To balance rigorous security requirements with high network performance is a formidable challenge in multi-hop cross-domain wireless networks. Conventional routing algorithms tend to optimize security and throughput in isolation; however, they overlook the inherent cross-layer interdependencies. Considering that, we propose the Secure Cross-Layer Route (SC-Route) method. This method integrates dynamic cross-domain authentication, comprehensive cross-layer information sharing, and adaptive load balancing into a unified optimization framework. SC-Route formulates the problem as a multi-objective optimization task that rigorously incorporates essential constraints from security, throughput, and load perspectives. The proposed technical route is underpinned by detailed mathematical modeling, the derivation of fundamental constraints, and the development of iterative optimization strategies that bridge the theoretical system model and the practical algorithmic implementation.
4.1. Framework of the Proposed Method
To effectively address the challenges inherent in multi-hop cross-domain wireless networks—particularly the trade-off between security and performance—we propose a framework, which integrates dynamic cross-domain authentication, adaptive cross-layer information exchange, and load balancing mechanisms into a unified optimization-driven architecture. This framework aligns routing decisions with stringent security requirements and real-time performance metrics.
Building upon the multi-objective optimization model defined in Equation (
10), SC-Route introduces a feedback-driven control mechanism that dynamically adapts to evolving network conditions. Each node’s state is jointly characterized by its security state
and load state
, which reflect the outcome of distributed authentication processes and bandwidth usage levels, respectively. Both of the two aspects are combined through a cross-layer feedback function:
where
are weighting parameters, and
is a nonlinear function (e.g., logarithmic or exponential) used to model the sensitivity of security decisions to traffic load. This function guides the system toward dynamic equilibrium, allowing real-time adjustment of routing strategies based on combined cross-layer states.
To support differentiated security control, we introduce a risk-aware key update mechanism. Let
denote the perceived risk level of node
i, determined from historical abnormal behaviors, authentication failures, or cross-domain policy violations. The corresponding key update rate is defined as:
where
is a monotonically increasing function satisfying
, ensuring that nodes with higher security risks are subject to more frequent key renewals. This mechanism complements the trust-based link security metric
previously defined in Equation (
4), and the load utilization constraint in Equation (
9), forming an integrated security-performance control loop.
To facilitate theoretical analysis and ensure system feasibility, we introduce the following assumptions:
Assumption 1. Each node’s security state is upper bounded:where is a positive constant. Assumption 2. The delay in transmitting cross-layer state information is bounded:ensuring timely synchronization of node states within a finite delay. Assumption 3. During distributed authentication, each node’s trust value converges to a unique equilibrium:where is the trust value of node i after the k-th update. Assumption 4. The differentiated key update rate satisfies the following inequality:where is the minimum update rate and is a proportionality constant. The assumptions above establish the foundational conditions for the SC-Route mechanism’s convergence and stability. They are also a prerequisite for the theoretical analysis and performance guarantee presented in the following chapters.
To prove the convergence of the cross-layer security feedback mechanism, we introduce the following lemma, which shows that under the above assumptions, the iterative update process of the node security state has a unique fixed point. This lemma proves that the node security state will inevitably converge through continuous iteration and adjustment via the function . This provides a theoretical basis for global secure routing.
Lemma 1. Suppose that the function is continuous on the interval and satisfies a Lipschitz condition, i.e., there exists a constant such that for any ,then for the iterative update formulaif the step size ϵ satisfies , the sequence converges to a unique fixed point satisfying . Based on the above lemma and assumptions, we propose an original theorem that states that under the SC-Route framework, the collaborative action of cross-layer interaction, distributed authentication, and differentiated key update strategies can achieve global adaptive balance between security and load. This theorem guarantees that every link in the network meets the security and load constraints, and it also proves that the global objective function converges to a locally optimal solution during the iterative process.
Theorem 2. Suppose that every link in the network has a composite security metric and a load utilization . If the SC-Route framework is adopted, where the node security state is updated by the iterative formula defined in Equation (17) and the node key update rate satisfies Equation (16), then there exists a unique fixed point such that for every link ,and the global objective function defined in Equation (10) satisfieswhere is the locally optimal solution. This theorem proves that under the SC-Route framework, through cross-layer security feedback, distributed authentication, and risk-driven differentiated key updates, the composite security metric of every link in the network is maintained above the predetermined security threshold, and the load utilization remains within controllable bounds, thereby ensuring that the global objective function converges to a locally optimal solution in a multi-objective optimization framework. This provides a solid theoretical basis for the design of secure routing in cross-domain networks. The proof strictly relies on the mathematical derivation of the closed-form expression for conditional capacity as presented in reference [
33].
Proof. First, consider the iterative update of the security state
defined in Equation (
17). By the lemma, there exists a unique fixed point
for each node. It satisfies
The contraction property ensures that
converges to
as
. Simultaneously, because the key update rate
satisfies Equation (
16) and remains bounded below by a positive constant, it follows that each node’s key update process converges to a stable rate
. By the assumption that trust values converge to
, the composite security metric on every link
becomes
Hence, Equation (
18) is satisfied and guarantees
.
Next, the load utilization
on each link is governed by the cross-layer feedback function together with the iterative flow and routing updates. Since Equation (
11) incorporates a load-sensitive term and the corresponding step sizes are chosen to ensure stability, each link’s load level converges to a value that does not exceed
. Thus, Equation (
19) is met. The integration of the safety status and load status further enhances the capabilities of the nodes and the constraints for process protection through the fact that restrictions are imposed on all links, thereby preventing overload while maintaining effective routes.
These convergent states also drive the global objective function in Equation (
10) toward a locally optimal value. Since the iterative procedure updates the system variables in a manner that decreases authentication delay while encouraging higher throughput, the objective is non-increasing at each stable step of the algorithm and must converge to a fixed point
. Hence, Equation (
20) holds. Therefore, the unique fixed point
ensures that every link satisfies
and
while the global objective converges to the locally optimal solution
. This completes the proof. □
This theorem provides the mathematical foundation for the present study, proving that under the SC-Route framework, through cross-layer information exchange, distributed authentication, and risk-driven differentiated key updates, the security of every link and load balancing are ensured, leading the global routing decision in a dynamic environment to reach a stable local optimum.
Next, to integrate the above theoretical derivations with the concrete algorithm implementation, we design a distributed algorithm that can optimize dynamic secure routing in practical multi-hop cross-domain wireless networks. The specific idea of the method is presented in Algorithm 1.
Algorithm 1 Multi-Objective Secure Routing Optimization Framework (MOSROF) |
Input: Network topology , initial security states , load states , risk levels Output: Stable secure routing parameter set , node update parameters
- 1:
for each node do - 2:
Initialize , compute initial trust - 3:
Compute initial key update rate - 4:
end for - 5:
repeat - 6:
for each node do - 7:
Update security state using Equation ( 17) - 8:
Update trust value: - 9:
Update key update rate using Equation ( 16) - 10:
end for - 11:
for each link do - 12:
Compute composite security metric using Equation ( 4) - 13:
Update load utilization using Equation ( 9) - 14:
end for - 15:
Update global objective function using Equation ( 10) - 16:
until convergence condition is met - 17:
Return:,
|
Algorithm 1 initializes the input data, including the network topology , initial security states , load states , and risk levels . For each node i, it computes the initial security state and the corresponding trust value as well as the key update rate (Line 1). Iterative updates are then performed for each node (Lines 6–10), where the security state is updated with subsequent updates to the trust value and key update rate. Next, the composite security metric for each link and the load utilization are updated (Lines 11–14). The global objective function is recalculated using these updated local variables (Line 15). Once the convergence condition is met, the Algorithm terminates and returns the stable node security states, fixed trust values, key update rates, and the final routing parameter set (Line 17).
In summary, MOSROF clearly delineates the interplay among security, load, and routing metrics, thereby setting a solid basis for the detailed formulations and solution strategies described in the following sub-sections.
4.2. Design of Cross-Layer Secure Routing Mechanism
Building on this framework, we design a cross-layer secure routing mechanism that exploits real-time network state information. By integrating security metrics with load indicators, this mechanism computes optimal routing decisions that satisfy stringent security constraints while optimizing throughput.
For a given network topology represented as graph
, for each node
, we denote the security state as
, load state as
, and available bandwidth as
. We then construct a cross-layer fusion function defined by:
To facilitate rigorous mathematical proof, we introduce the following assumptions:
Assumption 5. Each node i can accurately measure its true security state , load , and bandwidth , satisfying: Assumption 6. The information updating cycle satisfies: Assumption 7. The iterative updating process of node routing costs follows: It converges to a unique fixed point , satisfying: Assumption 8. The function is monotonically increasing with respect to and , monotonically decreasing with respect to , and is continuous and differentiable.
