TY - JOUR
T1 - On the delay/throughput-security tradeoff in wiretap TDMA networks with buffered nodes
AU - El Shafie, Ahmed
AU - Al-Dhahir, Naofal
AU - Ding, Zhiguo
AU - Hamila, Ridha
N1 - Funding Information:
Manuscript received September 9, 2018; revised March 11, 2019 and May 24, 2019; accepted May 24, 2019. Date of publication June 5, 2019; date of current version August 12, 2019. This publication was made possible by NPRP under Grant # NPRP 8-627-2-260 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors. The associate editor coordinating the review of this paper and approving it for publication was M. Li. (Corresponding author: Ahmed El Shafie.) A. El Shafie is with Qualcomm Inc., San Diego, CA 92121 USA (e-mail: [email protected]).
Publisher Copyright:
© 2019 IEEE.
PY - 2019/8
Y1 - 2019/8
N2 - In this paper, we investigate the tradeoff between security and throughput and between security and queuing delay in wiretap time-division multiple access (TDMA) networks. We derive a simple relationship, characterized by a single key system parameter, between the stable-throughput region, where there are no perfect secrecy constraints on the data transmissions, and the secure stable-throughput region, where there are perfect secrecy constraints. We quantify the impact of the perfect secrecy constraints on the network's average queuing delay and propose a novel cross-layer security scheme for delaylimited applications. We establish an insightful link between computational security (i.e., upper-layer security implemented through cryptographic schemes) and physical-layer (informationtheoretically proved) security. For the two-user case, we derive a closed-form expression for the network's minimum average queuing delay under the proposed security scheme and provide a relationship between the network's minimum queuing delay under perfect secrecy constraints and computational-only secrecy constraints. Moreover, we investigate the impact of cooperative jamming on achieving perfect secrecy, minimum network's queuing delay, and maximum throughput. We verify our theoretical findings through simulations.
AB - In this paper, we investigate the tradeoff between security and throughput and between security and queuing delay in wiretap time-division multiple access (TDMA) networks. We derive a simple relationship, characterized by a single key system parameter, between the stable-throughput region, where there are no perfect secrecy constraints on the data transmissions, and the secure stable-throughput region, where there are perfect secrecy constraints. We quantify the impact of the perfect secrecy constraints on the network's average queuing delay and propose a novel cross-layer security scheme for delaylimited applications. We establish an insightful link between computational security (i.e., upper-layer security implemented through cryptographic schemes) and physical-layer (informationtheoretically proved) security. For the two-user case, we derive a closed-form expression for the network's minimum average queuing delay under the proposed security scheme and provide a relationship between the network's minimum queuing delay under perfect secrecy constraints and computational-only secrecy constraints. Moreover, we investigate the impact of cooperative jamming on achieving perfect secrecy, minimum network's queuing delay, and maximum throughput. We verify our theoretical findings through simulations.
KW - Average queuing delay
KW - Data buffers/queues
KW - Secrecy stable-throughput region
KW - Uplink
UR - http://www.scopus.com/inward/record.url?scp=85090442954&partnerID=8YFLogxK
U2 - 10.1109/TWC.2019.2919825
DO - 10.1109/TWC.2019.2919825
M3 - Article
AN - SCOPUS:85090442954
SN - 1536-1276
VL - 18
SP - 3948
EP - 3960
JO - IEEE Transactions on Wireless Communications
JF - IEEE Transactions on Wireless Communications
IS - 8
M1 - 2919611
ER -