement of maximum allowable portion of confidential message intercepted by eavesdropper.

3. Control with Finite Secrecy Codewords

Similar to the control algorithm proposed in [23], we exploit the Lyapunov penalty and drift to solve this problem. However, due to the secrecy codeword finite and secrecy outage occurrence, the queue model needs to be improved. In particular, as shown in Figure 2, source node is equipped with two separate queues which are operated at two different time scales. The first queue stores the message admitted into the network and Q n p , c ( t ) denotes the queue length in slot t. Let R n p , c s ( t ) be the admitted confidential message in slot t, which is transmitted from source node n to destination node c. R ¯ n p , c s represents the long-term average admitted confidential message. The departure of the first queue occurs only when a new secrecy codeword is generated in slot t. Let k n ( t ) be the number of secrecy codewords generated in slot t, and R n k n ( t ) , c s denote the confidential message encoded in k n ( t ) -th secrecy codeword. Since there are N channels, where N < , the actual transmitted confidential message is N R n k n ( t ) , c s and the length of secrecy codeword is N R n c , the second queue is a partial queue and let P n c ( t ) denote the queue length. In this queue, the data departures or not is depended the scheduling and routing policy. Only when the queue is empty, i.e., P n c ( t ) = 0 , a new secrecy codeword is allowed to admit into the queue. Thus, we have, if P n c ( t ) = 0 , k n ( t + 1 ) = k n ( t ) + 1 . According to the queue models defined above, the evolution of queues can be expressed as:
Q n p , c ( t + 1 ) = Q n p , c ( t ) N R n k n ( t + 1 ) , c s + + R n p , c s ( t ) if P n c ( t ) = 0 . Q n p , c ( t ) + R n p , c s ( t ) else
P n c ( t + 1 ) = N R n c if P n c ( t ) = 0 . P n c ( t ) i | ( n , i ) L μ n i n ( t ) + else
For each intermediate node, there exists a queue to store the packet from source node n to destination node c. Let Q i n , c ( t ) be the queue length. Then we have
Q i n , c ( t + 1 ) = Q i n , c ( t ) j | ( i , j ) L μ i j n ( t ) + + j | ( j , i ) L μ j i n ( t ) .
To evaluate the state of secrecy outage, we assume source node n can perceive the accumulated of confidential message at each eavesdropper, since it can check if some eavesdropper has intercepted the transmission. If it is impossible to know the information precisely, we will discuss in Section 4. Let Z e n , c ( t ) denote the number of bits that must be accumulated by eavesdropper e in slot t to decode the k n ( t ) -th confidential message. Note that, for any eavesdroppers e, if Z e n , c ( t ) = 0 , then secrecy outage of the k n ( t ) -th confidential message is occurred. Let R ¯ e ( t ) be the maximum rate that eavesdropper can be achieved, then the evolution of queue Z e n , c ( t ) can be denoted as
Z e n , c ( t + 1 ) = R n c R n k n ( t + 1 ) , c s N if P n c ( t ) = 0 . Z e n , c ( t ) R ¯ e ( t ) + else
For the constraint (6), a virtual queue Y n k , c is constructed, which is employed to record the state of secrecy outage. Thus, if the k-th confidential message is secrecy outage, then the arrival rate of queue Y n k , c is R n k , c s , else it is 0. The evolution of queue Y n k , c is:
Y n k + 1 , c ( t + 1 ) = Y n k , c ( t ) + R n k , c s γ n R n k , c s + if k - th message is outage . Y n k , c ( t ) γ n R n k , c s + else
The arrival and departure of virtual queue Y n k , c is the number of confidential message bits undergoing secrecy outage, and the number of confidential message bits allowed to be outage, which is constrained by parameter γ n . The value of Y n k , c indicates the amount that we have exceeded the allowable secrecy outage constraint. Hence, the larger the value of Y n k , c , the more conservative our control algorithm needs to be to meet these constraints. That is, a less confidential message R n k n ( t ) , c s is encoded into the k n ( t ) -th codeword.
It is necessary to introduce the concept of strong stability. As a discrete time process, Q ( t + 1 ) = [ Q ( t ) μ ( t ) ] + + λ ( t ) is strongly stable if:
lim t sup 1 t τ = 0 t 1 E { Q ( τ ) } < ,
In particular, a multi-queue network is stable when all queues of the network are strongly stable. According to Strong Stability Theorem in [13], for finite variable μ ( t ) and λ ( t ) , strong stability implies a rate stability of Q ( t ) . The definition of rate stability can be found in [13] and omitted here.

