Abstract
With the massive growth of mobile devices and data traffic, it is important to ensure wireless security. Physical layer security utilizing properties of wireless transmission is regarded as a common and promising technology. As a typical physical layer security technology, cooperative jamming is usually affected by social relationships between devices. Devices with excellent social relationships are willing to provide friendly cooperative jamming. Some researchers start to study cooperative jamming using social relationship. In the paper, we propose a social relationship enabled cooperative jamming scheme to achieve secure communications by combining both physical and social information. In particular, we utilize a novel approach to quantify the social relationship metric according to physical locations and effective contact duration between devices. Then, density of legitimate devices as cooperative jammers can be obtained through social relationships. In our scheme, we theoretically analyze the connection outage probability and the secrecy outage probability. Finally, comprehensive numerical results are presented to validate both connection and secrecy performance of cooperative jamming with social relationship.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cai, Z., He, Z.: Trading private range counting over big IoT data. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 144–153 (2019)
Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 38(5), 968–979 (2020)
Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8–14 (2018)
Zheng, X., Cai, Z., Li, Y.: Data linkage in smart internet of things systems: a consideration from a privacy perspective. IEEE Commun. Mag. 56(9), 55–61 (2018)
Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766–775 (2020)
Huo, Y., Fan, X., Ma, L., Cheng, X., Tian, Z., Chen, D.: Secure communications in tiered 5G wireless networks with cooperative jamming. IEEE Trans. Wirel. Commun. 18(6), 3265–3280 (2019)
Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inf. 15(12), 6492–6499 (2019)
Huo, Y., Tian, Y., Ma, L., Cheng, X., Jing, T.: Jamming strategies for physical layer security. IEEE Wirel. Commun. 25(1), 148–153 (2018)
Wang, J., Cai, Z., Yu, J.: Achieving personalized \(k\)-anonymity-based content privacy for autonomous vehicles in CPS. IEEE Trans. Ind. Inf. 16(6), 4242–4251 (2020)
Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1–9 (2017)
Sadeghzadeh, M., Maleki, M., Salehi, M.: Large-scale analysis of regularized block diagonalization precoding for physical layer security of multi-user MIMO wireless networks. IEEE Trans. Veh. Technol. 68(6), 5820–5834 (2019)
Xu, J., Xu, W., Ng, D.W.K., Swindlehurst, A.L.: Secure communication for spatially sparse millimeter-wave massive MIMO channels via hybrid precoding. IEEE Trans. Commun. 68(2), 887–901 (2020)
Gao, Q., Huo, Y., Jing, T., Ma, L., Wen, Y., Xing, X.: An intermittent cooperative jamming strategy for securing energy-constrained networks. IEEE Trans. Commun. 67(11), 7715–7726 (2019)
Choi, Y., Lee, J.H.: A new cooperative jamming technique for a two-hop amplify-and-forward relay network with an eavesdropper. IEEE Trans. Veh. Technol. 67(12), 12447–12451 (2018)
Huo, Y., Xu, M., Fan, X., Jing, T.: A novel secure relay selection strategy for energy-harvesting-enabled internet of things. EURASIP J. Wirel. Commun. Netw. 2018, 1–18 (2018)
Wang, J., Huang, Y., Jin, S., Schober, R., You, X., Zhao, C.: Resource management for device-to-device communication: a physical layer security perspective. IEEE J. Sel. Areas Commun. 36(4), 946–960 (2018)
Huang, L., Fan, X., Huo, Y., Hu, C., Tian, Y., Qian, J.: A novel cooperative jamming scheme for wireless social networks without known CSI. IEEE Access 5, 26476–26486 (2017)
Zhou, Z., Gao, C., Xu, C., Zhang, Y., Mumtaz, S., Rodriguez, J.: Social big-data-based content dissemination in internet of vehicles. IEEE Trans. Ind. Inf. 14(2), 768–777 (2018)
Wen, Y., Huo, Y., Ma, L., Jing, T., Gao, Q.: A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks. IEEE Trans. Veh. Technol. 68(4), 3500–3512 (2019)
Zhou, H., He, D., Wang, H.: Joint relay and jammer selection for secure cooperative networks with a full-duplex active eavesdropper. IET Commun. 14(6), 1043–1055 (2020)
Zhou, Y., Yu, F.R., Chen, J., Kuo, Y.: Cyber-physical-social systems: a state-of-the-art survey, challenges and opportunities. IEEE Commun. Surv. Tutor. 22(1), 389–425 (2020)
Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manag. 13(2), 335–348 (2016)
Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577–590 (2018)
He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)
Zhang, Z., Zhang, P., Liu, D., Sun, S.: SRSM-based adaptive relay selection for D2D communications. IEEE Internet Things J. 5(4), 2323–2332 (2018)
Zhao, Y., Li, Y., Cao, Y., Jiang, T., Ge, N.: Social-aware resource allocation for device-to-device communications underlaying cellular networks. IEEE Trans. Wireless Commun. 14(12), 6621–6634 (2015)
Zhang, X., et al.: Information caching strategy for cyber social computing based wireless networks. IEEE Trans. Emerging Top. Comput. 5(3), 391–402 (2017)
Ma, C., et al.: Socially aware caching strategy in device-to-device communication networks. IEEE Trans. Veh. Technol. 67(5), 4615–4629 (2018)
Mustafa, H.A., Shakir, M.Z., Imran, M.A., Tafazolli, R.: Distance based cooperation region for D2D pair. In: 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp. 1–6, May 2015
Wang, H., Xu, Y., Huang, K., Han, Z., Tsiftsis, T.A.: Cooperative secure transmission by exploiting social ties in random networks. IEEE Trans. Commun. 66(8), 3610–3622 (2018)
Gradshteyn, I.S., Ryzhik, I.M.: Table of integrals, series and products, vol. 20, no. 96, pp. 1157–1160 (2007)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grant No. 61871023 and 61931001)and Beijing Natural Science Foundation (Grant No. 4202054).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Fan, J., Huo, Y., Gao, Q., Jing, T. (2020). A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-59016-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59015-4
Online ISBN: 978-3-030-59016-1
eBook Packages: Computer ScienceComputer Science (R0)