TPA: Prediction of Spoofing Attack Using Thermal Pattern Analysis in Ultra Dense Network for High Speed Handover Scenario

With the rising demand for a high-data rate by the subscribers, security becomes a prominent and critical issue for the emerging ultra-dense networks (UDNs). Although, more access points (APs) are involved with the purpose to strengthen the signal quality and aid in user equipment (UE) throughput enhancement. Thus, the UDN serves as a promising approach to accommodate a large number of APs (and UE’s) and ensure them with seamless connectivity and ubiquitous coverage. However, this intensification of base station (BS) densities will upsurge the handover (HO) rates for high-speed users. In this context, this paper investigates the security issues for the roaming users in UDN, pertaining to the increased HO percentage. Toward this goal, a novel approach called as thermal pattern analysis (TPA) is proposed to determine the probable region of attack, for high-speed users through tracking their footprints of thermal energy patterns (i.e., energy and spectral efficiency). We also perform the secrecy capacity check on wandering users, considering the fact that eavesdropper (or Eve) location is erratic. Comprehensive simulations are performed for real-time deployment and results validate the effectiveness of the proposed approach. Consequently, thermal analysis can be performed for all variety of mobile communication scenarios to uncover the adversary tremor. A real-time implementation using hardware components related to the prototype study has been carried out to access the performance in the actual world. From the analysis of the results, it is quite evident that TPA is more accurate in finding the probable region of low security for the UDN environment.

[1]  Muhammad Ali Imran,et al.  How much energy is needed to run a wireless network? , 2011, IEEE Wireless Communications.

[2]  Kathiravetpillai Sivanesan,et al.  Mobility performance optimization for 3GPP LTE HetNets , 2015, Design and Deployment of Small Cell Networks.

[3]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[4]  Jeffrey G. Andrews,et al.  Downlink Cellular Network Analysis With Multi-Slope Path Loss Models , 2014, IEEE Transactions on Communications.

[5]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[6]  Pradipta De,et al.  Location-based social video sharing over next generation cellular networks , 2015, IEEE Communications Magazine.

[7]  Kouichi Sakurai,et al.  Secrecy Capacity of Wireless LAN , 2009, 2009 International Conference on Availability, Reliability and Security.

[8]  W. Marsden I and J , 2012 .

[9]  Walaa Hamouda,et al.  Physical Layer Security in Ultra-Dense Networks , 2017, IEEE Wireless Communications Letters.

[10]  Lifeng Wang Physical layer security in wireless networks : design and enhancement , 2015 .

[11]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[12]  Junyi Li,et al.  Indoor mm-Wave Channel Measurements: Comparative Study of 2.9 GHz and 29 GHz , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[13]  Neil Irwin Bernardo,et al.  On the trade-off between physical layer security and energy efficiency of massive MIMO with small cells , 2016, 2016 International Conference on Advanced Technologies for Communications (ATC).

[14]  Garima Chopra,et al.  Possible Security Attack Modeling in Ultradense Networks Using High-Speed Handover Management , 2018, IEEE Transactions on Vehicular Technology.

[15]  Nicola Laurenti,et al.  On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading , 2015, IEEE Transactions on Information Forensics and Security.

[16]  Qinye Yin,et al.  Secure transmission with artificial noise in millimeter wave systems , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[17]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[18]  Ming Ding,et al.  On the performance of practical ultra-dense networks: The major and minor factors , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[19]  J. Takada,et al.  Large Scale Parameters and Double-Directional Characterization of Indoor Wideband Radio Multipath Channels at 11 GHz , 2014, IEEE Transactions on Antennas and Propagation.

[20]  Zhu Han,et al.  PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead , 2018, IEEE Transactions on Wireless Communications.

[21]  Brian M. Sadler,et al.  Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.

[22]  Garima Chopra,et al.  A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..

[23]  Seong-Lyun Kim,et al.  Downlink capacity and base station density in cellular networks , 2011, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[24]  Yao Li,et al.  Denial of Service Prevention for 5G , 2011, Wirel. Pers. Commun..

[25]  Franz de Leon,et al.  On the trade-off between physical layer security and energy efficiency of massive MIMO with small cells , 2016, ATC 2016.

[26]  Byeong Gi Lee,et al.  A Joint Algorithm for Base Station Operation and User Association in Heterogeneous Networks , 2013, IEEE Communications Letters.

[27]  Junyi Li,et al.  Network densification: the dominant theme for wireless evolution into 5G , 2014, IEEE Communications Magazine.

[28]  Satyanarayana Vuppala,et al.  Secrecy-Rate Analysis in Multitier Heterogeneous Networks Under Generalized Fading Model , 2017, IEEE Internet of Things Journal.

[29]  Federico Boccardi,et al.  SLEEP mode techniques for small cell deployments , 2011, IEEE Communications Magazine.

[30]  Mikko Valkama,et al.  Spectral and energy efficiency of ultra-dense networks under different deployment strategies , 2015, IEEE Communications Magazine.

[31]  Xiaofeng Tao,et al.  Secrecy Outage Probability in Multi-RAT Heterogeneous Networks , 2016, IEEE Communications Letters.

[32]  Bongyong Song,et al.  A holistic view on hyper-dense heterogeneous and small cell networks , 2013, IEEE Communications Magazine.

[33]  Tharek Abd Rahman,et al.  Path loss and RMS delay spread model for 5G channel at 19 GHz , 2017, 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA).

[34]  Ying Wang,et al.  Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study , 2016, IEEE Access.

[35]  Christos Verikoukis,et al.  Spectral Efficient and Energy Aware Clustering in Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.

[36]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.

[37]  Hamid Jafarkhani,et al.  Wireless Secure Communication With Beamforming and Jamming in Time-Varying Wiretap Channels , 2018, IEEE Transactions on Information Forensics and Security.

[38]  Jeffrey H. Reed,et al.  A Colonel Blotto Game for Anti-Jamming in the Internet of Things , 2014, GLOBECOM 2014.

[39]  Jun-ichi Takada,et al.  Polarimetric Mm-wave channel measurement and characterization in a small office , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[40]  Tony Q. S. Quek,et al.  Optimal cooperative range of distributed transmitters for communications secrecy , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).