3.1. Control Algorithm

For the secrecy transmission strategy with finite secrecy codewords, the control algorithm is:
Multi-hop Secrecy Control Algorithm with Finite Block (MSCAFB):
  • End-to-End Encoding: At each new secrecy codeword generation, i.e., P n c ( t ) = 0 , let k n ( t + 1 ) = k n ( t ) + 1 , the confidential message R n k n ( t + 1 ) , c s allowed to encode into a new codeword satisfies:
    R n k n ( t + 1 ) , c s = arg max r r Q n p , c ( t ) Y n k n ( t ) , c ( p n o u t ( r ) γ n ) .
  • Flow Control: In each slot t, for a given parameter V, the admitted confidential message at each source node n is:
    R n p , c s = arg max x V U n c ( x ) x Q n p , c ( t ) ,
  • Scheduling: In each slot t, if I g ( t ) = 1 and I i j n , c ( t ) = 1 , then the flow of node n is on the link ( i , j ) g and the scheduler selects the set of l , where
    ( n , l ) = arg max n , g { ( n , i ) g μ n i n ( t ) ( R n c R n k n ( t ) , c s Q n p , c ( t ) + P n c ( t ) Q i n , c ( t ) ) + ( i , j ) g μ i j n ( t ) Q i n , c ( t ) Q j n , c ( t ) e E e i Z e n , c ( t ) R ¯ e ( t ) } .
    The term R n c R n k n ( t ) , c s of Q n p , c ( t ) is used to normalize it to the value of other queues.
Note that, the long-term average secrecy outage p n o u t ( r ) is increasing with variable r. Once r increases, secrecy codeword is encoded with less randomization bits, such that eavesdropper can intercept the confidential message with a higher probability. Hence, as the queue length Q n p , c ( t ) increases, the confidential message R n k n ( t ) , c s is increased. Moreover, it decreases with the increasing of the virtual queue length Y n k n ( t ) , c , such that the constraints of problem (3) are satisfied.

