Skip to main content

A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

This paper aims to help save energy when legitimate users exploit physical layer security techniques to guarantee security, which can suit resource limited systems more. It proposes a risk prediction scheme in a communication scene with a mobile eavesdropper, whose CSI (Channel State Information) is unknown to legitimate users. The scheme can predict where the eavesdropper will be later and decide whether security measures should be taken to against it. The security measures are only taken when the prediction result shows there will be risks in the communication process. Based on the proposed scheme, resources can be saved to a large degree as well as the security guaranteed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zheng, X., Cai, Z., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: the 36th Annual IEEE International Conference on Computer Communications, pp. 1–9 (2017)

    Google Scholar 

  2. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016)

    Article  Google Scholar 

  3. Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. PP(99), 1 (2017)

    Article  Google Scholar 

  4. Zhang, L., Cai, Z., Wang, X.: FakeMask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manage. 13(2), 335–348 (2016)

    Article  Google Scholar 

  5. Cai, J.Z., Ai, C., Yang, D., Gao, H., Cheng, X.: Differentially private k-anonymity: achieving query privacy in location-based services. In: The International Conference on Identification, Information and Knowledge in the Internet of Things (2016)

    Google Scholar 

  6. Li, J., Cai, Z., Yan, M., Li, Y.: Using crowdsourced data in location-based social networks to explore influence maximization. In: the 35th Annual IEEE International Conference on Computer Communications, pp. 1–9 (2016)

    Google Scholar 

  7. Li, Z., Jing, T., Cheng, X., Huo, Y., Zhou, W., Chen, D.: Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. In: 2015 IEEE International Conference on Communications, pp. 7609–7614 (2015)

    Google Scholar 

  8. Lin, P.-H., Lai, S.-H., Lin, S.-C., Su, H.-J.: On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 31, 1728–1740 (2013)

    Article  Google Scholar 

  9. Wang, J., Lee, J., Wang, F., Quek, T.Q.S.: Jamming-aided secure communication in massive mimo Rician channels. IEEE Trans. Wireless Commun. 14, 6854–6868 (2015)

    Article  Google Scholar 

  10. Li, Z., Jing, T., Ma, L., Huo, Y., Qian, J.: Worst-case cooperative jamming for secure communications in CIOT networks. Sensors 16, 339 (2016)

    Article  Google Scholar 

  11. Gao, Q., Huo, Y., Ma, L., Xing, X., Cheng, X., Jing, T., Liu, H.: Optimal stopping theory based jammer selection for securing cooperative cognitive radio networks. In: IEEE Global Communications Conference, pp. 1–6 (2016)

    Google Scholar 

  12. Li, H., Wang, X., Hou, W.: Security enhancement in cooperative jamming using compromised secrecy region minimization. In: 2013 13th Canadian Workshop on Information Theory, pp. 214–218 (2013)

    Google Scholar 

Download references

Acknowledgments

We are very grateful to all reviewers who have helped improve the quality of this paper. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61572070, 61471028, 61371069), the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20130009110015), and the Fundamental Research Funds for the Central Universities (Grant No. 2016JBZ003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Huo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Tian, Y., Huo, Y., Hu, C., Gao, Q., Jing, T. (2017). A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers . In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_72

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics