{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:59Z","timestamp":1740140579383,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T00:00:00Z","timestamp":1632528000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T00:00:00Z","timestamp":1632528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100010752","name":"National Graduate School in Computer Science","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100010752","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003945","name":"Link\u00f6ping University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003945","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Congestion-aware scheduling in case of downlink cellular communication has ignored the distribution of diverse content to different clients with heterogeneous secrecy requirements. Other possible application areas that encounter the preceding issue are secure offloading in mobile-edge computing, and vehicular communication. In this paper, we extend the work in Arvanitaki et al. (SN Comput Sci 1(1):53, 2019) by taking into consideration congestion and random access. Specifically, we study a two-user congestion-aware broadcast channel with heterogeneous traffic and different security requirements. We consider two randomized policies for selecting which packets to transmit, one is congestion-aware by taking into consideration the queue size, whereas the other one is congestion-agnostic. We analyse the throughput and the delay performance under two decoding schemes at the receivers, and provide insights into their relative security performance and into how congestion control at the queue holding confidential information can help decrease the average delay per packet. We show that the congestion-aware policy provides better delay, throughput, and secrecy performance for large arrival packet probabilities at the queue holding the confidential information. The derived results also take account of the self-interference caused at the receiver for whom confidential data is intended due to its full-duplex operation while jamming the communication at the other user. Finally, for two decoding schemes, we formulate our problems in terms of multi-objective optimization, which allows for finding a trade-off between the average packet delay for packets intended for the legitimate user and the throughput for the other user under congestion-aware policy.<\/jats:p>","DOI":"10.1186\/s13638-021-02046-7","type":"journal-article","created":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T18:02:33Z","timestamp":1632592953000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance analysis of congestion-aware secure broadcast channels"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6360-5080","authenticated-orcid":false,"given":"Antonia","family":"Arvanitaki","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Pappas","sequence":"additional","affiliation":[]},{"given":"Niklas","family":"Carlsson","sequence":"additional","affiliation":[]},{"given":"Parthajit","family":"Mohapatra","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Burdakov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,25]]},"reference":[{"issue":"1","key":"2046_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s42979-019-0055-3","volume":"1","author":"A Arvanitaki","year":"2019","unstructured":"A. Arvanitaki, N. Pappas, P. Mohapatra, N. Carlsson, Delay performance of a two-user broadcast channel with security constraints. SN Comput. Sci. 1(1), 53 (2019)","journal-title":"SN Comput. Sci."},{"issue":"3","key":"2046_CR2","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"A. Mukherjee, S.A.A. Fakoorian, J. Huang, A.L. Swindlehurst, Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 16(3), 1550\u20131573 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"2046_CR3","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"A.D. Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975)","journal-title":"Bell Syst. Tech. J."},{"issue":"3","key":"2046_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csisz\u00e1r","year":"1978","unstructured":"I. Csisz\u00e1r, J. K\u00f6rner, Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3), 339\u2013348 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"2046_CR5","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.1109\/TWC.2017.2689005","volume":"16","author":"T Zheng","year":"2017","unstructured":"T. Zheng, H. Wang, J. Yuan, Z. Han, M.H. Lee, Physical layer security in wireless ad hoc networks under a hybrid full-\/half-duplex receiver deployment strategy. IEEE Trans. Wirel. Commun. 16(6), 3827\u20133839 (2017)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"10","key":"2046_CR6","doi-asserted-by":"publisher","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","volume":"54","author":"PK Gopala","year":"2008","unstructured":"P.K. Gopala, L. Lai, H. El Gamal, On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54(10), 4687\u20134698 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"2046_CR7","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/LCOMM.2011.011811.102433","volume":"15","author":"X Zhou","year":"2011","unstructured":"X. Zhou, M.R. McKay, B. Maham, A. Hj\u00f8rungnes, Rethinking the secrecy outage formulation: a secure transmission design perspective. IEEE Commun. Lett. 15(3), 302\u2013304 (2011)","journal-title":"IEEE Commun. Lett."},{"key":"2046_CR8","doi-asserted-by":"crossref","unstructured":"L. Zhang, H. Zhang, D. Wu, D. Yuan, Improving physical layer security for miso systems via using artificial noise, in IEEE Global Communications Conference (GLOBECOM), vol. 2015 (2015), p. 1\u20136","DOI":"10.1109\/GLOCOM.2015.7417842"},{"issue":"1","key":"2046_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/s13635-018-0077-8","volume":"2018","author":"K Chopra","year":"2018","unstructured":"K. Chopra, R. Bose, A. Joshi, Secrecy outage of threshold-based cooperative relay network with and without direct links. EURASIP J. Inf. Secur. 