3.2. Algorithm Performance

Using the Theorem of Lyapunov penalty and drift [22], we can also prove that the proposed control algorithm can close to the optimal arbitrarily. Let Q p ( t ) = ( Q 1 p , c ( t ) , , Q n p , c ( t ) ) denote the queue vector of the first queue in Figure 2, P n ( t ) = ( P 1 c ( t ) , , P n c ( t ) ) be the queue vector of the second queue in Figure 2, Q n ( t ) = ( Q 1 n , c ( t ) , , Q i n , c ( t ) ) represent the queue vector of intermediate nodes for flow c, Z n ( t ) = ( Z 1 n , c ( t ) , , Z e n , c ( t ) ) be the queue vector of leaked confidential message accumulated by eavesdropper and Y n k = ( Y 1 k , c , , Y n k , c ( t ) ) be the queue vector of secrecy outage. All the queue vectors can be denoted as Θ ( t ) Q p ( t ) , P n ( t ) , Q n ( t ) , Z n ( t ) , Y n k . Define a Lyapunov function as
L ( Θ ( t ) ) L Q p ( t ) , P n ( t ) , Q n ( t ) , Z n ( t ) , Y n k = 1 2 n ( Q n p , c ( t ) ) 2 + ( P n c ( t ) ) 2 + ( Q i n , c ( t ) ) 2 + ( Z e n , c ( t ) ) 2 + ( Y n k , c ) 2 .
Observing the state of all queues, we have the conditional expectation of on-step queuing evolutions, i.e., Lyapunov drift is:
Δ ( Θ ( t ) ) = E L ( Θ ( t + 1 ) ) L ( Θ ( t ) ) | Θ ( t ) .
Substituting the evolution expressions of all queues, we obtain the upper bound of Lyapunov drift is:
Δ ( Θ ( t ) ) B n E Q n p , c ( t ) R n p , c s ( t ) N R n k n ( t + 1 ) , c s n i n E Q i n , c ( t ) j | ( j , i ) L μ j i n ( t ) j | ( i , j ) L μ i j n ( t ) | Q n ( t ) n e E N R n Z e n , c ( t ) R n k n ( t ) , c s R n k n ( t + 1 ) , c s | Z n ( t ) k E Y n k , c ( R n k , c s γ n R n k , c s ) | Y n k .
Since the maximum transmission power is finite, all the rates of the network would be bounded. Additionally, the arrival rate λ n c m a x is also bounded. Hence, the parameter B is a nonnegative constant. Let the Lyapunov drift minus V E n , c U ( R ¯ n p , c s ) | Θ ( t ) , where V is a weight parameter, we obtain the Lyapunov drift and penalty equation:
Δ U ( Θ ( t ) ) Δ ( Θ ( t ) ) V E n , c U ( R ¯ n p , c s ) | Θ ( t ) .
According to the Lyapunov optimization theorem [22] and substituting (18) to (19), the upper bound of Δ U ( Θ ( t ) ) can be expressed as:
Δ U ( Θ ( t ) ) B n E Q n p , c ( t ) R n p , c s ( t ) N R n k n ( t + 1 ) , c s n i n E Q i n , c ( t ) j | ( j , i ) L μ j i n ( t ) j | ( i , j ) L μ i j n ( t ) | Q n ( t ) n e E N R n Z e n , c ( t ) R n k n ( t ) , c s R n k n ( t + 1 ) , c s | Z n ( t ) k E Y n k , c ( R n k , c s γ n R n k , c s ) | Y n k V E n , c U ( R ¯ n p , c s ) | Θ ( t ) ( R H S ) .
Rearranging and observing the R H S of (20), we find that the MSCAFB algorithm indeed minimizes the right hand side of (20).
If the arrival rates of each node are in the feasible region, based on the work in [22], there must exist a stationary scheduling, flow control and end-to-end encoding policy, which select the users and link rates independent of queue length and only relate to the channel statistics. This indicates that, if the channel statistics can be known a priori, the optimal control policy can be found as the solution of a deterministic policy. Let U be the optimal value of problem (3), R n c s and μ n denote the feasible and optimal arrival rate and transmission rate, respectively. Then, for all queues and any constants δ 1 , δ 2 and δ 3 , there must exists a network control policy that is independent of all queue lengths and satisfies the following inequalities:
{ i | ( n , i ) L } μ ¯ n i n μ n + δ 1 ,
{ j | ( i , j ) L } μ ¯ i j n { i | ( j , i ) L } μ ¯ j i n + δ 2 ,
R ¯ e ( t ) R ¯ e ( t ) + δ 3 .
Since the MSCAFB indeed minimizes the RSH of (20), such that any stationary control policies (including the optimal policy) need to satisfy (20). Inserting (21)–(23) into (20), we get the following upper bound of our control algorithm:
R H S o f ( 48 ) B n δ 1 E [ Q n p , c ( t ) ] n i n δ 2 E [ Q i n , c ( t ) ] n e δ 3 E [ Z e n , c ( t ) ] V U .
Rearrange (24), we obtain the performance of MSCAFB algorithm.

