Skip to main content

Anti-eavesdropping Proportional Fairness Access Control for 5G Networks

  • Conference paper
  • First Online:
Quality, Reliability, Security and Robustness in Heterogeneous Systems (QShine 2021)

Abstract

Due to the open access nature, communication over unlicensed band, suffers from security threats like eavesdropping. Eavesdroppers are unwanted nodes, attempting to overhear the signal transmitted between two legitimate mobile terminals (MTs), often for malicious purposes. Apart from security issues, it results in significant degradation of secrecy throughput, i.e., the throughput achieved by a legitimate user without being overheard by eavesdroppers. Since with the present technology, it is quite difficult to identify the eavesdroppers even in 5G, the average throughput of the legitimate MTs decreases when the serving base station schedules the eavesdroppers as well, based on the channel condition only. So far, the issue of eavesdropping has rarely been considered in the context of scheduling. In this paper, we propose an anti-eavesdropping proportional fairness (APF) mechanism considering the possibility of eavesdroppers. Our proposed APF technique first estimates a set of suspected eavesdroppers based on sleep mode information, and then reduces the possibility of scheduling these eavesdroppers by imposing penalties. Penalty assignments are based on past average throughput, current channel conditions and modulation/coding schemes. Both Hidden Markov model based analysis and simulations confirm that the proposed APF technique outperforms the traditional proportional fairness protocol in terms of anti-eavesdropping efficiency and secrecy throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lagen, S., et al.: New radio beam-based access to unlicensed spectrum: design challenges and solutions. IEEE Commun. Surv. Tutor. 22(1), 8–37 (2020)

    Article  Google Scholar 

  2. Hamamreh, J.M., Furqan, H.M., Arslan, H.: Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(2), 1773–1828 (2019)

    Article  Google Scholar 

  3. Wu, Y., Zheng, J., Guo, K., Qian, L.P., Shen, X., Cai, Y.: Joint traffic scheduling and resource allocations for traffic offloading with secrecy provisioning. IEEE Trans. Veh. Technol. 66(9), 8315–8332 (2017)

    Article  Google Scholar 

  4. Wyner, A.D.: The Wire-tap channel. Bell Syst. Tech J. 54(8), 1355–1387 (1975)

    Article  MathSciNet  Google Scholar 

  5. Chorti, A., Perlaza, S.M., Han, Z., Poor, H.V.: Physical layer security in wireless networks with passive and active eavesdroppers. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 4868–4873 (2012)

    Google Scholar 

  6. Chen, H., Tao, X., Li, N., Xia, S., Sui, T.: Physical layer data analysis for abnormal user detecting: a random matrix theory perspective. IEEE Access 7, 169508–169517 (2019)

    Article  Google Scholar 

  7. Capozzi, F., Piro, G., Grieco, L.A., Boggia, G., Camarda, P.: Downlink packet scheduling in LTE cellular networks: key design issues and a survey. IEEE Commun. Surv. Tutor. 15(2), 678–700 (2013)

    Article  Google Scholar 

  8. Ma, J., Aijaz, A., Beach, M.: Recent results on proportional fair scheduling for mmWave-based industrial wireless networks. arXiv:2007.05820 (2020)

  9. Margolies, R., et al.: Exploiting mobility in proportional fair cellular scheduling: measurements and algorithms. IEEE/ACM Trans. Netw. 24(1), 355–367 (2016)

    Article  Google Scholar 

  10. Zou, Y., Wang, X., Shen, W.: Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans. Commun. 61(12), 5103–5113 (2013)

    Article  Google Scholar 

  11. Yajun, W., Tongqing, L., Chuanan, W.: An anti-eavesdrop transmission scheduling scheme based on maximizing secrecy outage probability in ad hoc networks. China Commun. 13(1), 176–184 (2016)

    Article  Google Scholar 

  12. Firyaguna, F., Bonfante, A., Kibilda, J., Marchetti, N.: Performance evaluation of scheduling in 5G-mmWave networks under human blockage. arXiv:2007.13112v1 (2020)

  13. Balakrishnan, S., Wang, P., Bhuyan, A., Sun, Z.: On success probability of eavesdropping attack in 802.11ad mmWave WLAN. In: Proceedings of IEEE International Conference on Communications (ICC), pp. 1–6 (2018)

    Google Scholar 

  14. Guo, C., Zhang, Y., Wang, X.: A Jain’s index perspective on \(\alpha \) fairness resource allocation over slow fading channels. IEEE Commun. Lett. 17(4), 705–708 (2013)

    Article  Google Scholar 

  15. Carfano, G., Murguia, H., Gudem, P., Mercier, P.: Impact of FR1 5G NR jammers on UWB indoor position location systems. In: Proceedings of International Conference on Indoor Positioning and Indoor Navigation (IPIN), pp. 1–8 (2019)

    Google Scholar 

  16. Jurafsky, D., Martin, J.H.: Hidden Markov Models. Speech and Language Processing, Draft of October 2, 2019

    Google Scholar 

  17. Sawant, R., Nema, S.: SNR analysis in cooperative spectrum sensing for cognitive radio. In: International Conference on Advances in Communication and Computing Technology (ICACCT). Sangamner 2018, pp. 392–396 (2018). https://doi.org/10.1109/ICACCT.2018.8529340

  18. Armi, N., Saad, N.M., Zuki, Y.M., Arshad, M.: Cooperative spectrum sensing and signal detection in cognitive radio. In: 2010 International Conference on Intelligent and Advanced Systems, Kuala Lumpur, Malaysia, 2010, pp. 1–5. https://doi.org/10.1109/ICIAS.2010.5716151

  19. Lauridsen, M., Berardinelli, G., Tavares, F.M.L., Frederiksen, F., Mogensen, P.: Sleep modes for enhanced battery life of 5G mobile terminals. In: The proceedings of IEEE Conference on Vehicular Technology (VTC) (2016)

    Google Scholar 

  20. Chang, B., Chen, J.: Cross-layer-based adaptive vertical handoff with predistive RSS in heterogeneous wireless networks. IEEE Trans. Veh. Technol. 57(6), 3679–3692 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghosh, S.K., Das, A., Ghosh, S.C., Das, N. (2021). Anti-eavesdropping Proportional Fairness Access Control for 5G Networks. In: Yuan, X., Bao, W., Yi, X., Tran, N.H. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Systems. QShine 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-91424-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91424-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91423-3

  • Online ISBN: 978-3-030-91424-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics