Abstract
Due to the open access nature, communication over unlicensed band, suffers from security threats like eavesdropping. Eavesdroppers are unwanted nodes, attempting to overhear the signal transmitted between two legitimate mobile terminals (MTs), often for malicious purposes. Apart from security issues, it results in significant degradation of secrecy throughput, i.e., the throughput achieved by a legitimate user without being overheard by eavesdroppers. Since with the present technology, it is quite difficult to identify the eavesdroppers even in 5G, the average throughput of the legitimate MTs decreases when the serving base station schedules the eavesdroppers as well, based on the channel condition only. So far, the issue of eavesdropping has rarely been considered in the context of scheduling. In this paper, we propose an anti-eavesdropping proportional fairness (APF) mechanism considering the possibility of eavesdroppers. Our proposed APF technique first estimates a set of suspected eavesdroppers based on sleep mode information, and then reduces the possibility of scheduling these eavesdroppers by imposing penalties. Penalty assignments are based on past average throughput, current channel conditions and modulation/coding schemes. Both Hidden Markov model based analysis and simulations confirm that the proposed APF technique outperforms the traditional proportional fairness protocol in terms of anti-eavesdropping efficiency and secrecy throughput.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lagen, S., et al.: New radio beam-based access to unlicensed spectrum: design challenges and solutions. IEEE Commun. Surv. Tutor. 22(1), 8–37 (2020)
Hamamreh, J.M., Furqan, H.M., Arslan, H.: Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(2), 1773–1828 (2019)
Wu, Y., Zheng, J., Guo, K., Qian, L.P., Shen, X., Cai, Y.: Joint traffic scheduling and resource allocations for traffic offloading with secrecy provisioning. IEEE Trans. Veh. Technol. 66(9), 8315–8332 (2017)
Wyner, A.D.: The Wire-tap channel. Bell Syst. Tech J. 54(8), 1355–1387 (1975)
Chorti, A., Perlaza, S.M., Han, Z., Poor, H.V.: Physical layer security in wireless networks with passive and active eavesdroppers. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 4868–4873 (2012)
Chen, H., Tao, X., Li, N., Xia, S., Sui, T.: Physical layer data analysis for abnormal user detecting: a random matrix theory perspective. IEEE Access 7, 169508–169517 (2019)
Capozzi, F., Piro, G., Grieco, L.A., Boggia, G., Camarda, P.: Downlink packet scheduling in LTE cellular networks: key design issues and a survey. IEEE Commun. Surv. Tutor. 15(2), 678–700 (2013)
Ma, J., Aijaz, A., Beach, M.: Recent results on proportional fair scheduling for mmWave-based industrial wireless networks. arXiv:2007.05820 (2020)
Margolies, R., et al.: Exploiting mobility in proportional fair cellular scheduling: measurements and algorithms. IEEE/ACM Trans. Netw. 24(1), 355–367 (2016)
Zou, Y., Wang, X., Shen, W.: Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans. Commun. 61(12), 5103–5113 (2013)
Yajun, W., Tongqing, L., Chuanan, W.: An anti-eavesdrop transmission scheduling scheme based on maximizing secrecy outage probability in ad hoc networks. China Commun. 13(1), 176–184 (2016)
Firyaguna, F., Bonfante, A., Kibilda, J., Marchetti, N.: Performance evaluation of scheduling in 5G-mmWave networks under human blockage. arXiv:2007.13112v1 (2020)
Balakrishnan, S., Wang, P., Bhuyan, A., Sun, Z.: On success probability of eavesdropping attack in 802.11ad mmWave WLAN. In: Proceedings of IEEE International Conference on Communications (ICC), pp. 1–6 (2018)
Guo, C., Zhang, Y., Wang, X.: A Jain’s index perspective on \(\alpha \) fairness resource allocation over slow fading channels. IEEE Commun. Lett. 17(4), 705–708 (2013)
Carfano, G., Murguia, H., Gudem, P., Mercier, P.: Impact of FR1 5G NR jammers on UWB indoor position location systems. In: Proceedings of International Conference on Indoor Positioning and Indoor Navigation (IPIN), pp. 1–8 (2019)
Jurafsky, D., Martin, J.H.: Hidden Markov Models. Speech and Language Processing, Draft of October 2, 2019
Sawant, R., Nema, S.: SNR analysis in cooperative spectrum sensing for cognitive radio. In: International Conference on Advances in Communication and Computing Technology (ICACCT). Sangamner 2018, pp. 392–396 (2018). https://doi.org/10.1109/ICACCT.2018.8529340
Armi, N., Saad, N.M., Zuki, Y.M., Arshad, M.: Cooperative spectrum sensing and signal detection in cognitive radio. In: 2010 International Conference on Intelligent and Advanced Systems, Kuala Lumpur, Malaysia, 2010, pp. 1–5. https://doi.org/10.1109/ICIAS.2010.5716151
Lauridsen, M., Berardinelli, G., Tavares, F.M.L., Frederiksen, F., Mogensen, P.: Sleep modes for enhanced battery life of 5G mobile terminals. In: The proceedings of IEEE Conference on Vehicular Technology (VTC) (2016)
Chang, B., Chen, J.: Cross-layer-based adaptive vertical handoff with predistive RSS in heterogeneous wireless networks. IEEE Trans. Veh. Technol. 57(6), 3679–3692 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ghosh, S.K., Das, A., Ghosh, S.C., Das, N. (2021). Anti-eavesdropping Proportional Fairness Access Control for 5G Networks. In: Yuan, X., Bao, W., Yi, X., Tran, N.H. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Systems. QShine 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 402. Springer, Cham. https://doi.org/10.1007/978-3-030-91424-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-91424-0_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91423-3
Online ISBN: 978-3-030-91424-0
eBook Packages: Computer ScienceComputer Science (R0)