Loading…

Throughput maximization in multi-hop wireless networks under a secrecy constraint

This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under a secrecy constraint and malicious jamming. The evaluation scenario comprises sensors that measure some relevant information of the plant that is first processed by an aggregator node and the...

Full description

Saved in:
Bibliographic Details
Published in:Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2016-11, Vol.109, p.13-20
Main Authors: Nardelli, Pedro H.J., Alves, Hirley, de Lima, Carlos H.M., Latva-aho, Matti
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c413t-61b5433398e077a8b73a62884b591bf0a3ce9469d5b5595fa33a410f08cc07093
cites cdi_FETCH-LOGICAL-c413t-61b5433398e077a8b73a62884b591bf0a3ce9469d5b5595fa33a410f08cc07093
container_end_page 20
container_issue
container_start_page 13
container_title Computer networks (Amsterdam, Netherlands : 1999)
container_volume 109
creator Nardelli, Pedro H.J.
Alves, Hirley
de Lima, Carlos H.M.
Latva-aho, Matti
description This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under a secrecy constraint and malicious jamming. The evaluation scenario comprises sensors that measure some relevant information of the plant that is first processed by an aggregator node and then sent to the control unit. To reach the control unit, a message may travel through relay nodes, which form a multi-hop wireless link. At every hop, eavesdropper nodes attempt to acquire the messages transmitted through the legitimate link. The communication design problem posed here is how to maximize the multi-hop throughput from the aggregator to the control unit by finding the best combination of relay positions (i.e. hop length: short or long) and coding rates (i.e. high or low spectral efficiency) so that the secrecy constraint is satisfied. Using a stochastic-geometry formulation, we show that the optimal choice of coding rate is normally high and depends on the path-loss exponent only, while a greater number of shorter hops are preferable to smaller number of longer hops in any situation. For the investigated scenarios, we prove that the optimal throughput subject to the secrecy constraint achieves the unconstrained optimal performance – if a feasible solution exists.
doi_str_mv 10.1016/j.comnet.2016.06.020
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1864535980</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1389128616302018</els_id><sourcerecordid>4245470641</sourcerecordid><originalsourceid>FETCH-LOGICAL-c413t-61b5433398e077a8b73a62884b591bf0a3ce9469d5b5595fa33a410f08cc07093</originalsourceid><addsrcrecordid>eNp9kMFq3DAQhk1Jocmmb9CDIJdc7IwsyZYugRKStBAogfQsZO24q60tbSU52-Tpq2VzyqEwMDPwzT8zf1V9odBQoN3VtrFh9pibtnQNlGjhQ3VKZd_WPXTqpNRMqpq2svtUnaW0BQDOW3laPT5tYlh-bXZLJrP562b3arILnjhP5mXKrt6EHdm7iBOmRMqSfYi_E1n8GiMxJKGNaF-IDT7laJzP59XH0UwJP7_lVfXz7vbp5lv98OP--83Xh9pyynLd0UFwxpiSCH1v5NAz07VS8kEoOoxgmEXFO7UWgxBKjIYxwymMIK2FHhRbVZdH3V0MfxZMWc8uWZwm4zEsSVPZccGEklDQi3foNizRl-sKxXoFtBWsUPxI2RhSijjqXXSziS-agj74rLf66LM--KyhRHsQvz6OYXn22WHUyTr0FtfFNJv1Orj_C_wDQ9qIHw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1837901253</pqid></control><display><type>article</type><title>Throughput maximization in multi-hop wireless networks under a secrecy constraint</title><source>Library &amp; Information Science Abstracts (LISA)</source><source>ScienceDirect Freedom Collection</source><creator>Nardelli, Pedro H.J. ; Alves, Hirley ; de Lima, Carlos H.M. ; Latva-aho, Matti</creator><creatorcontrib>Nardelli, Pedro H.J. ; Alves, Hirley ; de Lima, Carlos H.M. ; Latva-aho, Matti</creatorcontrib><description>This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under a secrecy constraint and malicious jamming. The evaluation scenario comprises sensors that measure some relevant information of the plant that is first processed by an aggregator node and then sent to the control unit. To reach the control unit, a message may travel through relay nodes, which form a multi-hop wireless link. At every hop, eavesdropper nodes attempt to acquire the messages transmitted through the legitimate link. The communication design problem posed here is how to maximize the multi-hop throughput from the aggregator to the control unit by finding the best combination of relay positions (i.e. hop length: short or long) and coding rates (i.e. high or low spectral efficiency) so that the secrecy constraint is satisfied. Using a stochastic-geometry formulation, we show that the optimal choice of coding rate is normally high and depends on the path-loss exponent only, while a greater number of shorter hops are preferable to smaller number of longer hops in any situation. For the investigated scenarios, we prove that the optimal throughput subject to the secrecy constraint achieves the unconstrained optimal performance – if a feasible solution exists.</description><identifier>ISSN: 1389-1286</identifier><identifier>EISSN: 1872-7069</identifier><identifier>DOI: 10.1016/j.comnet.2016.06.020</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Coding ; Control units (computers) ; Design specifications ; Hops ; Industrial applications ; Jamming ; Links ; Machine-to-machine communications ; Messages ; Multi-hop wireless networks ; Nodes ; Optimization ; Relay ; Security and jamming ; Sensors ; Stochastic geometry ; Stochastic models ; Studies ; Throughput ; Wireless networks</subject><ispartof>Computer networks (Amsterdam, Netherlands : 1999), 2016-11, Vol.109, p.13-20</ispartof><rights>2016 Elsevier B.V.</rights><rights>Copyright Elsevier Sequoia S.A. Nov 9, 2016</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c413t-61b5433398e077a8b73a62884b591bf0a3ce9469d5b5595fa33a410f08cc07093</citedby><cites>FETCH-LOGICAL-c413t-61b5433398e077a8b73a62884b591bf0a3ce9469d5b5595fa33a410f08cc07093</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925,34135</link.rule.ids></links><search><creatorcontrib>Nardelli, Pedro H.J.</creatorcontrib><creatorcontrib>Alves, Hirley</creatorcontrib><creatorcontrib>de Lima, Carlos H.M.</creatorcontrib><creatorcontrib>Latva-aho, Matti</creatorcontrib><title>Throughput maximization in multi-hop wireless networks under a secrecy constraint</title><title>Computer networks (Amsterdam, Netherlands : 1999)</title><description>This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under a secrecy constraint and malicious jamming. The evaluation scenario comprises sensors that measure some relevant information of the plant that is first processed by an aggregator node and then sent to the control unit. To reach the control unit, a message may travel through relay nodes, which form a multi-hop wireless link. At every hop, eavesdropper nodes attempt to acquire the messages transmitted through the legitimate link. The communication design problem posed here is how to maximize the multi-hop throughput from the aggregator to the control unit by finding the best combination of relay positions (i.e. hop length: short or long) and coding rates (i.e. high or low spectral efficiency) so that the secrecy constraint is satisfied. Using a stochastic-geometry formulation, we show that the optimal choice of coding rate is normally high and depends on the path-loss exponent only, while a greater number of shorter hops are preferable to smaller number of longer hops in any situation. For the investigated scenarios, we prove that the optimal throughput subject to the secrecy constraint achieves the unconstrained optimal performance – if a feasible solution exists.</description><subject>Coding</subject><subject>Control units (computers)</subject><subject>Design specifications</subject><subject>Hops</subject><subject>Industrial applications</subject><subject>Jamming</subject><subject>Links</subject><subject>Machine-to-machine communications</subject><subject>Messages</subject><subject>Multi-hop wireless networks</subject><subject>Nodes</subject><subject>Optimization</subject><subject>Relay</subject><subject>Security and jamming</subject><subject>Sensors</subject><subject>Stochastic geometry</subject><subject>Stochastic models</subject><subject>Studies</subject><subject>Throughput</subject><subject>Wireless networks</subject><issn>1389-1286</issn><issn>1872-7069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>F2A</sourceid><recordid>eNp9kMFq3DAQhk1Jocmmb9CDIJdc7IwsyZYugRKStBAogfQsZO24q60tbSU52-Tpq2VzyqEwMDPwzT8zf1V9odBQoN3VtrFh9pibtnQNlGjhQ3VKZd_WPXTqpNRMqpq2svtUnaW0BQDOW3laPT5tYlh-bXZLJrP562b3arILnjhP5mXKrt6EHdm7iBOmRMqSfYi_E1n8GiMxJKGNaF-IDT7laJzP59XH0UwJP7_lVfXz7vbp5lv98OP--83Xh9pyynLd0UFwxpiSCH1v5NAz07VS8kEoOoxgmEXFO7UWgxBKjIYxwymMIK2FHhRbVZdH3V0MfxZMWc8uWZwm4zEsSVPZccGEklDQi3foNizRl-sKxXoFtBWsUPxI2RhSijjqXXSziS-agj74rLf66LM--KyhRHsQvz6OYXn22WHUyTr0FtfFNJv1Orj_C_wDQ9qIHw</recordid><startdate>20161109</startdate><enddate>20161109</enddate><creator>Nardelli, Pedro H.J.</creator><creator>Alves, Hirley</creator><creator>de Lima, Carlos H.M.