Inicio  /  Algorithms  /  Vol: 12 Par: 2 (2019)  /  Artículo
ARTÍCULO
TITULO

Secrecy Control of Wireless Networks with Finite Encoding Blocklength

Qiuming Liu    
Shumin Liu    
Chunshui Zeng    
Xiaohong Qiu and He Xiao    

Resumen

We consider wireless multi-hop networks in which each node aims to securely transmit a message. To guarantee the secure transmission, we employ an independent randomization encoding strategy to encode the confidential message. We aim to maximize the network utility. Based on the finite length of a secrecy codewords strategy, we develop an improved control algorithm, subject to network stability and secrecy outage requirements. On the basis of the Lyapunov optimization method, we design an control algorithm, which is decomposed into end-to-end secrecy encoding, flow control and routing scheduling. The simulation results show that the proposed algorithm can achieve a utility result that is arbitrarily close to the optimal value. Finally, the performance of the proposed control policy is validated with various network conditions.

 Artículos similares

       
 
Bangchu Zhang, Yiyong Liang, Shuitao Rao, Yu Kuang and Weiyu Zhu    
In hypersonic flight control, characterized by challenges posed by input saturation, model parameter uncertainties, and external disturbances, this paper introduces a pioneering anti-input saturation control method based on RBFNN adaptivity. We have deve... ver más
Revista: Aerospace

 
Sharoon Saleem, Fawad Hussain and Naveed Khan Baloch    
Network on Chip (NoC) has emerged as a potential substitute for the communication model in modern computer systems with extensive integration. Among the numerous design challenges, application mapping on the NoC system poses one of the most complex and d... ver más
Revista: Algorithms

 
Abner Perez-Haro and Arturo Diaz-Perez    
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ... ver más
Revista: Information

 
Valerii Kozlovskyi, Ivan Shvets, Yurii Lysetskyi, Mikolaj Karpinski, Aigul Shaikhanova and Gulmira Shangytbayeva    
The classification of the natural and anthropogenic destabilizing factors of a telecommunications network as a complex system is presented herein. This research shows that to evaluate the parameters of a telecommunications network in the presence of dest... ver más
Revista: Information

 
Anni Zhao, Arash Toudeshki, Reza Ehsani, Joshua H. Viers and Jian-Qiao Sun    
The Delta robot is an over-actuated parallel robot with highly nonlinear kinematics and dynamics. Designing the control for a Delta robot to carry out various operations is a challenging task. Various advanced control algorithms, such as adaptive control... ver más
Revista: Algorithms