We define the routing cost function for path as: The goal is to find the optimal path , satisfying: Considering the feedback mechanism among nodes, the node cost is updated by Equation (22). Using Banach’s fixed-point theorem, we prove this iterative mapping is a contraction mapping; hence, converges uniquely to . In light of these assumptions, we establish a basis for ensuring both the uniqueness and convergence of the proposed routing updates. Specifically, by bounding measurement errors and enforcing a sufficiently frequent information update cycle, the iterative process in Equation (
22) becomes amenable to a fixed-point argument. This fixed-point analysis, coupled with the monotonicity and continuity properties of the fusion function in Equation (
21), guarantees that each node’s cost converges uniquely. Consequently, we can rigorously derive a globally optimal path
that minimizes the routing cost (
23), leading to the formal statement of the following theorem.
Theorem 3. The routing cost function defined in (23) possesses a unique globally optimal path that satisfies: Moreover, node costs updated by (22) converge to the fixed point . This theorem demonstrates that the cross-layer fusion-based routing cost function possesses a globally unique optimal solution. The distributed feedback update process ensures each node’s cost converges stably to a fixed point, thus ensuring adaptive routing decisions satisfy both security and load balancing requirements. The proof relies strictly on reference [
34] and provides a robust theoretical foundation for cross-layer adaptive routing.
Proof. First, for node
i, define mapping:
Consider arbitrary
, we have:
Since
,
is a contraction mapping. By Banach’s theorem, there exists a unique fixed point
:
Next, the global optimality proof for
: Due to monotonicity and differentiability (Assumption 4), the cost function has convexity properties, ensuring a unique global minimum. Iterative algorithms (e.g., Bellman–Ford) guarantee convergence to this unique minimum
:
Combining the two parts proves: (1) node costs converge to unique fixed points; (2) the globally optimal path cost is unique. Hence, cross-layer fusion and distributed feedback updating ensure adaptive global routing optimality. □
As shown in
Figure 3, the cross-layer routing mechanism is demonstrated through three key phases:(a) Initial Security-Load Fusion: Node color depth encodes security states
, border thickness represents load levels
, and node size indicates bandwidth
, with link costs computed via
(Equation (
21)). (b) Dynamic Cost Propagation: Security degradation at
(
) and load surge at
(
) trigger real-time link cost updates (red arrows). (c) Optimal Path Convergence: The algorithm converges to
(blue path) with
, achieving 18.8% cost reduction over traditional paths while bypassing high-risk nodes (gray). This process validates Theorem 3’s convergence guarantee.
To bridge the gap between the theoretical results and a deployable solution, we now illustrate how the proven global uniqueness and convergence properties can be operationalized in a distributed routing algorithm. Specifically, leveraging the cross-layer fusion function introduced and the iterative convergence process described, we develop a dynamic programming approach that updates each node’s cost and progressively identifies an optimal path satisfying both security and load constraints. Details are provided in Algorithm 2.
Algorithm 2 Cross-Layer Secure Routing Decision Algorithm (CSR) |
Input: Network topology ; node information Output: Optimal secure routing path
- 1:
for each node do - 2:
Initialize cost - 3:
end for - 4:
repeat - 5:
for each link do - 6:
Compute link cost f using Equation ( 21) - 7:
Update node cost using Equation ( 22) - 8:
end for - 9:
until convergence condition met - 10:
Extract optimal path from predecessor pointers - 11:
Return:
|
Algorithm 2 initializes the network topology and node states. It then sets the initial node costs (Lines 1–3). After that, the Algorithm updates the link costs
using Equation (
21) and updates the node costs
via dynamic programming (Lines 5–8). Then, the optimal path
is retrieved from the stored predecessor pointers (Line 10), and finally, the Algorithm outputs the final optimal secure path (Line 11).
In conclusion, the cross-layer secure routing mechanism effectively fuses security and load information to determine optimal paths, ensuring that routing decisions are both secure and efficient. This mechanism forms a critical component of SC-Route and seamlessly links to the subsequent authentication strategies.
4.3. Distributed Dynamic Authentication and Key Management Strategies
Complementing the secure routing mechanism, we propose distributed dynamic authentication and key management strategies. These strategies are designed to rapidly respond to network state fluctuations and enforce continuous node validation through adaptive key updates, thereby reinforcing the overall security of the SC-Route method.
