Skip to main content

A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications

  • Conference paper
  • First Online:
  • 2367 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

Abstract

With the massive growth of mobile devices and data traffic, it is important to ensure wireless security. Physical layer security utilizing properties of wireless transmission is regarded as a common and promising technology. As a typical physical layer security technology, cooperative jamming is usually affected by social relationships between devices. Devices with excellent social relationships are willing to provide friendly cooperative jamming. Some researchers start to study cooperative jamming using social relationship. In the paper, we propose a social relationship enabled cooperative jamming scheme to achieve secure communications by combining both physical and social information. In particular, we utilize a novel approach to quantify the social relationship metric according to physical locations and effective contact duration between devices. Then, density of legitimate devices as cooperative jammers can be obtained through social relationships. In our scheme, we theoretically analyze the connection outage probability and the secrecy outage probability. Finally, comprehensive numerical results are presented to validate both connection and secrecy performance of cooperative jamming with social relationship.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cai, Z., He, Z.: Trading private range counting over big IoT data. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 144–153 (2019)

    Google Scholar 

  2. Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968–979 (2020)

    Article  Google Scholar 

  3. Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8–14 (2018)

    Article  Google Scholar 

  4. Zheng, X., Cai, Z., Li, Y.: Data linkage in smart internet of things systems: a consideration from a privacy perspective. IEEE Commun. Mag. 56(9), 55–61 (2018)

    Article  Google Scholar 

  5. Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766–775 (2020)

    Article  MathSciNet  Google Scholar 

  6. Huo, Y., Fan, X., Ma, L., Cheng, X., Tian, Z., Chen, D.: Secure communications in tiered 5G wireless networks with cooperative jamming. IEEE Trans. Wirel. Commun. 18(6), 3265–3280 (2019)

    Article  Google Scholar 

  7. Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inf. 15(12), 6492–6499 (2019)

    Article  Google Scholar 

  8. Huo, Y., Tian, Y., Ma, L., Cheng, X., Jing, T.: Jamming strategies for physical layer security. IEEE Wirel. Commun. 25(1), 148–153 (2018)

    Article  Google Scholar 

  9. Wang, J., Cai, Z., Yu, J.: Achieving personalized \(k\)-anonymity-based content privacy for autonomous vehicles in CPS. IEEE Trans. Ind. Inf. 16(6), 4242–4251 (2020)

    Google Scholar 

  10. Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1–9 (2017)

    Google Scholar 

  11. Sadeghzadeh, M., Maleki, M., Salehi, M.: Large-scale analysis of regularized block diagonalization precoding for physical layer security of multi-user MIMO wireless networks. IEEE Trans. Veh. Technol. 68(6), 5820–5834 (2019)

    Article  Google Scholar 

  12. Xu, J., Xu, W., Ng, D.W.K., Swindlehurst, A.L.: Secure communication for spatially sparse millimeter-wave massive MIMO channels via hybrid precoding. IEEE Trans. Commun. 68(2), 887–901 (2020)

    Article  Google Scholar 

  13. Gao, Q., Huo, Y., Jing, T., Ma, L., Wen, Y., Xing, X.: An intermittent cooperative jamming strategy for securing energy-constrained networks. IEEE Trans. Commun. 67(11), 7715–7726 (2019)

    Article  Google Scholar 

  14. Choi, Y., Lee, J.H.: A new cooperative jamming technique for a two-hop amplify-and-forward relay network with an eavesdropper. IEEE Trans. Veh. Technol. 67(12), 12447–12451 (2018)

    Google Scholar 

  15. Huo, Y., Xu, M., Fan, X., Jing, T.: A novel secure relay selection strategy for energy-harvesting-enabled internet of things. EURASIP J. Wirel. Commun. Netw. 2018, 1–18 (2018)

    Article  Google Scholar 

  16. Wang, J., Huang, Y., Jin, S., Schober, R., You, X., Zhao, C.: Resource management for device-to-device communication: a physical layer security perspective. IEEE J. Sel. Areas Commun. 36(4), 946–960 (2018)

    Article  Google Scholar 

  17. Huang, L., Fan, X., Huo, Y., Hu, C., Tian, Y., Qian, J.: A novel cooperative jamming scheme for wireless social networks without known CSI. IEEE Access 5, 26476–26486 (2017)

    Google Scholar 

  18. Zhou, Z., Gao, C., Xu, C., Zhang, Y., Mumtaz, S., Rodriguez, J.: Social big-data-based content dissemination in internet of vehicles. IEEE Trans. Ind. Inf. 14(2), 768–777 (2018)

    Article  Google Scholar 

  19. Wen, Y., Huo, Y., Ma, L., Jing, T., Gao, Q.: A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks. IEEE Trans. Veh. Technol. 68(4), 3500–3512 (2019)

    Article  Google Scholar 

  20. Zhou, H., He, D., Wang, H.: Joint relay and jammer selection for secure cooperative networks with a full-duplex active eavesdropper. IET Commun. 14(6), 1043–1055 (2020)

    Article  Google Scholar 

  21. Zhou, Y., Yu, F.R., Chen, J., Kuo, Y.: Cyber-physical-social systems: a state-of-the-art survey, challenges and opportunities. IEEE Commun. Surv. Tutor. 22(1), 389–425 (2020)

    Article  Google Scholar 

  22. Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manag. 13(2), 335–348 (2016)

    Article  Google Scholar 

  23. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577–590 (2018)

    Google Scholar 

  24. He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)

    Article  Google Scholar 

  25. Zhang, Z., Zhang, P., Liu, D., Sun, S.: SRSM-based adaptive relay selection for D2D communications. IEEE Internet Things J. 5(4), 2323–2332 (2018)

    Article  Google Scholar 

  26. Zhao, Y., Li, Y., Cao, Y., Jiang, T., Ge, N.: Social-aware resource allocation for device-to-device communications underlaying cellular networks. IEEE Trans. Wireless Commun. 14(12), 6621–6634 (2015)

    Article  Google Scholar 

  27. Zhang, X., et al.: Information caching strategy for cyber social computing based wireless networks. IEEE Trans. Emerging Top. Comput. 5(3), 391–402 (2017)

    Article  Google Scholar 

  28. Ma, C., et al.: Socially aware caching strategy in device-to-device communication networks. IEEE Trans. Veh. Technol. 67(5), 4615–4629 (2018)

    Article  Google Scholar 

  29. Mustafa, H.A., Shakir, M.Z., Imran, M.A., Tafazolli, R.: Distance based cooperation region for D2D pair. In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp. 1–6, May 2015

    Google Scholar 

  30. Wang, H., Xu, Y., Huang, K., Han, Z., Tsiftsis, T.A.: Cooperative secure transmission by exploiting social ties in random networks. IEEE Trans. Commun. 66(8), 3610–3622 (2018)

    Article  Google Scholar 

  31. Gradshteyn, I.S., Ryzhik, I.M.: Table of integrals, series and products, vol. 20, no. 96, pp. 1157–1160 (2007)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. 61871023 and 61931001)and Beijing Natural Science Foundation (Grant No. 4202054).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Huo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fan, J., Huo, Y., Gao, Q., Jing, T. (2020). A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics