A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers

This paper aims to improve security performance of data transmission with a mobile eavesdropper in a wireless network. The instantaneous channel state information (CSI) of the mobile eavesdropper is unknown to legitimate users during the communication process. Different from existing work, we intend to reduce power consumption of friendly jamming signals. Motivated by the goal, this work presents a location-based prediction scheme to predict where the eavesdropper will be later and to decide whether a friendly jamming measure should be selected against the eavesdropper. The legitimate users only take the measure when the prediction result shows that there will be a risk during data transmission. According to the proposed method, system power can be saved to a large degree. Particularly, we first derive the expression of the secrecy outage probability and set a secrecy performance target. After providing a Markov mobile model of an eavesdropper, we design a prediction scheme to predict its location, so as to decide whether to employ cooperative jamming or not, and then design a power allocation scheme and a fast suboptimal helper selection method to achieve targeted and efficient cooperative jamming. Finally, numerical simulation results demonstrate the effectiveness of the proposed schemes.

[1]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[2]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[5]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[6]  Inkyu Lee,et al.  Outage Constrained Robust Beamforming for Secure Broadcasting Systems With Energy Harvesting , 2016, IEEE Transactions on Wireless Communications.

[7]  Jiguo Yu,et al.  Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks , 2017, IEEE Transactions on Vehicular Technology.

[8]  Zhen Li,et al.  ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel , 2017, IEEE Access.

[9]  Zhipeng Cai,et al.  FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.

[10]  Chunqiang Hu,et al.  A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers , 2017, WASA.

[11]  Lajos Hanzo,et al.  Joint Secure AF Relaying and Artificial Noise Optimization: A Penalized Difference-of-Convex Programming Framework , 2016, IEEE Access.

[12]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[13]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[14]  Xuemin Shen,et al.  Cooperative networking towards secure communications for CRNs , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[15]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[16]  Abdelhamid Mellouk,et al.  Markov-History Based Modeling for Realistic Mobility of Vehicles in VANETs , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[17]  Zhen Li,et al.  Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.

[18]  Ashish Khisti,et al.  Artificial-Noise Alignment for Secure Multicast using Multiple Antennas , 2012, IEEE Communications Letters.

[19]  Kai-Kit Wong,et al.  Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Feng Liu,et al.  Secrecy signal and artificial noise designs in cellular network , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[21]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[22]  Jianzhong Li,et al.  Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[23]  Feng Liu,et al.  Power Allocation and Jammer Selection of a Cooperative Jamming Strategy for Physical-Layer Security , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[24]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[25]  Sungwook Kim Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications , 2015, KSII Trans. Internet Inf. Syst..

[26]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[27]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[28]  Salvatore Marano,et al.  Mobility prediction and resource reservation in cellular networks with distributed Markov chains , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).

[29]  V. Janaki,et al.  Secure and Efficient Data Communication Protocol for Wireless Body Area Networks , 2017 .

[30]  Tony Q. S. Quek,et al.  Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.