Performance analysis of congestion-aware secure broadcast channels
نویسندگان
چکیده
Abstract Congestion-aware scheduling in case of downlink cellular communication has ignored the distribution diverse content to different clients with heterogeneous secrecy requirements. Other possible application areas that encounter preceding issue are secure offloading mobile-edge computing, and vehicular communication. In this paper, we extend work Arvanitaki et al. (SN Comput Sci 1(1):53, 2019) by taking into consideration congestion random access. Specifically, study a two-user congestion-aware broadcast channel traffic security We consider two randomized policies for selecting which packets transmit, one is queue size, whereas other congestion-agnostic. analyse throughput delay performance under decoding schemes at receivers, provide insights their relative how control holding confidential information can help decrease average per packet. show policy provides better delay, throughput, large arrival packet probabilities information. The derived results also take account self-interference caused receiver whom data intended due its full-duplex operation while jamming user. Finally, schemes, formulate our problems terms multi-objective optimization, allows finding trade-off between legitimate user policy.
منابع مشابه
Secure Broadcast in Energy-aware Wireless Sensor Networks
We consider the problem of securing multicast communications in an energy-constrained ad-hoc network environment. We show that existing efficient key distribution techniques for wired networks that rely on logical hierarchies are extremely energy inefficient for energy-constrained wireless ad-hoc networks. We also show that the joint consideration of routing and physical layer algorithms is c...
متن کاملSCARP: Secure Congestion Aware Routing Protocol for Wireless Sensor Networks
Wireless sensor networks sense various kinds of information, process them locally and communicate it to the outside world via satellite or Internet. In the near future, sensor networks will play a major role in collecting and disseminating information from the fields where ordinary networks are unreachable for various environmental and strategical reasons. Hence it is increasingly likely that s...
متن کاملSecure Capacity Region for Erasure Broadcast Channels with Feedback
We formulate and study a cryptographic problem relevant to wireless: a sender, Alice, wants to transmit private messages to two receivers, Bob and Calvin, using unreliable wireless broadcast transmissions and short public feedback from Bob and Calvin. We ask, at what rates can we broadcast the private messages if we also provide (information-theoretic) unconditional security guarantees that Bob...
متن کاملApproximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have initiated the study of secure communication and secure computation in multi-recipient (broadcast) models. A “broadcast channel” (such as Ethernet) enables one processor to send the same message—simultaneously and pri...
متن کاملPower-aware data retrieval protocols for indexed broadcast parallel channels
In pervasive and mobile computing environments, “timely and reliable” access to public data requires methods that allow quick, efficient, and low-power access to information to overcome technological limitations of wireless communication and access devices. Literature suggests broadcasting (one-way communication) as an effective way to disseminate the public data to mobile devices. Within the s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Eurasip Journal on Wireless Communications and Networking
سال: 2021
ISSN: ['1687-1499', '1687-1472']
DOI: https://doi.org/10.1186/s13638-021-02046-7