We first define the security state of node
i as
, incorporating historical authentication success rates and anomaly detection frequency. Node that risk level
represents the frequency of authentication failures and anomalies. The node load is denoted as
, and the key update rate as
. We establish a differentiated key update function as:
where
is the minimum key update frequency and
is the sensitivity parameter linking the node risk and update frequency.
Further, the hierarchical authentication cost function
is defined as:
where
is a lightweight shared-key authentication with lower cost, and
denotes a high-strength challenge-response or digital signature mechanism with
.
The overall authentication and communication cost function
is constructed as:
where parameters
weigh the importance of authentication cost, node load, and key update frequency, respectively.
We establish four critical assumptions for theoretical rigor:
Assumption 9. The observed security state satisfies: Assumption 10. Authentication delay is bounded by: Assumption 11. The key update function is continuous, monotonic, and satisfies: Assumption 12. The cross-layer information update interval is stable and satisfies: Building upon these assumptions, we recognize that the risk-sensitive key update function (Equation (
24)) and hierarchical authentication cost (Equation (
25)) naturally couple with load
, thereby influencing the overall cost function in Equation (
26). By establishing monotonic properties for the node security states and showing the boundedness of the update intervals, we can now prove that the global optimal solution for
exists and is unique. This leads directly into the main theorem below, which confirms convergence of the distributed feedback process and ensures that all nodes converge to a globally optimal configuration of authentication and key management parameters.
Theorem 4. The proposed hierarchical authentication and differentiated key update strategy ensures the existence and uniqueness of a global optimal solution minimizing , characterized by node state set .
Proof. Define the iterative feedback update equation as:
with the fusion function:
The mapping
defined by Equation (
27) can be analyzed as:
thus satisfying Banach’s fixed-point theorem conditions, ensuring convergence to a unique stable point.
Taking derivatives of
with respect to
and
yields:
and the Hessian matrix:
which is positive semi-definite, indicating that
is convex, thus proving global optimality. □
The theorem demonstrates that the proposed distributed feedback iteration converges to the unique global optimum, balancing authentication efficiency and communication overhead theoretically.
To maintain robust authentication while minimizing overhead, we develop a distributed strategy that integrates the hierarchical authentication cost model from Equation (
25) and the risk-based key update function in Equation (
24), aiming to minimize the overall system cost defined in Equation (
26). Based on this integrated design, the proposed distributed authentication and key update strategy is detailed in Algorithm 3.
Algorithm 3 initializes the node parameters and basic key update rates (Line 1). It then computes the initial authentication costs and corresponding key update rates (Line 2). Next, the total initial cost is calculated (Line 3), and termination conditions based on the convergence threshold
are defined (Line 5). The Algorithm ensures the accuracy of real-time node security states in accordance with Assumption 9. The key rates are updated using the risk-sensitive mapping specified in Equation (
24) (Line 6). After that, the hierarchical authentication cost is computed based on network domain conditions via Equation (
25) (Line 7). Subsequently, the fusion function is updated according to Equation (
28) and node states are iteratively refined using Equation (
27) (Line 8). Then, the updated total cost function is recalculated to verify optimality and the iteration count is incremented (Lines 10–11). Finally, the optimal authentication and key management strategy is output (Line 13).
At this point, the distributed authentication and key management strategies introduced in
Section 3, together with the multi-objective optimization framework and the cross-layer routing mechanism presented in
Section 1 and
Section 2, jointly constitute the proposed SC-Route method. These components are structurally interdependent and collectively form a comprehensive cross-layer secure routing framework that spans optimization modeling, path selection, and security control.
Algorithm 3 Distributed Dynamic Authentication and Key Update Algorithm (DAKU) |
Input: Node states , parameters Output: Optimal node states and minimal cost
- 1:
Initialize node states , set - 2:
Compute initial authentication cost, and key update rate using Equation ( 24) - 3:
Compute initial cost using Equation ( 26), set - 4:
repeat - 5:
Update node security state ensuring - 6:
Compute using Equation ( 24) - 7:
Evaluate based on domain type using Equation ( 25) - 8:
Update fusion value using Equation ( 28) - 9:
Update node states using Equation ( 27) - 10:
Update using Equation ( 26) - 11:
- 12:
until
- 13:
Return: Optimal node states and minimal cost
|