Loading…
On the Delay/Throughput-Security Tradeoff in Wiretap TDMA Networks With Buffered Nodes
In this paper, we investigate the tradeoff between security and throughput and between security and queuing delay in wiretap time-division multiple access (TDMA) networks. We derive a simple relationship, characterized by a single key system parameter, between the stable-throughput region, where the...
Saved in:
Published in: | IEEE transactions on wireless communications 2019-08, Vol.18 (8), p.3948-3960 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In this paper, we investigate the tradeoff between security and throughput and between security and queuing delay in wiretap time-division multiple access (TDMA) networks. We derive a simple relationship, characterized by a single key system parameter, between the stable-throughput region, where there are no perfect secrecy constraints on the data transmissions, and the secure stable-throughput region, where there are perfect secrecy constraints. We quantify the impact of the perfect secrecy constraints on the network's average queuing delay and propose a novel cross-layer security scheme for delay-limited applications. We establish an insightful link between computational security (i.e., upper-layer security implemented through cryptographic schemes) and physical-layer (information-theoretically proved) security. For the two-user case, we derive a closed-form expression for the network's minimum average queuing delay under the proposed security scheme and provide a relationship between the network's minimum queuing delay under perfect secrecy constraints and computational-only secrecy constraints. Moreover, we investigate the impact of cooperative jamming on achieving perfect secrecy, minimum network's queuing delay, and maximum throughput. We verify our theoretical findings through simulations. |
---|---|
ISSN: | 1536-1276 1558-2248 |
DOI: | 10.1109/TWC.2019.2919825 |