{"id":"https://openalex.org/W2963848061","doi":"https://doi.org/10.1109/tcomm.2018.2835478","title":"Secure Routing with Power Optimization for Ad-hoc Networks","display_name":"Secure Routing with Power Optimization for Ad-hoc Networks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2963848061","doi":"https://doi.org/10.1109/tcomm.2018.2835478","mag":"2963848061"},"language":"en","primary_location":{"id":"doi:10.1109/tcomm.2018.2835478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2018.2835478","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100630996","display_name":"Hui\u2010Ming Wang","orcid":"https://orcid.org/0000-0003-4107-9512"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui-Ming Wang","raw_affiliation_strings":["Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100456377","display_name":"Yan Zhang","orcid":"https://orcid.org/0000-0003-1585-0801"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhang","raw_affiliation_strings":["Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006080984","display_name":"Derrick Wing Kwan Ng","orcid":"https://orcid.org/0000-0001-6400-712X"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Derrick Wing Kwan Ng","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034971703","display_name":"Moon Ho Lee","orcid":"https://orcid.org/0000-0002-8435-8557"},"institutions":[{"id":"https://openalex.org/I80611190","display_name":"Jeonbuk National University","ror":"https://ror.org/05q92br09","country_code":"KR","type":"education","lineage":["https://openalex.org/I80611190"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Moon Ho Lee","raw_affiliation_strings":["Division of Electronics Engineering, Chonbuk National University, Jeonju, South Korea"],"affiliations":[{"raw_affiliation_string":"Division of Electronics Engineering, Chonbuk National University, Jeonju, South Korea","institution_ids":["https://openalex.org/I80611190"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100630996"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":1.2875,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.82034695,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transmitter-power-output","display_name":"Transmitter power output","score":0.7070134878158569},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7030165195465088},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5874663591384888},{"id":"https://openalex.org/keywords/poisson-point-process","display_name":"Poisson point process","score":0.5131252408027649},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5121772289276123},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.5109109282493591},{"id":"https://openalex.org/keywords/dijkstras-algorithm","display_name":"Dijkstra's algorithm","score":0.4727671444416046},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4673469662666321},{"id":"https://openalex.org/keywords/destination-sequenced-distance-vector-routing","display_name":"Destination-Sequenced Distance Vector routing","score":0.4250243604183197},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.38327786326408386},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.37285369634628296},{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.30832773447036743},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.2659028470516205},{"id":"https://openalex.org/keywords/poisson-distribution","display_name":"Poisson distribution","score":0.2256358563899994},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18104305863380432},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1740931272506714},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13906744122505188}],"concepts":[{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.7070134878158569},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7030165195465088},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5874663591384888},{"id":"https://openalex.org/C16757284","wikidata":"https://www.wikidata.org/wiki/Q1145117","display_name":"Poisson point process","level":3,"score":0.5131252408027649},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5121772289276123},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.5109109282493591},{"id":"https://openalex.org/C173870130","wikidata":"https://www.wikidata.org/wiki/Q8548","display_name":"Dijkstra's algorithm","level":4,"score":0.4727671444416046},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4673469662666321},{"id":"https://openalex.org/C29436982","wikidata":"https://www.wikidata.org/wiki/Q3700557","display_name":"Destination-Sequenced Distance Vector routing","level":5,"score":0.4250243604183197},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.38327786326408386},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.37285369634628296},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.30832773447036743},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.2659028470516205},{"id":"https://openalex.org/C100906024","wikidata":"https://www.wikidata.org/wiki/Q205692","display_name":"Poisson