2018(1), 7 (2018). https:\/\/doi.org\/10.1186\/s13635-018-0077-8","journal-title":"EURASIP J. Inf. Secur."},{"issue":"10","key":"2046_CR10","first-page":"4611","volume":"66","author":"N Pappas","year":"2018","unstructured":"N. Pappas, M. Kountouris, A. Ephremides, V. Angelakis, Stable throughput region of the two-user broadcast channel. IEEE Trans. Commun. 66(10), 4611\u20134621 (2018)","journal-title":"IEEE Trans. Commun."},{"issue":"9","key":"2046_CR11","doi-asserted-by":"publisher","first-page":"2294","DOI":"10.1109\/TIFS.2018.2818076","volume":"13","author":"P Mohapatra","year":"2018","unstructured":"P. Mohapatra, N. Pappas, J. Lee, T.Q.S. Quek, V. Angelakis, Secure communications for the two-user broadcast channel with random traffic. IEEE Trans. Inf. Forensics Secur. 13(9), 2294\u20132309 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2046_CR12","doi-asserted-by":"publisher","first-page":"37 343","DOI":"10.1109\/ACCESS.2020.2974233","volume":"8","author":"S Lai","year":"2020","unstructured":"S. Lai, J. Xia, D. Zou, L. Fan, Intelligent secure communication for cognitive networks with multiple primary transmit power. IEEE Access 8, 37 343-37 351 (2020)","journal-title":"IEEE Access"},{"key":"2046_CR13","doi-asserted-by":"publisher","unstructured":"Y. Liu, M. Xiao, S. Chen, F. Bai, J. Pan and D. Zhang, An intelligent edge-chain-enabled access control mechanism for ioV,\nin IEEE Internet of Things Journal, vol. 8, no. 15, pp. 12231\u201312241. (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3061467","DOI":"10.1109\/JIOT.2021.3061467"},{"key":"2046_CR14","doi-asserted-by":"crossref","unstructured":"K. Miettinen, Nonlinear Multiobjective Optimization (1999)","DOI":"10.1007\/978-1-4615-5563-6"},{"key":"2046_CR15","unstructured":"M. Ehrgott, Multicriteria Optimization (2005)"},{"key":"2046_CR16","doi-asserted-by":"crossref","unstructured":"R.\u00a0Samano-Robles, A.\u00a0Gameiro, Joint spectrum selection and radio resource management based on multi-objective portfolio optimization for cognitive radio networks, in The First International Conference on Future Generation Communication Technologies (2012), p. 22\u201327","DOI":"10.1109\/FGCT.2012.6476579"},{"issue":"2","key":"2046_CR17","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/TVT.2006.889565","volume":"56","author":"M Elmusrati","year":"2007","unstructured":"M. Elmusrati, R. Jantti, H.N. Koivo, Multiobjective distributed power control algorithm for CDMA wireless communication systems. IEEE Trans. Veh. Technol. 56(2), 779\u2013788 (2007)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"2046_CR18","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/TWC.2008.060533","volume":"7","author":"M Elmusrati","year":"2008","unstructured":"M. Elmusrati, H. El-Sallabi, H. Koivo, Applications of multi-objective optimization techniques in radio resource scheduling of cellular communication systems. IEEE Trans. Wirel. Commun. 7(1), 343\u2013353 (2008)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"11","key":"2046_CR19","doi-asserted-by":"publisher","first-page":"4490","DOI":"10.1109\/TCOMM.2015.2465903","volume":"63","author":"Z Tong","year":"2015","unstructured":"Z. Tong, M. Haenggi, Throughput analysis for full-duplex wireless networks with imperfect self-interference cancellation. IEEE Trans. Commun. 63(11), 4490\u20134500 (2015)","journal-title":"IEEE Trans. Commun."},{"issue":"7","key":"2046_CR20","doi-asserted-by":"publisher","first-page":"3544","DOI":"10.1109\/TWC.2015.2408319","volume":"14","author":"N Pappas","year":"2015","unstructured":"N. Pappas, M. Kountouris, A. Ephremides, A. Traganitis, Relay-assisted multiple access with full-duplex multi-packet reception. IEEE Trans. Wirel. Commun. 14(7), 3544\u20133558 (2015)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"9","key":"2046_CR21","doi-asserted-by":"publisher","first-page":"5884","DOI":"10.1109\/TIT.2011.2162155","volume":"57","author":"K Jagannathan","year":"2011","unstructured":"K. Jagannathan, E. Modiano, L. Zheng, On the role of queue length information in network control. IEEE Trans. Inf. Theory 57(9), 5884\u20135896 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2046_CR22","doi-asserted-by":"crossref","unstructured":"N.\u00a0Pappas, M.\u00a0Kountouris, Throughput of a cognitive radio network under congestion constraints: a network-level study, in 2014 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM) (2014), p. 162\u2013166","DOI":"10.4108\/icst.crowncom.2014.255576"},{"key":"2046_CR23","doi-asserted-by":"publisher","first-page":"89 497","DOI":"10.1109\/ACCESS.2020.2990567","volume":"8","author":"J Blank","year":"2020","unstructured":"J. Blank, K. Deb, Pymoo: multi-objective optimization in python. IEEE Access 8, 89 497-89 509 (2020)","journal-title":"IEEE Access"},{"issue":"2","key":"2046_CR24","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"K. Deb, A. Pratap, S. Agarwal, T. Meyarivan, A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-02046-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-021-02046-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-02046-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T18:19:45Z","timestamp":1632593985000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-021-02046-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,25]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["2046"],"URL":"https:\/\/doi.org\/10.1186\/s13638-021-02046-7","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2021,9,25]]},"assertion":[{"value":"27 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"178"}}