Computer Science – Information Theory
Scientific paper
2011-01-18
Computer Science
Information Theory
To appear in IEEE/ACM Transactions on Networking
Scientific paper
We consider the problem of cross-layer resource allocation in time-varying cellular wireless networks, and incorporate information theoretic secrecy as a Quality of Service constraint. Specifically, each node in the network injects two types of traffic, private and open, at rates chosen in order to maximize a global utility function, subject to network stability and secrecy constraints. The secrecy constraint enforces an arbitrarily low mutual information leakage from the source to every node in the network, except for the sink node. We first obtain the achievable rate region for the problem for single and multi-user systems assuming that the nodes have full CSI of their neighbors. Then, we provide a joint flow control, scheduling and private encoding scheme, which does not rely on the knowledge of the prior distribution of the gain of any channel. We prove that our scheme achieves a utility, arbitrarily close to the maximum achievable utility. Numerical experiments are performed to verify the analytical results, and to show the efficacy of the dynamic control algorithm.
Ercetin Ozgur
Koksal Can Emre
Sarikaya Yunus
No associations
LandOfFree
Control of Wireless Networks with Secrecy does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Control of Wireless Networks with Secrecy, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Control of Wireless Networks with Secrecy will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-286939