Abstract
This paper aims to help save energy when legitimate users exploit physical layer security techniques to guarantee security, which can suit resource limited systems more. It proposes a risk prediction scheme in a communication scene with a mobile eavesdropper, whose CSI (Channel State Information) is unknown to legitimate users. The scheme can predict where the eavesdropper will be later and decide whether security measures should be taken to against it. The security measures are only taken when the prediction result shows there will be risks in the communication process. Based on the proposed scheme, resources can be saved to a large degree as well as the security guaranteed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zheng, X., Cai, Z., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: the 36th Annual IEEE International Conference on Computer Communications, pp. 1–9 (2017)
Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016)
Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. PP(99), 1 (2017)
Zhang, L., Cai, Z., Wang, X.: FakeMask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manage. 13(2), 335–348 (2016)
Cai, J.Z., Ai, C., Yang, D., Gao, H., Cheng, X.: Differentially private k-anonymity: achieving query privacy in location-based services. In: The International Conference on Identification, Information and Knowledge in the Internet of Things (2016)
Li, J., Cai, Z., Yan, M., Li, Y.: Using crowdsourced data in location-based social networks to explore influence maximization. In: the 35th Annual IEEE International Conference on Computer Communications, pp. 1–9 (2016)
Li, Z., Jing, T., Cheng, X., Huo, Y., Zhou, W., Chen, D.: Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. In: 2015 IEEE International Conference on Communications, pp. 7609–7614 (2015)
Lin, P.-H., Lai, S.-H., Lin, S.-C., Su, H.-J.: On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 31, 1728–1740 (2013)
Wang, J., Lee, J., Wang, F., Quek, T.Q.S.: Jamming-aided secure communication in massive mimo Rician channels. IEEE Trans. Wireless Commun. 14, 6854–6868 (2015)
Li, Z., Jing, T., Ma, L., Huo, Y., Qian, J.: Worst-case cooperative jamming for secure communications in CIOT networks. Sensors 16, 339 (2016)
Gao, Q., Huo, Y., Ma, L., Xing, X., Cheng, X., Jing, T., Liu, H.: Optimal stopping theory based jammer selection for securing cooperative cognitive radio networks. In: IEEE Global Communications Conference, pp. 1–6 (2016)
Li, H., Wang, X., Hou, W.: Security enhancement in cooperative jamming using compromised secrecy region minimization. In: 2013 13th Canadian Workshop on Information Theory, pp. 214–218 (2013)
Acknowledgments
We are very grateful to all reviewers who have helped improve the quality of this paper. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61572070, 61471028, 61371069), the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130009110015), and the Fundamental Research Funds for the Central Universities (Grant No. 2016JBZ003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Tian, Y., Huo, Y., Hu, C., Gao, Q., Jing, T. (2017). A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers . In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_72
Download citation
DOI: https://doi.org/10.1007/978-3-319-60033-8_72
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60032-1
Online ISBN: 978-3-319-60033-8
eBook Packages: Computer ScienceComputer Science (R0)