Achieving Full Secrecy Rate With Energy-Efficient Transmission Control
Due to the dynamic arrival of data packets and time-varying channel states, secure transmission opportunities will be wasted when there is no confidential message to transmit, and data packet transmission can be delayed while waiting for the next available secure transmission opportunity. In order t...
Saved in:
Published in: | IEEE transactions on communications Vol. 65; no. 12; pp. 5386 - 5400 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
New York
IEEE
01-12-2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Due to the dynamic arrival of data packets and time-varying channel states, secure transmission opportunities will be wasted when there is no confidential message to transmit, and data packet transmission can be delayed while waiting for the next available secure transmission opportunity. In order to seize every precious secure transmission opportunity and reduce the data packet waiting time, we propose a secure transmission protocol in which the under-utilized secure transmission opportunities can be exploited to transmit key packets, and these key packets will encrypt the confidential messages in the subsequent transmissions. Following the above-mentioned principle, we first apply this protocol to a single-input single-output network, and optimally allocate the secure transmission opportunities for the key and data transmissions, such that the secrecy rate is maximized under the constraints of the minimum energy efficiency and queue stability requirements. In addition, the packet delay for the proposed protocol is investigated using a generating function approach and a closed-form expression of the packet delay is derived. Then, we extend our work to the multiple-input single-output network and utilize the key queue as well as the artificial noise to protect the confidential messages. Similarly, we also optimally allocate the transmission opportunities for the key and data transmissions to maximize the secrecy rate and study the data packet delay performance. Since all secrecy transmission opportunities are utilized in the proposed protocol, the full secrecy rate is achieved. Numerical results are demonstrated to verify the performance superiority of the proposed protocols when compared with the other key encrypted schemes in terms of the data packet delay and the secrecy rate. |
---|---|
ISSN: | 0090-6778 1558-0857 |
DOI: | 10.1109/TCOMM.2017.2748119 |