</creator><creator>Latva-aho, Matti</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20161109</creationdate><title>Throughput maximization in multi-hop wireless networks under a secrecy constraint</title><author>Nardelli, Pedro H.J. ; Alves, Hirley ; de Lima, Carlos H.M. ; Latva-aho, Matti</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c413t-61b5433398e077a8b73a62884b591bf0a3ce9469d5b5595fa33a410f08cc07093</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Coding</topic><topic>Control units (computers)</topic><topic>Design specifications</topic><topic>Hops</topic><topic>Industrial applications</topic><topic>Jamming</topic><topic>Links</topic><topic>Machine-to-machine communications</topic><topic>Messages</topic><topic>Multi-hop wireless networks</topic><topic>Nodes</topic><topic>Optimization</topic><topic>Relay</topic><topic>Security and jamming</topic><topic>Sensors</topic><topic>Stochastic geometry</topic><topic>Stochastic models</topic><topic>Studies</topic><topic>Throughput</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nardelli, Pedro H.J.</creatorcontrib><creatorcontrib>Alves, Hirley</creatorcontrib><creatorcontrib>de Lima, Carlos H.M.</creatorcontrib><creatorcontrib>Latva-aho, Matti</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nardelli, Pedro H.J.</au><au>Alves, Hirley</au><au>de Lima, Carlos H.M.</au><au>Latva-aho, Matti</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Throughput maximization in multi-hop wireless networks under a secrecy constraint</atitle><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle><date>2016-11-09</date><risdate>2016</risdate><volume>109</volume><spage>13</spage><epage>20</epage><pages>13-20</pages><issn>1389-1286</issn><eissn>1872-7069</eissn><abstract>This paper analyzes the achievable throughput of multi-hop sensor networks for industrial applications under a secrecy constraint and malicious jamming. The evaluation scenario comprises sensors that measure some relevant information of the plant that is first processed by an aggregator node and then sent to the control unit. To reach the control unit, a message may travel through relay nodes, which form a multi-hop wireless link. At every hop, eavesdropper nodes attempt to acquire the messages transmitted through the legitimate link. The communication design problem posed here is how to maximize the multi-hop throughput from the aggregator to the control unit by finding the best combination of relay positions (i.e. hop length: short or long) and coding rates (i.e. high or low spectral efficiency) so that the secrecy constraint is satisfied. Using a stochastic-geometry formulation, we show that the optimal choice of coding rate is normally high and depends on the path-loss exponent only, while a greater number of shorter hops are preferable to smaller number of longer hops in any situation. For the investigated scenarios, we prove that the optimal throughput subject to the secrecy constraint achieves the unconstrained optimal performance – if a feasible solution exists.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.comnet.2016.06.020</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1389-1286
ispartof Computer networks (Amsterdam, Netherlands : 1999), 2016-11, Vol.109, p.13-20
issn 1389-1286
1872-7069
language eng
recordid cdi_proquest_miscellaneous_1864535980
source Library & Information Science Abstracts (LISA); ScienceDirect Freedom Collection
subjects Coding
Control units (computers)
Design specifications
Hops
Industrial applications
Jamming
Links
Machine-to-machine communications
Messages
Multi-hop wireless networks
Nodes
Optimization
Relay
Security and jamming
Sensors
Stochastic geometry
Stochastic models
Studies
Throughput
Wireless networks
title Throughput maximization in multi-hop wireless networks under a secrecy constraint
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T23%3A32%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Throughput%20maximization%20in%20multi-hop%20wireless%20networks%20under%20a%20secrecy%20constraint&rft.jtitle=Computer%20networks%20(Amsterdam,%20Netherlands%20:%201999)&rft.au=Nardelli,%20Pedro%20H.J.&rft.date=2016-11-09&rft.volume=109&rft.spage=13&rft.epage=20&rft.pages=13-20&rft.issn=1389-1286&rft.eissn=1872-7069&rft_id=info:doi/10.1016/j.comnet.2016.06.020&rft_dat=%3Cproquest_cross%3E4245470641%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c413t-61b5433398e077a8b73a62884b591bf0a3ce9469d5b5595fa33a410f08cc07093%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1837901253&rft_id=info:pmid/&rfr_iscdi=true