distribution","level":2,"score":0.2256358563899994},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18104305863380432},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1740931272506714},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13906744122505188},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.0},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcomm.2018.2835478","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcomm.2018.2835478","pdf_url":null,"source":{"id":"https://openalex.org/S196647941","display_name":"IEEE Transactions on Communications","issn_l":"0090-6778","issn":["0090-6778","1558-0857"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W121557243","https://openalex.org/W1530662203","https://openalex.org/W1607265799","https://openalex.org/W1902764075","https://openalex.org/W1970334960","https://openalex.org/W1979408141","https://openalex.org/W1987210641","https://openalex.org/W1989064223","https://openalex.org/W2011670293","https://openalex.org/W2015883438","https://openalex.org/W2016228265","https://openalex.org/W2043769961","https://openalex.org/W2072563372","https://openalex.org/W2075653421","https://openalex.org/W2103150712","https://openalex.org/W2115613211","https://openalex.org/W2115843455","https://openalex.org/W2127931941","https://openalex.org/W2139794367","https://openalex.org/W2145873277","https://openalex.org/W2158092196","https://openalex.org/W2169153222","https://openalex.org/W2184413915","https://openalex.org/W2197037893","https://openalex.org/W2226740399","https://openalex.org/W2232768275","https://openalex.org/W2241313123","https://openalex.org/W2339070281","https://openalex.org/W2476801324","https://openalex.org/W2493644632","https://openalex.org/W2556628207","https://openalex.org/W2556803828","https://openalex.org/W2612601098","https://openalex.org/W2889074725","https://openalex.org/W2964026136","https://openalex.org/W3099283425","https://openalex.org/W4250589301","https://openalex.org/W4294219212","https://openalex.org/W6754256614"],"related_works":["https://openalex.org/W4200319726","https://openalex.org/W2379764279","https://openalex.org/W1984793747","https://openalex.org/W3197729047","https://openalex.org/W4312547492","https://openalex.org/W1987034598","https://openalex.org/W2370486284","https://openalex.org/W2360924501","https://openalex.org/W2143847498","https://openalex.org/W4318482790"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"consider":[4],"the":[5,21,52,59,65,75,79,89,101,109,130,135,140,146,175,187,191,207,212],"problem":[6,152],"of":[7,23,67,82,139,145,190,209,215],"joint":[8],"secure":[9,219],"routing":[10,76,111],"and":[11,78,108,134,142,197,200,211],"transmit":[12,80,103,137,169,213],"power":[13,81,104,138,214],"optimization":[14],"for":[15,194,218],"a":[16,28,37,40,43,68,97,106,120,181,203],"multi-hop":[17,44],"ad-hoc":[18],"network":[19],"under":[20,64],"existence":[22],"randomly":[24],"distributed":[25],"eavesdroppers":[26],"following":[27],"Poisson":[29],"point":[30],"process.":[31],"Secrecy":[32],"messages":[33],"are":[34],"delivered":[35],"from":[36],"source":[38],"to":[39,57,128],"destination":[41],"through":[42],"route":[45,148],"connected":[46],"by":[47,73,96,116],"multiple":[48,124],"legitimate":[49],"relays":[50],"in":[51],"network.":[53],"Our":[54],"goal":[55],"is":[56,126,149],"minimize":[58],"end-to-end":[60],"connection":[61],"outage":[62,70],"probability":[63,71],"constraint":[66],"secrecy":[69,131],"threshold,":[72],"optimizing":[74],"path":[77,112],"each":[83,143,216],"hop":[84,144,217],"jointly.":[85],"We":[86],"show":[87,186],"that":[88],"globally":[90],"optimal":[91,102,110,136],"solution":[92],"could":[93],"be":[94,114,154,172],"obtained":[95],"two-step":[98],"procedure":[99],"where":[100],"has":[105],"closed-form":[107],"can":[113,153,171],"found":[115],"Dijkstra's":[117],"algorithm.":[118,166],"Then":[119],"friendly":[121],"jammer":[122,141],"with":[123,163,180],"antennas":[125],"applied":[127],"enhance":[129],"performance":[132,188],"further,":[133],"selected":[147],"investigated.":[150],"This":[151],"solved":[155],"optimally":[156],"via":[157],"an":[158],"iterative":[159],"outer":[160],"polyblock":[161],"approximation":[162,178],"1-D":[164],"search":[165],"Furthermore,":[167],"suboptimal":[168],"powers":[170],"derived":[173],"using":[174],"successive":[176],"convex":[177],"method":[179],"lower":[182],"complexity.":[183],"Simulation":[184],"results":[185],"improvement":[189],"proposed":[192],"algorithms":[193],"both":[195],"non-jamming":[196],"jamming":[198],"scenarios,":[199],"also":[201],"reveal":[202],"non-trivial":[204],"tradeoff":[205],"between":[206],"numbers":[208],"hops":[210],"routing.":[220]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
