Modified Dijkstra's Routing Algorithm for Security with Different Trust Degrees

Chan Thai, Vo-Nguyen Quoc Bao, Nhu Tran, Linh Nguyen, Hoa Huynh


A great number of efficient methods to improve the performance of the networks have been proposed in physical-layer security for wireless communications. So far, the security and privacy in wireless communications is optimized based on a fixed assumption about the trustworthiness or trust degrees (TD) of certain wireless nodes. The nodes are often classified into different types such as eavesdroppers, untrusted relays, and trusted cooperative nodes. Wireless nodes in different networks do not completely trust each other when cooperating or relaying information for each other. Optimizing the network based on trust degrees plays an important role in improving the security and privacy for the modern wireless network. We proposed a novel algorithm to find the route with the smallest total transmission time from the source to the destination and still guarantee that the accumulated TD is larger than a trust degree threshold. Simulation results are presented to analyze the affects of the transmit SNR, node density, and TD threshold on different network performance elements.

Full Text:



A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Comm. Surveys Tutorials, vol. 16, no. 1, pp. 1–24, Feb. 2014.

J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, “Jamming-aided secure communication in massive MIMO Rician channels,” IEEE Trans. Wireless Comm., Dec. 2015.

C. D. T. Thai, J. Lee, and T. Q. S. Quek, “Secret group key generation in physical layer for mesh topology,” in Proc. IEEE Global Comm. Conf. (GLOBECOM), Dec. 2015, pp. 1–6.

L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Sig. Processing, vol. 58, no. 3, pp. 1875–1888, Mar. 2010.

L. Jiang, H. Tian, Z. Xing, K. Wang, K. Zhang, S. Maharjan, S. Gjessing, and Y. Zhang, “Social-aware energy harvesting device-to-device communications in 5g networks,” IEEE Wireless Comm., vol. 23, no. 4, pp. 20–27, Aug. 2016.

Q. Li and L. Yang, “Artificial noise aided secure precoding for mimo untrusted two-way relay systems with perfect and imperfect channel state information,” IEEE Trans. Info. Foren. and Sec., vol. 13, no. 10, pp. 2628–2638, Oct 2018.

M. Zhao, J. Y. Ryu, J. Lee, T. Q. S. Quek, and S. Feng, “Exploiting trust degree for multiple-antenna user cooperation,” IEEE Trans. Wireless Comm., vol. 16, no. 8, pp. 4908–4923, Aug 2017.

J. Ryu, J. Lee, and T. Q. S. Quek, “Trust degree based beamforming for miso cooperative communication system,” IEEE Comm. Lett., vol. PP, no. 99, pp. 1–1, 2015.

Y. Wen, Y. Huo, L. Ma, T. Jing, and Q. Gao, “A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks,” IEEE Trans. Veh. Tech., vol. 68, no. 4, pp. 3500–3512, April 2019.

L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, “Security-aware relaying scheme for cooperative networks with untrusted relay nodes,” IEEE Comm. Lett., vol. 19, no. 3, pp. 463–466, March 2015.

J. Xiong, L. Cheng, D. Ma, and J. Wei, “Destination aided cooperative jamming for dual-hop amplify-and-forward MIMO untrusted relay systems,” IEEE Trans. Veh. Tech., accepted.

C. D. T. Thai, J. Lee, and T. Q. S. Quek, “Physical-layer secret key generation with colluding untrusted relays,” IEEE Trans. Wireless Comm., vol. 15, no. 2, pp. 1517–1530, Feb. 2016.

Y. Li, T. Wu, P. Hui, D. Jin, and S. Chen, “Social-aware D2D communications: qualitative insights and quantitative analysis,” IEEE Comm. Magazine, vol. 52, no. 6, pp. 150–158, Jun. 2014.

M. Zhang, X. Chen, and J. Zhang, “Social-aware relay selection for cooperative networking: An optimal stopping approach,” in IEEE Conf. on Int’l Comm. (ICC), Jun. 2014, pp. 2257–2262.

X. Chen, B. Proulx, X. Gong, and J. Zhang, “Exploiting social ties for cooperative D2D communications: A mobile social networking case,” IEEE/ACM Trans. Netw., vol. PP, no. 99, pp. 1–1, 2014.

J. Coon, “Modelling trust in random wireless networks,” in 2014 11th Int’l Symp. on Wireless Comm. Systems (ISWCS), Aug 2014, pp. 976–981.

W. She, Q. Liu, Z. Tian, J. Chen, B. Wang, and W. Liu, “Blockchain trust model for malicious node detection in wireless sensor networks,” IEEE Access, vol. 7, pp. 38 947–38 956, 2019.

Y. Xu, J. Liu, Y. Shen, X. Jiang, and N. Shiratori, “Physical layer security-aware routing and performance tradeoffs in ad hoc networks,” Computer Networks, vol. 123, pp. 77 – 87, 2017.

J. Yao, S. Feng, X. Zhou, and Y. Liu, “Secure routing in multihop wireless ad-hoc networks with decode-and-forward relaying,” IEEE Trans. Comm., vol. 64, no. 2, pp. 753–764, Feb. 2016.

M. Pagan, A. Hession, and S. Yuan, “A security-enhanced routing algorithm with path randomization,” in 2015 Int’l Conf. on Computing, Networking and Comm. (ICNC), Feb. 2015, pp. 1137–1141. [21] D. Medhi and K. Ramasamy, “Network routing: Algorithms, protocols, and architectures,” Elsevier, 2007.

R. C. Johnson and H. Jasik, “Antenna engineering handbook,” (2nd ed.). New York, NY: McGraw-Hill, Inc., 1984, ISBN 0-07-032291-0.


Copyright (c) 2020 REV Journal on Electronics and Communications

Copyright © 2011-2021
Radio and Electronics Association of Vietnam
All rights reserved