Skip to main content

Secure Access and Routing Scheme for Maritime Communication Network

  • Conference paper
  • First Online:
Artificial Intelligence for Communications and Networks (AICON 2019)

Abstract

This paper proposes a transmission scheme to ensure the maritime communication security, which includes access rules, routing selection scheme, and power allocation mechanisms. The access rules and the routing selection utilize the automatic identification system (AIS) information to choose the secure access points and routing links to prevent eavesdropping, and the power allocation limits the leaked information by means of reducing the received signal power of the eavesdroppers. The simulation results show that the intercept probability of the proposed scheme decreases by about ten to the negative two power compared with that of the contrastive scheme, and the recovering proportion for eavesdropper is less than 0.2. In addition to above, the secrecy capacity of the proposed scheme achieves about 6.8% improvement compared with the baseline scheme.

This work was supported by the National Natural Science Foundation of China (91538203 and 61871257), the new strategic industries development projects of Shenzhen City (JCYJ20170307145820484), the Joint Research Foundation of the General Armaments Department and the Ministry of Education (6141A02033322), and the Beijing Innovation Center for Future Chips, Tsinghua University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, Y.: Efficient coastal communications with sparse network coding. IEEE Netw. 32(4), 122–128 (2018)

    Article  Google Scholar 

  2. Rao, S.N., Raj, D., Parthasarathy, V.: A novel solution for high speed internet over the oceans. In: Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops, Honolulu, pp. 906–912 (2018)

    Google Scholar 

  3. Singh, D., Kimbahune, S., Singh, V.V.: Mobile signal extension in deep sea - towards a safe and sustainable fisheries. In: Proceeding of 2016 ITU Kaleidoscope: ICTs for a Sustainable World, Bangkok, pp. 1–8 (2016)

    Google Scholar 

  4. Liu, J.: Device-to-device communication in LTE-advanced networks. A survey. IEEE Commun. Surv. Tutorials 17(4), 1923–1940 (2015)

    Article  Google Scholar 

  5. Hong, Y.W.P.: Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Process. Mag. 30(5), 29–40 (2013)

    Article  Google Scholar 

  6. Zou, Y.: Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 31(10), 2099–2111 (2013)

    Article  Google Scholar 

  7. Sun, L.: Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Inf. 12(1), 291–300 (2016)

    Article  Google Scholar 

  8. Feng, Y., Yang, D.Z., Yan, S.: Physical layer security enhancement in multi-user multi-full-duplex-relay networks. In: Proceedings of 2017 IEEE International Conference on Communications, Paris, pp. 1–7 (2017)

    Google Scholar 

  9. Luo, Y., Cui, L., Yang, Y.: Power control and channel access for physical-layer security of D2D underlay communication. In: 2015 International Conference on Wireless Communications and Signal Processing, Nanjing, pp. 1–5 (2015)

    Google Scholar 

  10. Chen, Z.: CodeHop: physical layer error correction and encryption with LDPC-based code hopping. Sci. China Inf. Sci. 59, 102309:1C–102309:15 (2016)

    Google Scholar 

  11. Ping, W.: An efficient helicopter-satellite communication scheme based on check-hybrid LDPC coding. Tsinghua Science and Technology 10(26599), TST.9010038 (2018)

    Google Scholar 

  12. Zhao, Y., Ren, J., Chi, X.: Maritime mobile channel transmission model based on ITM. In: 2nd International Symposium on Computer, Communication, Control and Automation. Atlantis Press (2013)

    Google Scholar 

  13. Papandriopoulos, J., Evans, J.S.: SCALE: a low-complexity distributed protocol for spectrum balancing in multiuser DSL networks. IEEE Trans. Inf. Theor. 55(8), 3711–3724 (2009)

    Article  MathSciNet  Google Scholar 

  14. Marks, B.R.: A general inner approximation algorithm for nonconvex mathematical programs. Oper. Res. 26(4), 681–683 (1978)

    Article  MathSciNet  Google Scholar 

  15. Liu, Q.: Queuing with adaptive modulation and coding over wireless links: cross-Layer analysis and design. IEEE Trans. Wireless Commun. 4(3), 1142–1153 (2005)

    Article  Google Scholar 

  16. Qinghe, D., Ying, X., Wanyu, L., et al.: Security enhancement for multicast over internet of things by dynamically constructed fountain codes. Wireless Commun. Mob. Comput. 2018, 1–11 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liuguo Yin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fu, Y., Jiang, C., Qin, Y., Yin, L. (2019). Secure Access and Routing Scheme for Maritime Communication Network. In: Han, S., Ye, L., Meng, W. (eds) Artificial Intelligence for Communications and Networks. AICON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 287. Springer, Cham. https://doi.org/10.1007/978-3-030-22971-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22971-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22970-2

  • Online ISBN: 978-3-030-22971-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics