scholarly journals A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Yan Huo ◽  
Yuqi Tian ◽  
Chunqiang Hu ◽  
Qinghe Gao ◽  
Tao Jing

This paper aims to improve security performance of data transmission with a mobile eavesdropper in a wireless network. The instantaneous channel state information (CSI) of the mobile eavesdropper is unknown to legitimate users during the communication process. Different from existing work, we intend to reduce power consumption of friendly jamming signals. Motivated by the goal, this work presents a location-based prediction scheme to predict where the eavesdropper will be later and to decide whether a friendly jamming measure should be selected against the eavesdropper. The legitimate users only take the measure when the prediction result shows that there will be a risk during data transmission. According to the proposed method, system power can be saved to a large degree. Particularly, we first derive the expression of the secrecy outage probability and set a secrecy performance target. After providing a Markov mobile model of an eavesdropper, we design a prediction scheme to predict its location, so as to decide whether to employ cooperative jamming or not, and then design a power allocation scheme and a fast suboptimal helper selection method to achieve targeted and efficient cooperative jamming. Finally, numerical simulation results demonstrate the effectiveness of the proposed schemes.

2020 ◽  
Vol 16 (6) ◽  
pp. 155014772093346
Author(s):  
Xin Fan ◽  
Yan Huo

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.


2019 ◽  
Vol 9 (21) ◽  
pp. 4506
Author(s):  
Chen Wei ◽  
Wendong Yang ◽  
Yueming Cai

This paper investigates the secure transmission for buffer-aided relay networks in the Internet of Things (IoT) in the presence of multiple passive eavesdroppers. For security enhancement, we adopt the max-link relay selection policy and propose three secure transmission schemes: (1) non-jamming (NJ); (2) source cooperative jamming (SCJ); and (3) source cooperative jamming with optimal power allocation (SCJ-OPA). Moreover, to analyze the secrecy performance comprehensively, two eavesdropping scenarios, i.e., non-colluding eavesdroppers (NCE) and colluding eavesdroppers (CE) are considered. Based on this, by modeling the dynamic buffer state transition as a Markov chain, we derive the exact closed-form expressions of the secrecy outage probability, the average secrecy throughput, and the end-to-end delay for each schemes. The analytical analysis and simulation shows that the SCJ-OPA scheme achieves similar performance as the NJ scheme when the total transmit power is small. On the other hand, when the transmit power is high, the performance achieved by SCJ-OPA is similar to that of SCJ. Thereby, the SCJ-OPA scheme can achieve better performance across the entire total transmit power, which makes up the defects of NJ and SCJ exactly.


In wireless data transmission, providing security over communication channels has become a growing concern. Traditionally cryptography is used to provide secrecy. However, physical layer studies show that it allows a huge potential in providing secrecy. In this paper, secrecy outage probability is derived for Rician fading channels. A new secrecy metric Generalized Secrecy Outage Probability(GSOP) derivation is considered to overcome the limitation of traditional Outage probability for both passive and active cases of eavesdropping.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5456 ◽  
Author(s):  
Kyusung Shim ◽  
Toan-Van Nguyen ◽  
Beongku An

This paper studies the secrecy performance of wireless power transfer (WPT)-based multi-hop transmissions in wireless sensors networks (WSNs), where legitimate nodes harvest energy from multiple power beacons (PBs) to support the multi-hop secure data transmission to a destination in the presence of an eavesdropper. Specifically, the PBs not only transfer radio frequency energy to the legitimate nodes but also act as friendly jammers to protect data transmission. To improve secrecy performance, we propose two secure scheduling schemes, named minimum node selection (MNS) scheme and optimal node selection (ONS) scheme. We then evaluate the performance of the proposed schemes in terms of the exact closed-form for secrecy outage probability (SOP) and asymptotic SOP. The developed analyses are verified by Monte-Carlo simulations. The numerical results show that the ONS scheme outperforms the MNS scheme emerging as an effective protocol for secure multi-hop transmission in WSNs. Furthermore, the effects of the number of PBs, number of hops, time switching ratio, and the secure target data rate on the system performance are also investigated.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Kyusung Shim ◽  
Beongku An

In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of one base station, multinear user, multifar user, and one eavesdropper. To improve the secrecy performance, we propose the users selection scheme, called best-secure-near-user best-secure-far-user (BSNBSF) scheme. The BSNBSF scheme aims to select the best near-far user pair, whose data transmission is the most robust against the overhearing of an eavesdropper. In order to facilitate the performance analysis of the BSNBSF scheme in terms of secrecy outage performance, we derive the exact closed-form expression for secrecy outage probability (SOP) of the selected near user and the tight approximated closed-form expression for SOP of the selected far user, respectively. Additionally, we propose the descent-based search method to find the optimal values of the power allocation coefficients that can minimize the total secrecy outage probability (TSOP). The developed analyses are corroborated through Monte Carlo simulation. Comparisons with the random-near-user random-far-user (RNRF) scheme are performed and show that the proposed scheme significantly improves the secrecy performance.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1047
Author(s):  
Van Phu Tuan ◽  
Ic-Pyo Hong

This paper studies the secure communication of a non-orthogonal multiple-access (NOMA) relaying system in the presence of an eavesdropper in which the NOMA communication between a source and two users is assisted by an energy-harvesting (EH) relay. The relay extracts a part of its received signal strength using a power-splitting (PS) policy then harvests energy using a non-linear EH (NLEH) circuit. A friendly jammer sends jamming signals to help secure communication. The jammer is exploited as an additional energy source. A store-and-transmit (SaT) scheme which allows the EH relay to perform energy storing and information transmitting is proposed. For performance evaluation, the closed-form expressions for three metrics, secrecy outage probability (SOP), average achievable secrecy rate (AASR) and average stored energy (ASE) are derived. These results enable studies on the effects of various system parameters, such as NOMA power-allocation factors, target secrecy rates, jammer’s location, and relay’s power levels, on the system performance.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Zied Bouida ◽  
Athanasios Stavridis ◽  
Ali Ghrayeb ◽  
Harald Haas ◽  
Mazen Hasna ◽  
...  

We propose in this paper a physical-layer security (PLS) scheme for dual-hop cooperative networks in an effort to enhance the communications secrecy. The underlying model comprises a transmitting node (Alice), a legitimate node (Bob), and an eavesdropper (Eve). It is assumed that there is no direct link between Alice and Bob, and the communication between them is done through trusted relays over two phases. In the first phase, precoding-aided spatial modulation (PSM) is employed, owing to its low interception probability, while simultaneously transmitting a jamming signal from Bob. In the second phase, the selected relay detects and transmits the intended signal, whereas the remaining relays transmit the jamming signal received from Bob. We analyze the performance of the proposed scheme in terms of the ergodic secrecy capacity (ESC), the secrecy outage probability (SOP), and the bit error rate (BER) at Bob and Eve. We obtain closed-form expressions for the ESC and SOP and we derive very tight upper-bounds for the BER. We also optimize the performance with respect to the power allocation among the participating relays in the second phase. We provide examples with numerical and simulation results through which we demonstrate the effectiveness of the proposed scheme.


Sign in / Sign up

Export Citation Format

Share Document