Abstract
This paper proposes a transmission scheme to ensure the maritime communication security, which includes access rules, routing selection scheme, and power allocation mechanisms. The access rules and the routing selection utilize the automatic identification system (AIS) information to choose the secure access points and routing links to prevent eavesdropping, and the power allocation limits the leaked information by means of reducing the received signal power of the eavesdroppers. The simulation results show that the intercept probability of the proposed scheme decreases by about ten to the negative two power compared with that of the contrastive scheme, and the recovering proportion for eavesdropper is less than 0.2. In addition to above, the secrecy capacity of the proposed scheme achieves about 6.8% improvement compared with the baseline scheme.
This work was supported by the National Natural Science Foundation of China (91538203 and 61871257), the new strategic industries development projects of Shenzhen City (JCYJ20170307145820484), the Joint Research Foundation of the General Armaments Department and the Ministry of Education (6141A02033322), and the Beijing Innovation Center for Future Chips, Tsinghua University.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, Y.: Efficient coastal communications with sparse network coding. IEEE Netw. 32(4), 122–128 (2018)
Rao, S.N., Raj, D., Parthasarathy, V.: A novel solution for high speed internet over the oceans. In: Proceedings of IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops, Honolulu, pp. 906–912 (2018)
Singh, D., Kimbahune, S., Singh, V.V.: Mobile signal extension in deep sea - towards a safe and sustainable fisheries. In: Proceeding of 2016 ITU Kaleidoscope: ICTs for a Sustainable World, Bangkok, pp. 1–8 (2016)
Liu, J.: Device-to-device communication in LTE-advanced networks. A survey. IEEE Commun. Surv. Tutorials 17(4), 1923–1940 (2015)
Hong, Y.W.P.: Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Process. Mag. 30(5), 29–40 (2013)
Zou, Y.: Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 31(10), 2099–2111 (2013)
Sun, L.: Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Inf. 12(1), 291–300 (2016)
Feng, Y., Yang, D.Z., Yan, S.: Physical layer security enhancement in multi-user multi-full-duplex-relay networks. In: Proceedings of 2017 IEEE International Conference on Communications, Paris, pp. 1–7 (2017)
Luo, Y., Cui, L., Yang, Y.: Power control and channel access for physical-layer security of D2D underlay communication. In: 2015 International Conference on Wireless Communications and Signal Processing, Nanjing, pp. 1–5 (2015)
Chen, Z.: CodeHop: physical layer error correction and encryption with LDPC-based code hopping. Sci. China Inf. Sci. 59, 102309:1C–102309:15 (2016)
Ping, W.: An efficient helicopter-satellite communication scheme based on check-hybrid LDPC coding. Tsinghua Science and Technology 10(26599), TST.9010038 (2018)
Zhao, Y., Ren, J., Chi, X.: Maritime mobile channel transmission model based on ITM. In: 2nd International Symposium on Computer, Communication, Control and Automation. Atlantis Press (2013)
Papandriopoulos, J., Evans, J.S.: SCALE: a low-complexity distributed protocol for spectrum balancing in multiuser DSL networks. IEEE Trans. Inf. Theor. 55(8), 3711–3724 (2009)
Marks, B.R.: A general inner approximation algorithm for nonconvex mathematical programs. Oper. Res. 26(4), 681–683 (1978)
Liu, Q.: Queuing with adaptive modulation and coding over wireless links: cross-Layer analysis and design. IEEE Trans. Wireless Commun. 4(3), 1142–1153 (2005)
Qinghe, D., Ying, X., Wanyu, L., et al.: Security enhancement for multicast over internet of things by dynamically constructed fountain codes. Wireless Commun. Mob. Comput. 2018, 1–11 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Fu, Y., Jiang, C., Qin, Y., Yin, L. (2019). Secure Access and Routing Scheme for Maritime Communication Network. In: Han, S., Ye, L., Meng, W. (eds) Artificial Intelligence for Communications and Networks. AICON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 287. Springer, Cham. https://doi.org/10.1007/978-3-030-22971-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-22971-9_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22970-2
Online ISBN: 978-3-030-22971-9
eBook Packages: Computer ScienceComputer Science (R0)