6. Conclusions and final remarks
This paper analyzes the throughput of industrial multi-hop machine-to-machine networks under a secrecy constraint subject to malicious jamming. The scenario under analysis consists in an aggregator node, which collects and processes the sensor measurements, and a control unit that needs the proceeded information. This communication is wireless and may occur over multiple hops, and the communication engineer is expected to find the optimal position of the relay nodes and the coding rates used in the singlehop links so as to maximize the throughput in [bits/s/Hz] while respecting a given secrecy constraint and accounting for malicious jamming. By employing our stochastic-geometric-based model to characterize the uncertainties involved in the eavesdroppers’ and jammers’ positions, we first showed that the optimal choice without any secrecy constraint of coding rate (spectral efficiency) depends only on the path-loss exponent and normally assumes a high value. To sustain such a high rate, a great number of shorter hops are then preferable to a small number of longer hops. When the secrecy constraint is assumed, we proceeded with the throughput optimization and proved that the unconstrained performance can be achieved with the same optimal relay positions and coding rates only if a feasible solution exists. Otherwise, there is no solution for the problem that satisfies the minimum level of secrecy required. As a next step, we expect to evaluate our guidelines in actual industrial environments by following the insights provided herein. To do so, we aim at designing a feasible experimental deployment that utilizes established standards for industrial wireless systems. It is also important to point out that, although this analysis has been presented focusing on industrial deployments, our framework can be also extended to different kind of smart applications such as homes, cities, energy grids or highways.