4. Numerical Results and Discussions

For the network model presented in Figure 1, we consider i.i.d Rayleigh fading channels between nodes. The ratio of transmit power and noise has been normalized to 1. Let h i , j be the power gain between node i and j, which follows exponential distribution and the mean of each link is presented in Table 2. The achievable rate between node i and j is R i , j ( t ) = log ( 1 + h i , j ( t ) ) and the rate of eavesdropper R i , e ( t ) = log ( 1 + h i , e ( t ) ) . The utility function is a logarithmic utility function, i.e., U n c ( t ) = κ + log ( R n c s ( t ) ) , where κ = 3 and R n c s ( t ) is the confidential rate selected by node n in slot t. We assume the confidential data arrival process for each user follows an i.i.d Bernoulli process with rate λ .
Firstly, we analyze the performance of MSCAFB algorithm. In the simulation, the maximum average confidential data arrival rate is 2 bit/s, since the bandwidth is assumed to be one. Choosing the parameter V { 10 , 20 , 80 } , we get the results in Figure 3 and Figure 4, where each value is collected by running 5000 times. Figure 3 shows the impact of increasing the average confidential data arrival rate on the utility function and Figure 4 depicts the average queue backlog in the network. From the simulation results, we find: (1) For a fixed V, when the arrival rate is low, Figure 3 indicates that the utility function linearly increases with the average admission confidential rate. The reason for this is that, if the arrival confidential rate is low, almost all the arrival confidential data can be admitted. (2) When the arrival confidential rate is larger than the secrecy channel capacity, the average admitted confidential rate turns into saturation. Not surprisingly, as the parameter V increases, we observe that the utility function grows closer to the optimal value. (3) While in Figure 4, the average queue backlog is increased with V dramatically. It indicates that the transmission delay is increased with V. Thus, the choice of V is indeed a tradeoff between average utility and short-term system performance. To achieve both large utility and low delay, we will discuss the selection of parameter V.
According to [22], the long-term average utility is proportion to 1 / V , such that we can rewrite the utility function as n , c U n c ( r ¯ n c s ( t ) ) n , c U n c ( r n c s ) B M / V , where n , c U n c ( r n c s ) denotes the optimal value and is a constant. Hence, the utility function is an increasing hyperbolic function of parameter V and a good operating point would be to pick a V value where an unit increases in V yields a very small reduction in utility. At this point, the utility gains may not be worth the delay increase resulting from increasing V (since delay is proportional to V). Let η > 0 be the slope of utility function n , c U n c ( r ¯ n c s ( t ) ) . Differentiating to V, i.e., d n , c U n c ( r n c s ) B M / V / d V = B M / V 2 = η , we have the good operating point of V = B M , where M is the number of nodes, and B 1 M n = 1 M λ n c m a x + R n , m a x i n , s 2 + ( R n , m a x o u t , s ) 2 . Based on the setting of simulation, i.e., M = 8 , B 20 and η 0 . 5 , we can obtain the good operating point V 20 .
Next, we analyze the performance of MSCAFB algorithm and compare with MSCA algorithm in [23]. Figure 5 reflects the influence of secrecy codeword length on the network utility, as well as comparing with infinite secrecy codeword. The average arrival of confidential message is 2 bit/s and the parameter V is 80. The maximum allowable portion of confidential message γ n is chosen from { 0 . 05 , 0 . 1 , 0 . 2 } , and the secrecy codeword length varies from { 50 , 100 , 500 , 1000 , 2000 , 4000 } bits. From Figure 5, we find: (1) When the secrecy codeword length is 50 bits, the network utility is only 30% of the optimal value. (2) With the increasing of secrecy codeword length, the network utility is increased. When secrecy codeword length is up to 1000 bits, the network utility trends to be gentle, but closes to the value with infinite secrecy codeword. The reason for this is that, when the secrecy codeword length is small, subject to the constraint of γ n , the confidential message inserted to the codeword is decreased. Such that the network utility is low, and vice versa. (3) The network utility is increased with the value of γ n . The reason is that, with γ n increasing, more confidential message can be inserted into a secrecy codeword. Particularly, when γ n = 0 . 2 and secrecy codeword length is 1000 bits, the network utility is larger than that of infinite secrecy codeword. In order to depict the influence of γ n on the network utility, we have Figure 6.
In Figure 6, assuming the secrecy codeword length is { 100 , 1000 , 4000 } bits, we vary γ n from 0 . 05 to 0 . 5 . The results show that: (1) With γ n increasing, we have the similar results with Figure 5. (2) With the increasing of secrecy codeword length, the threshold of γ n at which network utility is larger than that of infinite secrecy codeword is decreased. The reason is that larger secrecy codeword length means more confidential message can be inserted into a secrecy codeword. Particularly, when the secrecy codeword length is small, even γ n is large, the network utility can not exceed the optimal value. (3) Although both γ n and secrecy codeword length are large, the network utility can exceed the optimal value, it can not exceed the network capacity without secrecy constraint.
Each node needs the information of queue length from eavesdroppers to decide the control algorithm, considers a situation that queue length information is shared among all the nodes, but in some environment it is impossible to know this information precisely. Compared with getting perfect information about Z e n , c ( t ) , it is more realistic to know the time-average packet arrival rate of eavesdroppers. Considering this, we propose an imperfect estimation of Z e n , c ( t ) . The estimated queue length in legitimate node is:
Z ^ e n , c ( t + 1 ) = [ Z ^ e n , c ( t ) R ¯ e ( t ) ] + + ( R n k , c s + ι )
where ι is an over-estimated slack variable to queue stability. As to the control algorithm, we use Z ^ e n , c to substitute Z e n , c in resource allocation algorithm.

5. Conclusions

In this paper, we consider the online control problem of a multi-hop wireless network with a security constraint. To guarantee confidentiality in multi-hop transmission, we employed an independent randomization encoding strategy with infinite and finite secrecy codewords. Using the stochastic network optimization, we develop a dynamic control algorithm for finite secrecy encoding strategies. We also proved that the proposed control algorithm achieve an utility close to the optimal value asymptotically. Finally, we simulate the online control algorithm with various network scenarios. The results demonstrate that the value of utility approaches the optimum, while the average queue backlog increases very fast. Thus, how to make a tradeoff between performance and queue backlog should be the subject of future research.

