A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers

This paper aims to help save energy when legitimate users exploit physical layer security techniques to guarantee security, which can suit resource limited systems more. It proposes a risk prediction scheme in a communication scene with a mobile eavesdropper, whose CSI (Channel State Information) is unknown to legitimate users. The scheme can predict where the eavesdropper will be later and decide whether security measures should be taken to against it. The security measures are only taken when the prediction result shows there will be risks in the communication process. Based on the proposed scheme, resources can be saved to a large degree as well as the security guaranteed.

[1]  Tony Q. S. Quek,et al.  Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.

[2]  Xiuzhen Cheng,et al.  Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[3]  Jiguo Yu,et al.  Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems , 2017, IEEE Internet of Things Journal.

[4]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[5]  Yingshu Li,et al.  Using crowdsourced data in location-based social networks to explore influence maximization , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[6]  Zhipeng Cai,et al.  FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.

[7]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[8]  Zhen Li,et al.  Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.

[9]  Xiaoshuang Xing,et al.  Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[10]  Xianbin Wang,et al.  Security enhancement in cooperative jamming using compromised secrecy region minimization , 2013, 2013 13th Canadian Workshop on Information Theory.

[11]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[12]  Jianzhong Li,et al.  Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.