Loading…

On the Delay/Throughput-Security Tradeoff in Wiretap TDMA Networks With Buffered Nodes

In this paper, we investigate the tradeoff between security and throughput and between security and queuing delay in wiretap time-division multiple access (TDMA) networks. We derive a simple relationship, characterized by a single key system parameter, between the stable-throughput region, where the...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on wireless communications 2019-08, Vol.18 (8), p.3948-3960
Main Authors: El Shafie, Ahmed, Al-Dhahir, Naofal, Ding, Zhiguo, Hamila, Ridha
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In this paper, we investigate the tradeoff between security and throughput and between security and queuing delay in wiretap time-division multiple access (TDMA) networks. We derive a simple relationship, characterized by a single key system parameter, between the stable-throughput region, where there are no perfect secrecy constraints on the data transmissions, and the secure stable-throughput region, where there are perfect secrecy constraints. We quantify the impact of the perfect secrecy constraints on the network's average queuing delay and propose a novel cross-layer security scheme for delay-limited applications. We establish an insightful link between computational security (i.e., upper-layer security implemented through cryptographic schemes) and physical-layer (information-theoretically proved) security. For the two-user case, we derive a closed-form expression for the network's minimum average queuing delay under the proposed security scheme and provide a relationship between the network's minimum queuing delay under perfect secrecy constraints and computational-only secrecy constraints. Moreover, we investigate the impact of cooperative jamming on achieving perfect secrecy, minimum network's queuing delay, and maximum throughput. We verify our theoretical findings through simulations.
ISSN:1536-1276
1558-2248
DOI:10.1109/TWC.2019.2919825