Author Contributions

Q.L. proposed the idea, derived the results and wrote the paper. S.L. reviewed the article in initial and revised versions. C.Z. assisted to revise the paper. X.Q. and H.X. assisted in revising the paper.

Funding

This work was supported in part by National Natural Science Foundation of China (No. 61761021), Natural Science Foundation of Jiangxi Province (Grant No. 20181bab202018), Projects of Humanities and Social Sciences of universities in Jiangxi (JC18224, JY161012) and the Doctoral Research Fund of Jiangxi University of Science and Technology.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  2. Liang, Y.; Poor, H.V.; Ying, L. Secure communications over wireless broadcast networks: Stability and utility maximization. IEEE Trans. Inf. Forensics Secur. 2011, 6, 682–692. [Google Scholar] [CrossRef]
  3. Wang, X.; Chen, Y.; Cai, L.; Pan, J. Minimizing secrecy outage probability in multiuser wireless systems with stochastic traffic. IEEE Trans. Veh. Technol. 2017, 66, 6449–6460. [Google Scholar] [CrossRef]
  4. Sheng, Z.; Tuan, H.D.; Nasir, A.A.; Poor, H.V. Secrecy throughput of wireless interference networks with uncertain channel state information. In Proceedings of the IEEE Globecom Workshops (GC Wkshps), Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
  5. Koksal, C.E.; Ercetin, O.; Sarikaya, Y. Control of wireless networks with secrecy. In Proceedings of the Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 7–10 November 2010; pp. 47–51. [Google Scholar]
  6. Sarikaya, Y.; Ercetin, O.; Gurbuz, O. Control of cognitive networks with friendly jamming as a service. IEEE Trans. Cogn. Commun. Netw. 2018, 4, 299–313. [Google Scholar] [CrossRef]
  7. Wang, X.; Tao, M.; Mo, J.; Xu, Y. Power and subcarrier allocation for physical-layer security in ofdma-based broadband wireless networks. IEEE Trans. Inf. Forensics Secur. 2011, 6, 693–702. [Google Scholar] [CrossRef]
  8. Ng, D.W.K.; Lo, E.S.; Schober, R. Energy-efficient resource allocation for secure ofdma systems. IEEE Trans. Veh. Technol. 2012, 61, 2572–2585. [Google Scholar] [CrossRef]
  9. Zhu, X.; Yang, B.; Chen, C.; Xue, L. Cross-layer scheduling for ofdma-based cognitive radio systems with delay and security constraints. IEEE Trans. Veh. Technol. 2015, 64, 5919–5934. [Google Scholar] [CrossRef]
  10. Kang, X.; Liang, Y.C.; Nallanathan, A.; Garg, H.K.; Zhang, R. Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity. In Proceedings of the VTC Spring 2008—Vehicular Technology Conference, Singapore, 11–14 May 2008; pp. 1544–1548. [Google Scholar]
  11. Xu, X.; He, B.; Yang, W.; Zhou, X. Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2015, 11, 373–387. [Google Scholar] [CrossRef]
  12. Elkashlan, M.; Wang, L.; Duong, T.Q.; Karagiannidis, G.K. On the security of cognitive radio networks. IEEE Trans. Veh. Technol. 2015, 64, 3790–3795. [Google Scholar] [CrossRef]
  13. Neely, M.J.; Modiano, E.; Li, C.P. Fairness and optimal stochastic control for heterogeneous networks. IEEE/ACM Trans. Netw. 2008, 16, 396–409. [Google Scholar] [CrossRef]
  14. Cruz, R.L.; Santhanam, A.V. Optimal routing, link scheduling and power control in multihop wireless networks. In Proceedings of the IEEE INFOCOM 2003: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), San Francisco, CA, USA, 30 March–3 April 2003; pp. 702–711. [Google Scholar]
  15. Zhang, J.; Fu, L.; Wang, X. Asymptotic analysis on secrecy capacity in large-scale wireless networks. IEEE/ACM Trans. Netw. 2014, 22, 66–79. [Google Scholar] [CrossRef]
  16. Koyluoglu, O.O.; Koksal, C.E.; Gamal, H.E. On secrecy capacity scaling in wireless networks. IEEE Trans. Inf. Theory 2009, 58, 3000–3015. [Google Scholar] [CrossRef]
  17. Zheng, K.; Zhang, J.; Liu, X.; Fu, L.; Wang, X.; Jiang, X.; Zhang, W. Secrecy capacity scaling of large-scale networks with social relationships. IEEE Trans. Veh. Technol. 2017, 66, 2688–2702. [Google Scholar] [CrossRef]
  18. Li, X.; Zhang, Y.; Zhao, S.; Shen, Y.; Jiang, X. Exact secrecy throughput capacity study in mobile ad hoc networks. Ad Hoc Netw. 2018, 72, 105–114. [Google Scholar] [CrossRef]
  19. Zhu, Y.; Wang, L.; Wong, K.; Heath, R.W. Secure communications in millimeter wave ad hoc networks. IEEE Trans. Wirel. Commun. 2017, 16, 3205–3217. [Google Scholar] [CrossRef]
  20. He, X.; Yener, A. End-to-end secure multi-hop communication with untrusted relays. IEEE Trans. Wirel. Commun. 2013, 12, 1–11. [Google Scholar] [CrossRef]
  21. Sarikaya, Y.; Koksal, C.E.; Ercetin, O. Dynamic network control for confidential multi-hop communications. IEEE/ACM Trans. Netw. 2016, 24, 1181–1195. [Google Scholar] [CrossRef]
  22. Neely, M. Stochastic Network Optimization with Application to Communication and Queueing Systems; Synthesis Lectures on Communication Networks; Morgan & Claypool Publishers: Williston, VT, USA, 2010; Volume 3, p. 211. [Google Scholar]
  23. Liu, Q.; Yu, L.; Zheng, J. Control of multi-hop wireless networks with security constraints. In Proceedings of the 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, 24–27 September 2017; pp. 1–6. [Google Scholar]
Figure 1. Network model.
Figure 1. Network model.
Algorithms 12 00049 g001
Figure 2. Queues of source nodes for finite secrecy codewords.
Figure 2. Queues of source nodes for finite secrecy codewords.
Algorithms 12 00049 g002
Figure 3. Long-term utility with varying confidential data arrival rate.
Figure 3. Long-term utility with varying confidential data arrival rate.
Algorithms 12 00049 g003
Figure 4. Average queue backlog with varying confidential data arrival rate.
Figure 4. Average queue backlog with varying confidential data arrival rate.
Algorithms 12 00049 g004
Figure 5. Long-term utility with varying secrecy codeword length.
Figure 5. Long-term utility with varying secrecy codeword length.
Algorithms 12 00049 g005
Figure 6. Long-term utility with varying secrecy outage constraint.
Figure 6. Long-term utility with varying secrecy outage constraint.
Algorithms 12 00049 g006
Table 1. Notations.
Table 1. Notations.
NotationDefinition
MNumber of legitimate nodes.
EThe set of eavesdroppers.
NNumber of channels.
T ( l ) , D ( l ) Transmitter and receiver nodes of link l.
S l ( t ) Channel state of link l in slot t.
R l ( t ) Achievable rate on link l in slot t.
R ¯ l e ( t ) Maximum leakage rate at eavesdropper e.
λ n c s ( t ) Confidential data arrival rate.
λ n c max ( t ) The maximum Confidential data arrival rate.
R n c s ( t ) Confidential data admitted into the network.
R l s ( t ) Secrecy encoding rate.
Q ( t ) , P ( t ) , Z ( t ) , Y ( t ) Queues backlog in the network.
VParameter of control algorithm.
U n c ( · ) Utility functions.
Table 2. Mean Channel Gain.
Table 2. Mean Channel Gain.
( S 1 ,1)( S 1 ,2)( S 1 ,3)(1, d 1 )(2, d 1 )(3, d 1 )
6810864
( S 2 ,2)( S 2 ,3)( S 2 ,4)(2, d 2 )(3, d 2 )(4, d 2 )
6810864
( S 1 ,e)( S 2 ,e)(1,e)(2,e)(3,e)(4,e)
321123

Share and Cite

MDPI and ACS Style

Liu, Q.; Liu, S.; Zeng, C.; Qiu, X.; Xiao, H. Secrecy Control of Wireless Networks with Finite Encoding Blocklength. Algorithms 2019, 12, 49. https://doi.org/10.3390/a12020049

AMA Style

Liu Q, Liu S, Zeng C, Qiu X, Xiao H. Secrecy Control of Wireless Networks with Finite Encoding Blocklength. Algorithms. 2019; 12(2):49. https://doi.org/10.3390/a12020049

Chicago/Turabian Style

Liu, Qiuming, Shumin Liu, Chunshui Zeng, Xiaohong Qiu, and He Xiao. 2019. "Secrecy Control of Wireless Networks with Finite Encoding Blocklength" Algorithms 12, no. 2: 49. https://doi.org/10.3390/a12020049

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop